Black Hat DC 2010 //Schedule

Hyatt Regency Crystal City • Jan 31 - Feb 3


day one /DC2010( FEB 2 )

0900 - 0950 + keynote speaker: gregory schaffer, dhs // regency ballroom e+f
TRACK »

//Application Security

//The Big Picture //Hardware
LOCATION » Ballroom Level
Regency Ballroom C+D
Ballroom Level
Rgency Ballroom E
Ballroom Level
Regency Ballroom F
0950 - 1000 + break
1000 - 1115 Chema Alonso & Jose Palazon:
Connnection String Parameter Pollution Attacks
Andrew Fried, Ben Butler & Richard Cox:
Whose Internet is it, Anyway?
Christopher Tarnovsky:
Deconstructing a 'Secure' Processor
1115 - 1130 + coffee service
1130 - 1245 Mike Bailey:
Neat, New, and Ridiculous Flash Hacks
Nicholas J. Percoco:
Global Security Report 2010
Joe Grand:
Hardware is the New Software
1245 - 1345 + lunch in independence center b
1345 - 1500 Christian Kendi:
Enhancing ZFS
Kevin Stevens:
The Underground Economy of the Pay-Per-Install (PPI) Business
Leonardo Nve:
Playing in a Satellite Environment 1.2
1500 - 1515 + break
1515 - 1630 David Litchfield:
Hacking Oracle 11g
William Shane Powell:
Cyber Effects Prediction
Joshua Marpet:
Physical Security in a Networked World: Video Analytics, Video Surveillance, and You
1630 - 1645 + coffee service
1645 - 1800 Qing Wang:
MS Office Document War: Parse Deeply, Fuzz Widely, Shoot Precisely and Measured Scientifically
Joseph Menn:
Hacking Russia: Inside an unprecedented prosecution of organized cybercrime
Deviant Ollam:
The Four Types of Locks
1800 - 1930 + reception // independence hall

day two /DC2010( FEB 3 )


TRACK» //Application Security //Forensics and Privacy //Metasploit
LOCATION » Ballroom Level
Regency Ballroom C+D
Ballroom Level
Rgency Ballroom E
Ballroom Level
Regency Ballroom F
0900 - 0950 David Byrne & Rohini Sulatyki:
Beware of Serialized GUI Objects Bearing Data
Bill Blunden:
An Uninvited Guest (Who Won’t Go Home)
Mike Kershaw:
Wireless security isn't dead; Attacking clients with MSF
0950 - 1000 + break
1000 - 1115 Elie Bursztein
& Jean-Michel Picod:

Reversing DPAPI and Stealing Windows Secrets Offline
Tom Cross:
Exploiting Lawful Intercept to Wiretap the Internet
bannedit:
Advanced Command Injection Exploitation: cmd.exe in the '00s
1115 - 1130 + coffee service
1130 - 1245 Vincenzo Iozzo:
0-Knowledge Fuzzing
Matthieu Suiche:
Advanced Mac OS X Physical Memory Analysis
Egypt:
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
1245 - 1345 + lunch in independence center b
1345 - 1500 Bryan Sullivan:
Agile Security; or, How to Defend Applications with Five-Day-Long Release Cycles
Jason Ross:
Malware Analysis for the Enterprise
Colin Ames & David Kerb:
Neurosurgery With Meterpreter
1500 - 1515 + break
1515 - 1630 Jorge Luis Alvarez Medina:
Internet Explorer turns your personal computer into a public file server
Stefano Zanero & Paolo Milani Comparetti:
The WOMBAT API: querying a global network of advanced honeypots
Val Smith & Chris:
Why Black Hats Always Win
1630 - 1645 + coffee service
1645 - 1800 Dionysus Blazakis:
Interpreter Exploitation: Pointer Inference and JIT Spraying
Nicolas Seriot:
iPhone privacy
HD Moore:
Metasploit and Money