Confirmed users
58
edits
Jstevensen (talk | contribs) |
Jstevensen (talk | contribs) |
||
| Line 12: | Line 12: | ||
''July 25'' | ''July 25'' | ||
10:15 | |||
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Ridley Advanced ARM Exploitation] (Palace I) - ''kang'' | * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Ridley Advanced ARM Exploitation] (Palace I) - ''kang'' | ||
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Amit SexyDefense - Maximizing the home-field advantage] (Palace II) - ''joes'' | * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Amit SexyDefense - Maximizing the home-field advantage] (Palace II) - ''joes'' | ||
| Line 27: | Line 27: | ||
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Mortman The Defense RESTs: Automation and APIs for Improving Security] (Palace II) - ''kang'' | * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Mortman The Defense RESTs: Automation and APIs for Improving Security] (Palace II) - ''kang'' | ||
14:15 | |||
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Miller "Don't Stand So Close To Me: An Analysis of the NFC Attack Surface"] -''Who is attending, if anyone? Name here'' | * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Miller "Don't Stand So Close To Me: An Analysis of the NFC Attack Surface"] -''Who is attending, if anyone? Name here'' | ||
Defeating ASLR through info leaks, and how to cause them. | Defeating ASLR through info leaks, and how to cause them. | ||
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Serna "The Info Leak Era on Software Exploitation"] (an example of one he wrote up on Flash is http://seclists.org/bugtraq/2012/Apr/63 ) -''Who is attending, if anyone? Name here'' | * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Serna "The Info Leak Era on Software Exploitation"] (an example of one he wrote up on Flash is http://seclists.org/bugtraq/2012/Apr/63 ) -''Who is attending, if anyone? Name here'' | ||
15:30 | |||
* For the privacy geeks -- decloaking "private browsing" among other | * For the privacy geeks -- decloaking "private browsing" among other | ||
ways to track people. [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Fleischer "Web Tracking for You"] | ways to track people. [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Fleischer "Web Tracking for You"] | ||
* A wildcard... Math.random() isn't crytographically secure, could we be vulnerable to anything like these PHP issues? If you go bringyour open mind and wear your brainstorming hat. * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Argyros "PRNG: Pwning Random Number Generators (in PHP applications)"] | * A wildcard... Math.random() isn't crytographically secure, could we be vulnerable to anything like these PHP issues? If you go bringyour open mind and wear your brainstorming hat. * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Argyros "PRNG: Pwning Random Number Generators (in PHP applications)"] | ||
17:00 | |||
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Alonso Owning bad guys and mafia with javascript botnets] - who doesn't love a botnet that uses javascript? | * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Alonso Owning bad guys and mafia with javascript botnets] - who doesn't love a botnet that uses javascript? | ||
* New defensive features of Win8 we should consider using. Some may be | * New defensive features of Win8 we should consider using. Some may be | ||