Black Hat Europe 2012

Black Hat EUROPE 2012 //schedule

Grand Krasnapolsky Hotel
mar 14 - 16
Sponsor Exhibit Hours
March 14: 08:00-19:30
March 15: 08:00-14:15


/Europe 2012 ( Wed - Mar 14 )


/Europe 2012 ( Thu - Mar 15 )

08:00 - 18:00 + REGISTRATION
0800 - 0900 + WELCOME TEA & COFFEE in Wintergarden
TRACK » //Track One //Track Two //Track Three
ROOM » Grand Ballroom Foyer Room Amsterdam Room
0900 - 1000 Issues with Embedded Device Disclosures: Helping the Vendors and Recognizing the End-Users by Jerome Radcliffe Offensive Threat Modeling for Attackers: Turning Threat Modeling on its Head by Rafal Los + Shane MacDougall SamuraiWTF Workshop by Justin Searle
1000 - 1015 + break
1015 - 1115 Defending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices by Marcia Hofmann + Seth Schoen All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Cyrpto Ecosystem by Enno Rey + Daniel Mende SamuraiWTF Workshop con't by Justin Searle
1115 - 1145 + coffee service
1145 - 1245 An Assortment of Database Goodies by David Litchfield They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces by Ben Williams SamuraiWTF Workshop con't by Justin Searle
1245 - 1415 + lunch break
1415 - 1515 Data Mining a Mountain of Zero Day Vulnerabilities by Chris Wysopal Cyber-Attacks & SAP Systems: Is Our Business-Critical Infrastructure Exposed? by Mariano Nunez Di Croce Mobile Network Forensics Workshop by Eric Fulton
1515 - 1530 + break
1530 - 1630 An Attacker's Day into Virology: Human Vs Computer by Axelle Apvrille + Guillaume Lovet Attacking IPv6 Implementation Using Fragmentation by Antonios Atlasis Mobile Network Forensics Workshop con't by Eric Fulton
1630 - 1700 + coffee service
1700 - 1800 36 Views of Cyberspace by Damir Rajnovic Secure in 2010? Broken in 2011! by Matias Madou Mobile Network Forensics Workshop con't by Eric Fulton

/Europe 2012 ( Fri - Mar 16 )

08:00 - 18:00 + REGISTRATION
0800 - 0900 + WELCOME TEA & COFFEE in Wintergarden
TRACK » //Track One //Track Two //Track Three
ROOM » Grand Ballroom Foyer Room Amsterdam Room
0900 - 1000 "Secure Password Managers" and "Military-Grade Encryption" on Smartphones: Oh Really? by Andrey Belenko + Dmitry Sklyarov The Kelihos Botnet by Kyle Yang Teensy Programming for Everyone Workshop by Nikhil Mittal
1000 - 1015 + break
1015 - 1115 Apple vs. Google Client Platforms by Felix 'FX' Lindner Entrapment: Tricking Malware with Transparent, Scalable Malware Analysis by Paul Royal Teensy Programming for Everyone Workshop con't by Nikhil Mittal
1115 - 1145 + coffee service
1145 - 1245 The Mobile Exploit Intelligence Project by Dan Guido + Mike Arpaia GDI Font Fuzzing in Windows Kernel For Fun by Ling Chuan Lee + Chan Lee Yee The Pwnage Saga Continues by Nikhil Mittal
1245 - 1415 + lunch break
1415 - 1515 The Heavy Metal That Poisoned the Droid by Tyrone Erasmus CANAPE: Bytes Your Bits by Michael Jordon + James Forshaw Preventing "Oh Shit!" Moments for 20 Euros or Less by Phil Polstra
1515 - 1530 + break
1530 - 1630 Smartphone's Apps Are Not That Smart: Insecure Development Practices by Simon Roses Femerling Breeding Sandworms: How to Fuzz Your Way Out of Adobe Reader's Sandbox by Guillaume Lovet + Zhenhua Liu Drop it Like it's Hotspot: Hacking Mifi Routers for Nefarious Purposes by Steve Lord
1630 - 1700 + coffee service
1700 - 1800 One-Byte Modification for Breaking Memory Forensic Analysis by Takahiro Haruyama Lotus Domino: Penetration Through the Controller by Alexey Sintsov IVR Security: Internal Network Attack via Phone Lines by Rahul Sasi