Black Hat Digital Self Defense USA 2004

Black Hat Main Conference Overview

Black Hat Briefings Speakers Black Hat Briefings Schedule Black Hat Sponsors Black Hat Training Black Hat Hotel & Venue Black Hat Registration
July 27 • Informal gathering at 18:00. Gather at the Registration Desk. This is a great time to meet and network with friends, colleagues and the speakers.

Black Hat is proud to announce the launch of The Mezonic Agenda: Hacking a Presidency Contest
hosted by Syngress Publishing. A CD containing the game will be available to the delegates at the conference.

Day 1 • July 28, 2004
08:00 - 08:50 Registration and Continental Breakfast: Fourth Floor Palace Tower Promenade
08:50 - 09:00 Introduction, Jeff Moss
09:00 - 09:50

Keynote: Thinking Outside the Box – Embracing Globalization
Paul Simmonds, Global Information Security Director (CISO), Jericho Forum/ICI Plc.

09:50 - 10:00 Break

Application Security

Layer 0

Policy, Management, and the Law

Zero Day Attack

Deep Knowledge

Location & Times Palace Salon 1 Emperor's II

Emperors I

Palace Salon III

Palace Salon II

10:00 - 11:00

Antivirus Security Software Tests

Sarah Gordon

Windows WaveSEC Deployment

Paul Wouters

Hacking with Executives

JD Glaser

All New Ø-Day

David Litchfield

Program Semantics-Aware Intrusion Detection

Tzi-cker Chiueh

11:00 - 11:15
Coffee Service: Fourth Floor Palace Tower Promenade

sponsored by

sponsor: Qualys
11:15 - 12:30

Information Hiding in Executable Binaries

Rakan El-Khalil

RF-ID and Smart-Labes: Myth, Technology and Attacks

Lukas Grunwald

Legal Liability and Security Incident Investigation

Jennifer Granick

Advanced Return Address Discovery using Context-Aware Machine Code Emulation

Derek Soeder, Ryan Parmeh, Yuji Ukai

Diff, Navigate, Audit

Halvar Flake

12:30 - 13:45
Lunch: Pavilion at Caesars

sponsored by

sponsor: Bindview
13:45 - 15:00

Pocket PC Abuse

Seth Fogie

Introduction to Embedded Security

Joe Grand

The Laws of Vulnerabilities for Internal Networks

Gerhard Eschelbeck

Defeating Automated Web Assessment Tools

Saumil Shah

Trust No-one, Not Even Yourself OR The Weak Link Might Be Your Build Tools

David Maynor

15:00 - 15:15 Break
15:15 - 16:30

Web Application Session Strength

Michael Shema


spoonm & HD Moore

Information Security Law Update

Brad Bolin

NoSEBrEaK - Defeating Honeynets

Thorsten Holz & Maximillian Dornseif

Attacking Obfuscated Code with IDA Pro

Chris Eagle

16:30 - 16:45
Coffee Service: Fourth Floor Palace Tower Promenade

sponsored by

sponsor: Net IQ
16:45 - 18:00

Hacking Without Re-inventing the Wheel

Nitesh Dhanjani & Justin Clarke

A Historical Look at Hardware Token Compromises

Joe Grand

Hacker Court ’04: Pirates of the Potomac


Attacking Host Intrusion Prevention Systems

Eugene Tsyrklevich

Vulnerability Finding in Win32—A Comparison


18:00 - 20:00 Hosted Gala Reception: Eat, Drink, Network and be Merry!
Location: Palace Tower Promenade

Reception sponsored by

sponsor: Bindview


sponsor: Sana Security


sponsor: Ernst & Young
sponsor: Secure Computing

Continuation of Hacker Court

Booksigning with the authors of "Stealing the Network: How to Own a Continent" during the Gala Reception.

