Black Hat Europe 2010 //Schedule

Barcelona, Spain • Apr 12 - 15


day one /EUR2010( APR 14 )

0900 - 0950 + keynote speaker: max kelly - cso facebook
palau de congressos de catalunya h3+j
TRACK »

//Big Picture

//Application Security

//Hardware

LOCATION » Palau de Congressos de Catalunya
H3+J
Palau de Congressos de Catalunya
H2
Palau de Congressos de Catalunya
H1
0950 - 1000 + break
1000 - 1115 Iftach Ian Amit:
Cyber[Crime|War] charting dangerous waters
FX:
Defending the Poor
Joe Grand:
Hardware is the New Software
1115 - 1130 + coffee service
1130 - 1245 Roelof Temmingh:
Unveiling Maltego 3.0
Julien Tinnes & Chris Evans
Security in depth for Linux software
Christopher Tarnovsky:
Hacking the Smartcard Chip
1245 - 1345 + lunch // hotel rey juan carlos - jardin room
1345 - 1500 Stephan Chenette:
Fireshark - A tool to Link the Malicious Web
Paul Stone:
Next Generation Clickjacking
Raoul D'Costa:
Verifying eMRTD Security Controls
1500 - 1515 + break
1515 - 1630 Kyle Yang:
Protocol, Mechanism and Encryption of Pushdo/Cutwail/Webwail Botnet
Mariano Nuñez Di Croce:
SAP Backdoors: A ghost at the heart of your business
James Arlen:
SCADA and ICS for Security Experts: How to avoid being a Cyber Idiot
1630 - 1645 + coffee service
1645 - 1800 Peter Silberman & Ero Carrera:
State Of Malware: Family Ties
Manish Saindane:
Attacking JAVA Serialized Communication
Enno Rey & Daniel Mende
Hacking Cisco Enterprise WLANs
1800 - 1930 + reception // palau de congressos de catalunya - hall 1

day two /EUR2010( APR 15 )


TRACK»

//Exploit

//Application Security

//Forensics / Privacy

LOCATION » Hotel Rey Juan Carlos
Mare Nostrum A+B
Hotel Rey Juan Carlos
Mare Nostrum C
Hotel Rey Juan Carlos
Mare Nostrum D
1000 - 1115 Patroklos Argyroudis:
Binding the Daemon: FreeBSD Kernel Stack and Heap Exploitation
Thai Duong & Juliano Rizzo:
Practical Crypto Attacks Against Web Applications
Andre Adelsbach:
Misusing Wireless ISPs for Anonymous Communication
1115 - 1130 + coffee service
1130 - 1245 Haifei Li & Guillaume Lovet:
Accepting Adobe Reader's Custom Memory Management: a Heap of Trouble
Christian Papathanasiou:
Abusing JBoss
Mario Vuksan, Tomislav Pericin & Brian Karney:
Hiding in the Familiar: Steganography and Vulnerabilities in Popular Archives Formats.
1245 - 1345 + lunch // hotel rey juan carlos - jardin room
1345 - 1500 Steve Ocepek & Wendel G. Henrique:
Oracle, Interrupted: Stealing Sessions and Credentials
Eric Filiol:
How to operationally detect and break misuse of weak stream ciphers (and even block ciphers sometimes) - Application to the Office Encryption Cryptanalysis
Andrzej Dereszowski:
Targeted Attacks: From Being a Victim To Counter Attacking
1500 - 1515 + break
1515 - 1630 Vincenzo Iozzo:
0-knowledge Fuzzing
David Lindsay & Eduardo Vela Nava:
Universal XSS via IE8s XSS Filters
Marco Bonetti:
Surviving your phone: protecting mobile communications with Tor
1630 - 1645 + coffee service
1645 - 1800 Thanassis Giannetsos:
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks Against Sensor Networks
Moxie Marlinspike:
Changing Threats To Privacy: From TIA to Google
Christiaan Beek:
Virtual Forensics