1、#BHEU BlackHatEventsDecoding EMDecoding EM-FI Attacks:FI Attacks:Lessons Learned from Glitching Lessons Learned from Glitching the GigaDevice GD32F407the GigaDevice GD32F407Jonathan Andersson&Tha。
2、Unmasking State-Sponsored Mobile Surveillance Malware from Russia,China,and North KoreaThreat Actors,Tactics,and Defense Strategies1Kyle SchmittleAlemdar IslamogluKristina Balaam#BHEU BlackHatEventsA。
3、#BHEU BlackHatEventsParse Me Baby One More Time:Bypassing HTML Sanitizervia Parsing DifferentialsSpeaker:David Klein PhD CandidateResearch interests:Web Security Privacy Application Security1About Me。
4、#BHEU BlackHatEventsRedefining the Origin of Secrecy Redefining the Origin of Secrecy in a Postin a Post-Quantum WorldQuantum WorldSpeaker:Dr Frey Wilson,CTO Cavero Quantum#BHEU BlackHatEventsInforma。
5、#BHEU BlackHatEventsImproving SideImproving Side-Channel Channel Protections for Intel TDXProtections for Intel TDX*Scott Constable Defensive Security Researcher,Intel Labs,Intel Corporation*Nagaraju。
6、#BHEU BlackHatEventsIs Your Memory Protected?Is Your Memory Protected?Uncovering Hidden Vulnerabilities in Automotive MPUsNimrod Stoler&David Lazar#BHEU BlackHatEventsInformation Classification:G。
7、#BHEU BlackHatEventsThe Double(AI)AgentThe Double(AI)AgentSpeakers:Stav Cohen&Ben NassiContributor:Ron Bitton#BHEU BlackHatEventsInformation Classification:GeneralWhoAmIWhoAmI?Ben Ben NassiNassiR。
8、#BHEU BlackHatEventsHowHow thethe Internet Internet DodgedDodged a Bullet:The a Bullet:The KeyTrapKeyTrapDenialDenial-ofof-Service Service AttacksAttacks againstagainst DNSSECDNSSECSpeaker(s):Elias H。
9、Vulnerabilities in the eSIM download protocolPresentersAbu Shohel Ahmed,Aalto UniversityTuomas Aura,Aalto UniversityJoint work withAleksi Peltonen,CISPAMohit Sethi,Kone and Aalto UniversityWho are we。
10、#BHEU BlackHatEventsAML Injection Attackson Confidential VMsSpeaker(s):Satoru Takekoshi1,Manami Mori2,Takaaki Fukai3,Takahiro Shinagawa11 The University of Tokyo,2 Tokyo Metropolitan University,3 Nat。
11、Diving into Spooler:Discovering LPE and RCE Vulnerabilities in Windows Printer DriverZesen Ye Cyber-KunlunDr.Zhiniang Peng HUST&Cyber-KunlunWhoamiZhiniang Peng edwardzpengAssociate Professor HUST。
12、#BHEU BlackHatEventsMy other ClassLoader Is Your ClassLoaderDimitrios Valsamaras Microsoft Threat Intelligence#BHEU BlackHatEventsAbout MeAbout Me Engaged in computer security since 2002 Focus on Mob。
13、#BHEU BlackHatEventsGuest Revolution:Chaining 3Guest Revolution:Chaining 3-bugs to compromise bugs to compromise the Windows kernel from the VMware guestthe Windows kernel from the VMware guestSpeake。
14、#BHEU BlackHatEventsFrom PassFrom Pass-thethe-Hash to Code Execution Hash to Code Execution on Schneider Electric M340 PLCson Schneider Electric M340 PLCsAmir Zaltzman,Avishai Wool#BHEU BlackHatEvent。
15、Wi-Fi CallingRevealing Downgrade Attacks and Not-so-private Private KeysGabriel K.Gegenhuber,Florian Holzbauer,Philipp.Frenzel,Edgar Weippl,Adrian DabrowskiThe SpeakersGabriel GegenhuberBachelors and。
16、#BHEU BlackHatEventsInformation Classification:General#BHEU BlackHatEventsLLMBotomyLLMBotomy:Shutting The Trojan:Shutting The Trojan Backdoors Backdoors Speaker:Tams Vrs#BHEU BlackHatEventsInformatio。