Day 2 • July 29, 2004
08:00 - 09:00
Registration and Continental Breakfast: Fourth Floor Palace Tower Promenade

sponsored by

sponsor: Secure Computing
Application Security

Computer Forensics & Log Analysis

Privacy & Anonymity

Zero Day Defense

Turbo Talks

Location & Times Palace Salon III Palace Salon II Emperor I Palace Salon I Emperors II
09:00 - 09:50

The Black Hat Testimonies


Managing Election Data: The California Recall

Rebecca Mercuri, Ph.D & Bev Harris

BlueSnarfing The Risk From Digital Pickpockets

Adam Laurie & Martin Herfurt

Phishing— Committing Fraud in Public

Phillip Hallam-Baker

The Future of History

Robert Morris

09:00 - 09:50
09:50 - 10:00 Break
10:00 - 11:00

The Black Ops of DNS

Dan Kaminsky

Steganography, Steganalysis, & Cryptanalysis

Michael Raggo

Putting the P back in VPN

Roger Dingledine

When the Tables Turn


Richard Thieme

10:00 - 11:00

11:00 - 11:15
Coffee Service: Fourth Floor Palace Tower Promenade

sponsored by

sponsor: Cisco

Book Signing with Richard Thieme and his newly released book "Islands in the Clickstream: Reflections on Life in a Virtual World".

11:15 - 12:30

Web Application Security Crossfire


Evasion and Detection of Web Application Attacks

K.K. Mookhey

Privacy, Economics and Immediate Gratification

Dr. Alessandro Acquisti

VICE - Catch the Hookers!

Jamie Butler & Greg Hoglund

Google Attacks

Patrick Chambet

11:15 - 11:35

How Next Generation Application Proxies Protect Against The Latest Attacks & Intrusions

Andrew Stevens

11:45 - 12:05

WorldWide WarDrive 4

Chris Hurley

12:15 - 12:35

12:30 - 13:45

Lunch: Pavilion at Caesars

sponsored by

sponsor: Cyberdefense

Luncheon Keynote:

“Meet the Osborne Experts” Author Signing

13:45 - 15:00

Shoot the Messenger

Brett Moore

Cyber Jihad and the Globalization of Warfare

Peter Feaver & Kenneth Geers

You got that with GOOGLE?

Johnny Long

Detecting 0-days Attacks With Learning Intrusion Detection Systems

Stefano Zanero

Managing Hackers

James C. Foster

13:45 - 14:05

Insecure IP Storage Networks

Himanshu Dwivedi

14:15 - 14:35

Introduction to the Certification and Accreditation Process (C&A) Within the US Government

Jeff Waldron

14:45 - 15:05

15:00 - 15:15 Break
15:15 - 16:30


Ralf Spenneberg

Nobody’s Anonymous—Tracking Spam and Covert Channels

Curtis Kret

The Anonymity Toolkit

Len Sassaman

A Comparison Buffer Overflow Prevention Implementations & Weaknesses

Peter Silberman & Richard Johnson

Cryptographic Port-Knocking

David Worth

15:15 - 15:35

Privacy: Do As I Say...Not as I Do

Sarah Gordon

15:45 - 16:05

Digital Active Self Defense

Laurent Oudot

16:15 - 16:35

16:30 - 16:45
Coffee Service: Fourth Floor Palace Tower Promenade

sponsored by

sponsor: Configuresoft
16:45 - 18:00

Blind SQL Injection Automation Techniques

Cameron Hotchkies

The Evolution of Incident Response

Kevin Mandia

Tracking Prey in the Cyberforest

Bruce Potter & Brian Wotring

Acting in Milliseconds-Why Defense Processes Need to Change

Dominique Brezinski

Introduction to the Global Security Syndicate

Gregory S. Miles & Travis Schack

16:45 - 17:05

Managing MSIE Security in Corporate Networks by Creating Custom Internet Zones

Patrick Chambet

17:15 - 17:35

Press Room:

sponsor: Configuresoft




sponsor: Arbor Networks


sponsor: Citadel
Note that this schedule is subject to change.

Wireless internet access is available during the show. Bring your 802.11b cards!

Attendees must wear badges at all times in the conference areas.
Badges and/or conference proceedings that are lost or reported stolen will incur a $500 replacement fee.
All attendees must be 18 years of age or older to be on the conference floor.

Have a question about your registration, or the conference in general? Try our FAQ.

Black Hat Logo
(c) 1996-2007 Black Hat