Top Talks @ Black Hat Conference USA 2018: Your Complete Guide
Our editorial team has handpicked some great talks from Black Hat Conference - one of the largest IT Security Conference in the world.
Black Hat - built by and for the global InfoSec community - returns to Las Vegas for its 21st year providing attendees with the very latest in research, development and trends. This six day event begins with four days of intense technical training for security practitioners of all levels (August 4-7) followed by the two-day main conference featuring Briefings, Business Hall, Arsenal, and more (August 8-9). (Source: Black Hat Conference USA 2018)
The Index below will help you navigate on this page. Each link will take you to the individual presentations. We have marked some particular slide number from each presentation which are particularly interesting. So, here's your shortcut to a full conference!
Index: Top Talks Handpicked by CISO Platform Editorial Team
(Click on the sections below to go directly to respective sections)
1) Top 5 'Applied Security' talks from Black Hat Conference 2018 (USA)
- Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths....Go To Presentation
- Detecting Credential Compromise in AWS....Go To Presentation
- A Tangled Curl: Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme....Go To Presentation
- ARTist - A Novel Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware....Go To Presentation
- Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina....Go To Presentation
2) Top 4 'Data Forensics/Incident Response' talks from Black Hat Conference 2018 (USA)
- Detecting Credential Compromise in AWS....Go To Presentation
- Dissecting Non-Malicious Artifacts: One IP at a Time....Go To Presentation
- Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure....Go To Presentation
- Money-rity Report: Using Intelligence to Predict the Next Payment Card Fraud Victims....Go To Presentation
3) Top 3 'Web Application Security' Talks From Black Hat Conference 2018 (USA)
- Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparent Session Hijacking....Go To Presentation
- WebAssembly: A New World of Native Exploits on the Browser....Go To Presentation
- Automated Discovery of Deserialization Gadget Chains....Go To Presentation
4) Top 8 'Network Defense' Talks From Black Hat Conference 2018 (USA)
- Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparent Session Hijacking....Go To Presentation
- Every ROSE has its Thorn: The Dark Art of Remote Online Social Engineering....Go To Presentation
- From Workstation to Domain Admin: Why Secure Administration isn't Secure and How to Fix it....Go To Presentation
- LTE Network Automation Under Threat....Go To Presentation
- Open Sesame: Picking Locks with Cortana....Go To Presentation
- Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure....Go To Presentation
- Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform Capabilities....Go To Presentation
- The Finest Penetration Testing Framework for Software-Defined Networks....Go To Presentation
5) Top 7 'Internet of Things' Talks From Black Hat Conference 2018 (USA)
- Back to the Future: A Radical Insecure Design of KVM on ARM....Go To Presentation
- Snooping on Cellular Gateways and Their Critical Role in ICS....Go To Presentation
- Your Voice is My Passport....Go To Presentation
- Outsmarting the Smart City....Go To Presentation
- Legal Liability for IOT Cybersecurity Vulnerabilities....Go To Presentation
- IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies....Go To Presentation
- Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars....Go To Presentation
6) Top 4 'Security Development Lifecycle' Talks From Black Hat Conference 2018 (USA)
- Threat Modeling in 2018: Attacks, Impacts and Other Updates....Go To Presentation
- Stop that Release, There's a Vulnerability!....Go To Presentation
- AI & ML in Cyber Security - Why Algorithms are Dangerous....Go To Presentation
- Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina....Go To Presentation
7) Top 7 'Enterprise Security' Talks From Black Hat Conference 2018 (USA)
- Remotely Attacking System Firmware....Go To Presentation
- An Attacker Looks at Docker: Approaching Multi-Container Applications....Go To Presentation
- From Workstation to Domain Admin: Why Secure Administration isn't Secure and How to Fix it....Go To Presentation
- Open Sesame: Picking Locks with Cortana....Go To Presentation