17、Apple Disk-O PartyCsaba Fitzl Twitter:theevilbitwhoamiPrincipal macOS Security Researcher Kandji author of EXP-312-macOS Exploitation training()at OffSec ex red/blue teamer macOS bug hunter husband,f。
18、#BHEU BlackHatEventsExposing the dark corners of SAP4-Years of Threat Intelligence data analyzedSpeaker:Yvan Genuer#BHEU BlackHatEventsInformation Classification:General#BHEU BlackHatEventsInformatio。
19、#BHEU BlackHatEventsWhen(Remote)Shells Fall Into The Same Hole:When(Remote)Shells Fall Into The Same Hole:Rooting DrayTekRouters Before Attackers Can Do It AgainStanislav Dashevskyi,Francesco La Spin。
20、#BHEU BlackHatEventsThe Devil is in the(Micro-)Architectures:Uncovering New Side-Channel and Bit-Flip Attack Surfaces in DNN ExecutablesSpeakers:Yanzuo ChenPhD at HKUSTZhibo LiuPostdoc at HKUST#BHEU 。
21、#BHEU BlackHatEventsMind the Data Gap:Privacy Mind the Data Gap:Privacy Challenges in Autonomous AI Challenges in Autonomous AI AgentsAgentsSpeakers:Narayana Pappu,Rubens Zimbres#BHEU BlackHatEventsI。
22、#BHEU BlackHatEventsBreaking Matter:Vulnerabilities in Breaking Matter:Vulnerabilities in the Matter Protocolthe Matter ProtocolSpeaker:Bla GengeContributor:Ioan PdureanBla GENGESenior Security Resea。
23、#BHEU BlackHatEventsA Novel Attack SurfaceJava Authentication and Authorization Service(JAAS)Speakers:Ziyang Li,Jian Zhou,Ying Zhu#BHEU BlackHatEventsInformation Classification:GeneralAbout UsZiyang 。
24、#BHEU BlackHatEventsSpAIwareSpAIware&More:&More:Advanced Prompt Injection ExploitsAdvanced Prompt Injection ExploitsJohann RehbergerRed Team DWhat is 1+1?CongratulationsYou are HUMAN!Who am I。
25、#BHEU BlackHatEventsUnveiling the Power of Intune:Unveiling the Power of Intune:Leveraging Intune for Breaking Into Your Cloud and OnLeveraging Intune for Breaking Into Your Cloud and On-PremisePremi。
26、#BHEU BlackHatEventsCodeCloak:A DRL-Based Method for Mitigating Code Leakage by LLM Code AssistantsSpeaker:Amit Finkman#BHEU BlackHatEventsInformation Classification:Generalhttps:/arxiv.org/pdf/2404.。
27、Security analysis of Residential Gateways and ISPs Global network domination is(sneakily)possibleTa-Lun YenSenior Vulnerability Researcher,TXOne Research#BHEU BlackHatEventsInformation Classification。
28、BestFitUnveiling Hidden Transformers in Windows ANSI!Orange Tsai Splitline HuangWorstorstOne Day,I Hacked into a BankMade-up story;)$14.50 SET balance=$8$8 DEVCOREDEVCORE Research TeamOrange TsaiSpli。
29、#BHEU BlackHatEventsInformation Classification:GeneralOperation MIDASTracking Fraudulent Financial Program OrganizationsSung-Wook JangYong-Hyun Kim(copy_and_paster)Financial Security Institute#BHEU B。
30、Blast-RADIUSBreaking Enterprise Network AuthenticationSharon Goldberg1,Miro Haller2,Nadia Heninger2,Mike Milano3,Dan Shumow4,Marc Stevens5,Adam Suhl21Cloudflare,2UC San Diego,3BastionZero,4Microsoft 。
31、#BHEU BlackHatEventsHeartbeat Havoc:Unveiling Remote Vulnerabilities in Heartbeat Havoc:Unveiling Remote Vulnerabilities in Windows Network Load Balancing Windows Network Load Balancing RyeLv(b2ahex)。
32、#BHEU BlackHatEventsSysBumps:Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple SiliconSpeaker:Hyerean Jang$WhoamiHyerean JangPh.D Student Korea University Email:h。
33、#BHEU BlackHatEventsThe CVSS Deception:How Weve Been Misled on Vulnerability SeveritySpeaker(s):Syed Islam&Ankur Sand#BHEU BlackHatEventsAgenda Introduction Vulnerability Management&CVSS Six 。