Black Hat DC 2008 Media Archives
Black Hat DC 2008 presentations are listed alphabetically by speaker.
Birds of a Feather #1 - CyberCOPS (Not the TV series)
Ovie Carroll, Jim Christy, Andy Fried, Ken Privette, SA David Trosch
Keynote - Quest for the Holy Grail
Jerry Dixon, National Member Alliance's Vice President for Government Relations, Infragard
Birds of a Feather #2 - Cyber Commission Recommendations
Jerry Dixon, Tom Kellerman, James Andrew Lewis, Amit Yoran
Dynamic Taint Propagation: Finding Vulnerabilities Without Attacking
Brian Chess, Chief Scientist, Fortify Software
Jacob West, Manager, Security Research Group, Fortify Software
Botnet Population and Intelligence Gathering Techniques
David Dagon, Georgia Tech
Christopher Davis, Damballa
Bad Sushi - Beating Phishers at Their Own Game
Nitesh Dhanjani
Billy Rios, Microsoft
Entertainment Talk - Social Engineering
Peter Earnest
IO in the Cyber Domain, Immunity Style
Sinan Eren, VP of Research, Immunity
Biometric and Token-Based Access Control Systems
Zac Franken, Freelance Security Consultant
Threats to the 2008 Presidential Election
Oliver Friedrichs, Symantec Corporation
Developments in Cisco IOS Forensics
FX, Recurity Labs GmbH
Cracking GSM
David Hulton, Steve Pico Computing, Inc.
Hacking VoIP through IPSec Tunnels
Sachin Jogkelar, Sipera VIPER Lab
A Picture's Worth: Digital Image Analysis
Dr. Neal Krawetz, Hacker Factor Solutions
SCADA Security
Jason Larsen,IOActive, Inc.
RFIDIOts!!! -Practical RFID hacking (without soldering irons)
Adam Laurie, Freelance Security Consultant
URI Use and Abuse
Nathan McFeters, Ernst & Young, LLP
Analyzing an Unknown RF-Based Data Transmission (aka: Fun with 27Mhz wireless keyboards)
Max Moser, Dreamlab Technologies AG
(un)Smashing the Stack: Overflows, Countermeasures, and the Real World
Shawn Moyer, Agura Digital Security
Exploiting Live Virtual Machine Migration
Jon Oberheide, University of Michigan
Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools
Sheeraj Shah, Blueinfy
Security Failures in Secure Devices
Christopher Tarnovsky, Flylogic Engineering, LLC.
Preparing for the Cross Site Request Forgery Defense
Chuck Willis, Principal Consultant, MANDIANT
DTRACE: The Reverse Engineer's Unexpected Swiss Army Knife
David Weston, Science Applications International Corporation (SAIC)
Tiller Beauchamp Science Applications International Corporation (SAIC)
Classification and Detection of Application Backdoors
Chris Wysopal, CTO, Veracode