Security/BlackHat 2012: Difference between revisions

Jump to navigation Jump to search
Line 12: Line 12:
''July 25''
''July 25''


* 10:15 [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Ridley Advanced ARM Exploitation] (Palace I) - ''kang''
* 10:15  
* 10:15 [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Amit SexyDefense - Maximizing the home-field advantage] (Palace II) - ''joes''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Ridley Advanced ARM Exploitation] (Palace I) - ''kang''
* 10:15 WORKSHOP: Advanced Chrome Extension- Leveraging API Powers for The Better Evil   https://www.blackhat.com/html/bh-us-12/schedule/briefings-25.html ''Who is attending, if anyone? Name here'' For Gaia/WebAPI folks some attacks on Chrome extensions that may
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Amit SexyDefense - Maximizing the home-field advantage] (Palace II) - ''joes''
* WORKSHOP: Advanced Chrome Extension- Leveraging API Powers for The Better Evil ''Who is attending, if anyone? Name here'' For Gaia/WebAPI folks some attacks on Chrome extensions that may
have relevance to types of attacks we face on apps.
have relevance to types of attacks we face on apps.


 
11:45
* 11:45
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Rohlf Google Native Client - Analysis Of A Secure Browser Plugin Sandbox] -''Who is attending, if anyone? Name here''  
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Rohlf Google Native Client - Analysis Of A Secure Browser Plugin Sandbox] -''Who is attending, if anyone? Name here''  
For the B2G folks there are a couple that might help us with our
For the B2G folks there are a couple that might help us with our
phone designs. If nothing else they may inform our testing.
phone designs. If nothing else they may inform our testing.
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Argyroudis Exploiting the jemalloc Memory Allocator: Owning Firefox's Heap] -''Who is attending, if anyone? Name here''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Argyroudis Exploiting the jemalloc Memory Allocator: Owning Firefox's Heap] -''Who is attending, if anyone? Name here''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Weinmann "Scaling Up Baseband Attacks: More (Unexpected) Attack Surface"] -''Who is attending, if anyone? Name here''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Weinmann "Scaling Up Baseband Attacks: More (Unexpected) Attack Surface"] -''Who is attending, if anyone? Name here''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Kaminsky BlackOps] - ''joes''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Mortman The Defense RESTs: Automation and APIs for Improving Security] (Palace II) - ''kang''


* 2:15
* 2:15
Confirmed users
58

edits

Navigation menu