Black Hat Digital Self Defense DC 2007

Black Hat Show Page

Black Hat Briefings Speakers Black Hat Briefings Schedule Black Hat  Sponsors Black Hat Training Black Hat Hotel & Venue Black Hat Registration
Black Hat Briefings Registration Hours
Wednesday, February 28, 08:00 - 12:00
Thursday, March 1, 08:00 - 12:00
February 27, 2007 • Informal gathering at 18:00. Gather at the Hotel Bar.
This is a great time to meet and network with friends, colleagues and the speakers.
Day 1 • February 28, 2007
08:00 - 08:50
Registration and Continental Breakfast
08:50 - 09:00 Introduction, Jeff Moss
09:00 - 09:50

Keynote: Cyber Crime and the Power of Digital Forensics
Special Agent (Ret) Jim Christy, Director, Futures Exploration, Department of Defense Cyber Crime Center

09:50 - 10:00 Break
Hardware & Below The OS

Forensics and Incident Response

Location & Times

Sheraton Crystal City

Sheraton Crystal City

10:00 - 11:00

Firmware Rootkits and the Threat to the Enterprise

John Heasman

Agile Incident Response: Operating through Ongoing Confrontation

Kevin Mandia

11:00 - 11:15
Coffee Service

sponsored by

11:15 - 12:30

Advanced Oracle Attack Techniques

David Litchfield

Web Application Incident Response and Forensics - A Whole New Ball Game!

Chuck Willis & Rohyt Belani

12:30 - 13:45

Lunch: Crystal Ballroom C

sponsored by

Black Hat Sponsor: Microsoft
13:45 - 15:00

Rights “Chipped” Away: RFID and Identification Documents

Nicole A. Ozer

Volatools: Integrating Volatile Memory Forensics into the Digital Investigation Process

AAron Walters & Nick Petroni, Jr

15:00 - 15:15 Break
15:15 - 16:30

Secure Processors for Embedded Applications

James D. Broesch

Beyond The CPU: Defeating Hardware Based RAM Acquisition Tools (Part I: AMD case)

Joanna Rutkowska

16:30 - 16:45
Coffee Service

sponsored by

sponsor: Qualys

16:45 - 18:00

Device Drivers 2.0

David Maynor

Botnet Tracking: Tools, Techniques, and Lessons Learned

Jose Nazario

18:00 - 20:00
Hosted Reception: Eat, Drink, Network and be Merry!
Reception will be held at the Sheraton Crystal City

Day 2 • March 1, 2007
08:00 - 09:00
Registration and Continental Breakfast

Affecting The Enterprise

Software Security and Binary Analysis

Location & Times

Sheraton Crystal City

Sheraton Crystal City

09:00 - 09:50


Ofir Arkin

Being Explicit about Software Weaknesses

Robert A. Martin, Steve Christey & Sean Barnum

09:50 - 10:00


10:00 - 11:15

GS and ASLR in Windows Vista

Ollie Whitehouse

Attack Patterns: Knowing Your Enemies in Order to Defeat Them

Sean Barnum

11:15 - 11:30
Coffee Service

sponsored by

11:30 - 12:45

360° Anomaly Based Unsupervised Intrusion Detection

Stefano Zanero

Reversing C++

Paul Vincent Sabanal & Mark Vincent Yason

12:45 - 13:45

Lunch: Crystal Ballroom C

13:45 - 15:00

Data Seepage: How to Give Attackers a Roadmap to Your Network

David Maynor & Robert Graham

Practical 10 Minute Security Audit: The Oracle Case

Cesar Cerrudo

15:00 - 15:15 Break
15:15 - 16:30

Danger From Below: The Untold Tale of Database Communication Protocol Vulnerabilities

Amichai Shulman

Practical Malware Analysis: Fundamental Techniques and a New Method for Malware Discovery

Kris Kendall & Chad McMillan

16:30 - 16:45
Coffee Service

sponsored by

sponsor: Qualys

16:45 - 18:00

Smashing Web Apps: Applying Fuzzing to Web Applications and Web Services

Michael Sutton

Exploting Similarity Between Variants to Defeat Malware

Andrew Walenstein

Note that this schedule is subject to change.

Attendees must wear badges at all times in the conference areas.
Badges and/or conference proceedings that are lost or reported stolen will incur a $500 replacement fee.

All attendees must be 18 years of age or older to be on the conference floor.

Black Hat Logo
(c) 1996-2007 Black Hat