Black Hat Digital Self Defense USA 2005

Black Hat Federal 2006

Black Hat Federal 2006 Call for Papers Black Hat Federal 2006 Briefings Speakers Black Hat Federal 2006 Briefings Schedule Black Hat Federal 2006 Sponsors Black Hat Federal 2006 Training Black Hat Federal 2006 Hotel & Venue Black Hat Registration
Black Hat Briefings Registration Hours
Wednesday, Jan 25, 08:00 - 12:00
Thursday, Jan 26, 08:00 - 12:00
details
24 January 2006 • Informal gathering at 18:00. Gather at the Hotel Bar.
This is a great time to meet and network with friends, colleagues and the speakers.
Day 1 • 25 January 2006
08:00 - 08:50
Registration and Continental Breakfast

sponsored by


sponsor: Configuresoft

08:50 - 09:00 Introduction, Jeff Moss
09:00 - 09:50

Keynote: Security Research and Vulnerability Disclosure
Dr. Linton Wells II, Principal Deputy Assistant Secretary of Defense (Networks and Information Integration)

Crystal Ballroom A

09:50 - 10:00 Break
Track 1 Track 2
Location & Times

Crystal Ballroom A

Crystal Ballroom B

10:00 - 11:00

Finding Digital Evidence in Physical Memory

Mariusz Burdach

Breakable

David Litchfield

11:00 - 11:15
Coffee Service

sponsored by


sponsor: Qualys

11:15 - 12:30

Implementing and Detecting An ACPI BIOS Rootkit

John Heasman

Pentesting J2EE

Marc Schoenefeld

12:30 - 13:45

Lunch: Crystal Ballroom C

13:45 - 15:00

Rootkit Hunting vs. Compromise Detection

Joanna Rutkowska

Combatting Symbian Malware

Jarno Niemelä

15:00 - 15:15 Break
15:15 - 16:30

New Directions in Disk Forensics

Simson L. Garfinkel

Client Side Penetration Testing

Max Caceres

16:30 - 16:45
Coffee Service: Fourth Floor Palace Tower Promenade

sponsored by


sponsor: intelli7

16:45 - 18:00

FragFS: An Advanced NTFS Data Hiding Technique

Irby Thompson & Mathew Monroe

Beyond EIP

spoonm & skape

18:00 - 20:00
Hosted Reception: Eat, Drink, Network and be Merry!
Reception will be held at the Sheraton Crystal City

sponsored by


sponsor: debix

Day 2 • 26 January 2006
08:00 - 09:00
Registration and Continental Breakfast

sponsored by


sponsor: Core Security

Track 1 Track 2
Location & Times

Crystal Ballroom A

Crystal Ballroom B

09:00 - 09:50

The Era of a Zero-Day Nation-State: Characterising the real threats to our nation’s critical information systems

Tom Parker & Matthew G. Devost

Analysis of Adversarial Code: Problem, Challenges, Results

Arun Lakhotia

09:50 - 10:00

Break

10:00 - 11:15

Foreign Attacks on Corporate America  (How the Federal Government can apply lessons learned from the private sector)

Kevin Mandia

Angel Recon System (ARS) Prototype: Heuristic Vulnerability Analysis and Attack

Drew Copley

11:15 - 11:30
Coffee Service

sponsored by


sponsor: StillSecure

11:30 - 12:45

Playing Server Hide and Seek on the Tor Anonymity Network

Paul Syverson & Lasse Øverlier

Analysis of Web Application Worms and Viruses

Billy Hoffman

12:45 - 13:45

Lunch: Crystal Ballroom C

13:45 - 15:00

Network Black Ops: Extracting Unexpected Functionality from Existing Networks

Dan Kaminsky

My IDS is better than yours. Or is it?

Stefano Zanero

15:00 - 15:15 Break
15:15 - 16:30

How to Automatically Sandbox IIS With Zero False Positive and Negative

Tzi-cker Chiueh

Attacks on Uninitialized Local Variables

Halvar Flake

16:30 - 16:45
Coffee Service

sponsored by


sponsor: Configuresoft

16:45 - 18:00

SCADA Security and Terrorism: We're Not Crying Wolf!

David Maynor & Robert Graham

Nematodes

David Aitel

Note that this schedule is subject to change.

Attendees must wear badges at all times in the conference areas.
Badges and/or conference proceedings that are lost or reported stolen will incur a $500 replacement fee.

All attendees must be 18 years of age or older to be on the conference floor.

Black Hat Logo
(c) 1996-2007 Black Hat