rss feed link header graphic

Black Hat DC 2009 Briefings Speakers

Hyatt Regency Crystal City • February 16-17



Speakers and Topics


capitol dome at night

Ryan C. Barnett

WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity



video audio presentation ppt

Cesar Cerrudo

SQL Server Anti-Forensics



video audio presentation ppt

Matthew Flick

XSS Anonymous Browser



video audio presentation ppt

Xinwen Fu

One Cell is Enough to Break Tor's Anonymity



video audio presentation ppt

Travis Goodspeed

Reversing and Exploiting Wireless Sensors



video audio presentation ppt

Vincenzo Iozzo

Let Your Mach-O Fly



video audio presentation ppt ppt

Prajakta Jagdale

Blinded by Flash: Widespread Security Risks Flash Developers Don't See



video audio presentation ppt

Dan Kaminsky

DNS 2008 and the New (old) Nature of Critical Infrastructure



video audio presentation ppt

William Kimball

Emulation-based Software Protection Providing Encrypted Code Execution and Page Granularity Code Signing



video audio presentation ppt

Paul Kurtz

Keynote: The Move from Strategic Indecision to Leadership in Cyberspace



video

Brian Krumheuer, Jason Raber

QuietRIATT: Rebuilding the Import Address Table Using Hooked DLL Calls



video audio presentation ppt

Adam Laurie

Satellite Hacking for Fun and Profit



video audio presentation ppt

Andrew Lindell

Making Privacy-Preserving Data Mining Practical with Smartcards



video audio presentation ppt

David Litchfield

The Forensic Investigation of a Compromised Oracle Database Server



video audio presentation ppt

Moxie Marlinspike

New Techniques for Defeating SSL/TLS



video audio presentation ppt

Michael Muckin

Windows Vista Security Internals



video audio presentation ppt

Duc Nguyen

Your Face Is NOT Your Password



video audio presentation ppt

Peter Silberman

Snort My Memory



video audio presentation ppt ppt

Val Smith, Colin Ames

Dissecting Web Attacks



video audio presentation ppt

Michael Sutton

A Wolf in Sheep's Clothing: The Dangers of Persistent Web Browser Storage



video audio presentation ppt

Rafal Wojtczuk & Joanna Rutkowska

Attacking Intel® Trusted Execution Technology



video audio presentation ppt

Paul Wouters

Defending Your DNS in a Post-Kaminsky World



video audio presentation ppt

Earl Zmijewski

Defending Against BGP Man-In-The-Middle Attacks



video audio presentation ppt




Black Hat Webcasts


Black Hat Social






About Black Hat | Privacy Policy | Sponsorship Inquiry | DEFCON | Black Hat Main RSS Feed