- Money-rity Report: Using Intelligence to Predict the Next Payment Card Fraud Victims....Go To Presentation
- Stop that Release, There's a Vulnerability!....Go To Presentation
- A Deep Dive into macOS MDM (and How it can be Compromised)....Go To Presentation
8) Top 9 'Malware' Talks From Black Hat Conference 2018 (USA)
- Dissecting Non-Malicious Artifacts: One IP at a Time....Go To Presentation
- Finding Xori: Malware Analysis Triage with Automated Disassembly....Go To Presentation
- Measuring the Speed of the Red Queen's Race; Adaption and Evasion in Malware....Go To Presentation
- Miasm: Reverse Engineering Framework....Go To Presentation
- Kernel Mode Threats and Practical Defenses....Go To Presentation
- Stealth Mango and the Prevalence of Mobile Surveillanceware....Go To Presentation
- Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks....Go To Presentation
- IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies....Go To Presentation
- DeepLocker - Concealing Targeted Attacks with AI Locksmithing....Go To Presentation
9) Top 5 'Cryptography' Talks From Black Hat Conference 2018 (USA)
- Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths....Go To Presentation
- Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers....Go To Presentation
- A Tangled Curl: Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme....Go To Presentation
- Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels....Go To Presentation
- Lowering the Bar: Deep Learning for Side Channel Analysis....Go To Presentation
10) Top 6 'Mobile Security' Talks From Black Hat Conference 2018 (USA)
- KeenLab iOS Jailbreak Internals: Userland Read-Only Memory can be Dangerous....Go To Presentation
- LTE Network Automation Under Threat....Go To Presentation
- Back to the Future: A Radical Insecure Design of KVM on ARM....Go To Presentation
- ARTist - A Novel Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware....Go To Presentation
- Stealth Mango and the Prevalence of Mobile Surveillanceware....Go To Presentation
- Exploitation of a Modern Smartphone Baseband....Go To Presentation
11) Top 5 'Hardware/Embedded' Talks From Black Hat Conference 2018 (USA)
- Software Attacks on Hardware Wallets....Go To Presentation
- TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of Industrial Control Systems, Forever....Go To Presentation
- Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers....Go To Presentation
- GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs....Go To Presentation
- Wrangling with the Ghost: An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities....Go To Presentation
12) Top 8 'Platform Security' Talks From Black Hat Conference 2018 (USA)
- Remotely Attacking System Firmware....Go To Presentation
- An Attacker Looks at Docker: Approaching Multi-Container Applications....Go To Presentation
- The Problems and Promise of WebAssembly....Go To Presentation
- A Deep Dive into macOS MDM (and How it can be Compromised)....Go To Presentation
- Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform Capabilities....Go To Presentation
- GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs....Go To Presentation
- WebAssembly: A New World of Native Exploits on the Browser....Go To Presentation
- Wrangling with the Ghost: An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities....Go To Presentation
13) Top 7 'Exploit Development' Talks From Black Hat Conference 2018 (USA)
- KeenLab iOS Jailbreak Internals: Userland Read-Only Memory can be Dangerous....Go To Presentation
- The Problems and Promise of WebAssembly....Go To Presentation
- Automated Discovery of Deserialization Gadget Chains....Go To Presentation
- Exploitation of a Modern Smartphone Baseband....Go To Presentation
- From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities....Go To Presentation
- DeepLocker - Concealing Targeted Attacks with AI Locksmithing....Go To Presentation
- Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars....Go To Presentation
14) Top 2 'Reverse Engineering' Talks From Black Hat Conference 2018 (USA)
- Finding Xori: Malware Analysis Triage with Automated Disassembly....Go To Presentation
- Miasm: Reverse Engineering Framework....Go To Presentation
Pre Register For SACON - India's First Security Architecture Conference
Join 100+ CISOs and 200+ IT Security Professionals at an exclusive security architecture conference in the Silicon Valley Of India - Bangalore, in February, 2019. Pre-Register and get special discount access and talk highlights.
Comments