Black Hat Home Black Hat Home Black Hat Europe Briefings Black Hat Europe Briefings Black Hat Europe Training Black Hat Europe Training Black Hat Europe Schedule Black Hat Europe Schedule Black Hat Europe Sponsors Black Hat Europe Sponsors Black Hat Europe Arsenal Black Hat Europe Arsenal Black Hat Europe Venue Black Hat Europe Venue


Briefings | Friday March 15

0800
Registration

0800
Sponsor Hall - Ends at 1415

0830
Sponsored By:
 

Track
ROOM
Track 1
Track 1
Track 2
Track 2
Track 3
Track 3
Track 4
Track 4
1000
Honeypot That Can Bite: Reverse Penetration
Alexey Sintsov
The Sandbox Roulette - Are You Ready for The Gamble?
Rafal Wojtczuk + Rahul Kashyap
Hacking Video Conferencing Systems
Moritz Jodeit
Assessing BYOD with the Smartphone Pentest Framework
Georgia Weidman

1100
Coffee Service
Track
ROOM
Track 1
Track 1
Track 2
Track 2
Track 3
Track 3
Track 4
Track 4
1130
Who's Really Attacking Your ICS Devices?
Kyle Wilhoit
Next Generation Mobile Rootkits
Thomas Roth
Power Analysis Attacks for Cheapskates
Colin O'Flynn
Assessing BYOD with the Smartphone Pentest Framework
Georgia Weidman

1230
Sponsored By:
 
Track
ROOM
Track 1
Track 1
Track 2
Track 2
Track 3
Track 3
Track 4
Track 4
1400
Harnessing GP²Us - Building Better Browser Based Botnets
Marc Blanchou
Advanced Heap Manipulation in Windows 8
Zhenhua 'Eric' Liu
Using D-Space to Open Doors
Brad Antoniewicz
Advanced iOS Application Pentesting
Vivek Ramachandran

1500
Break
Track
ROOM
Track 1
Track 1
Track 2
Track 2
Track 3
Track 3
Track 4
Track 4
1530
Multiplayer Online Games Insecurity
Donato Ferrante + Luigi Auriemma
OptiSig: Semantic Signature for Metamorphic Malware
Nguyen Anh Quynh
Dude, Where’s My Laptop?
Simon Roses Femerling + Curro Marquez
Advanced iOS Application Pentesting
Vivek Ramachandran

1630
Sponsored By:
 
Track
ROOM
Track 1
Track 1
Track 2
Track 2
Track 3
Track 3
Track 4
Track 4
1700
DropSmack: How Cloud Synchronization Services Render Your Corporate Firewall Worthless
Jacob Williams
Hybrid Defense: How to Protect Yourself From Polymorphic 0-days
Svetlana Gaivoronski + Dennis Gamayunov
Mesh Stalkings: Penetration Testing with Small Networked Devices
Phil Polstra
Advanced iOS Application Pentesting
Vivek Ramachandran