Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat B
If you give a thousand programmers the same task and the same tools, chances are a lot of the result
This session will examine the threat of spyware to corporations. What does the threat currently look
This presentation shows the next (2.) generation of Oracle Rootkits. In the first generation, presen
Voice analytics-once the stuff of science fiction and Echelon speculation-is now commercially availa
Web applications are normally the most exposed and the most easily compromised part of an organizati
Every application, from a small blog written in PHP to an enterprise-class database, receives raw by
When trying to analyze a complex system for its security properties, very little information is avai
It's late. You've been assigned the unenviable task of evaluating the security of this obtuse applic
Today’s privacy requirements place significant additional auditing burdens on databases. First you h
VoIP, IMS, FMC, NGN, PacketCore, MPLS. Put those together and you are looking at the next security n
In this day and age, forensics evidence lurks everywhere. This talk takes attendees on a brisk walk
Injecting shellcode into a vulnerable program so you can find it reliably can be tricky. With image
Linux® is the most popular open source project. The Linux random number generator is part of the ker
Over the last three years, the Metasploit Framework has evolved from a klunky exploit toolkit to a s
Expertise in computer forensic technology means nothing if that expertise can’t be conveyed convinci
Part two: Expertise in computer forensic technology means nothing if that expertise can’t be conve
This presentation will discuss the use of RSS and Atom feeds as method of delivering exploits to cli
Radio Frequency Identification (RFID) malware, first introduced in my paper 'Is Your Cat Infected wi
Rootkit technology has exploded recently, especially in the realm of remote command and control vect
The Achilles' heel of network IDSs lies in the large number of false positives (i.e., false attacks)