canmove, Confirmed users
4,854
edits
Line 15: | Line 15: | ||
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Ridley Advanced ARM Exploitation] (Palace I) - ''kang'' | * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Ridley Advanced ARM Exploitation] (Palace I) - ''kang'' | ||
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Amit SexyDefense - Maximizing the home-field advantage] (Palace II) - ''joes'' | * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Amit SexyDefense - Maximizing the home-field advantage] (Palace II) - ''joes'' | ||
* WORKSHOP: Advanced Chrome Extension- Leveraging API Powers for The Better Evil ''Who is attending, if anyone? Name here'' For Gaia/WebAPI folks some attacks on Chrome extensions that may have relevance to types of attacks we face on apps. | * WORKSHOP: Advanced Chrome Extension- Leveraging API Powers for The Better Evil ''Who is attending, if anyone? Name here'' | ||
For Gaia/WebAPI folks some attacks on Chrome extensions that may have relevance to types of attacks we face on apps. | |||
11:45 | 11:45 | ||
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Rohlf Google Native Client - Analysis Of A Secure Browser Plugin Sandbox] -'' | * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Rohlf Google Native Client - Analysis Of A Secure Browser Plugin Sandbox] -''Al'' | ||
For the B2G folks there are a couple that might help us with our phone designs. If nothing else they may inform our testing. | |||
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Argyroudis Exploiting the jemalloc Memory Allocator: Owning Firefox's Heap] - ''gkw'' | * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Argyroudis Exploiting the jemalloc Memory Allocator: Owning Firefox's Heap] - ''gkw'' | ||
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Weinmann "Scaling Up Baseband Attacks: More (Unexpected) Attack Surface"] -''Who is attending, if anyone? Name here'' | * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Weinmann "Scaling Up Baseband Attacks: More (Unexpected) Attack Surface"] -''Who is attending, if anyone? Name here'' | ||
Line 29: | Line 34: | ||
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Serna "The Info Leak Era on Software Exploitation"] (an example of one he wrote up on Flash is http://seclists.org/bugtraq/2012/Apr/63 ) -''Who is attending, if anyone? Name here'' | * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Serna "The Info Leak Era on Software Exploitation"] (an example of one he wrote up on Flash is http://seclists.org/bugtraq/2012/Apr/63 ) -''Who is attending, if anyone? Name here'' | ||
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Wroblewski ModSecurity as Universal Cross-Platform Web Protection Tool] (Augustus I + II) - ''joes, kang'' | * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Wroblewski ModSecurity as Universal Cross-Platform Web Protection Tool] (Augustus I + II) - ''joes, kang'' | ||
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Soler HTExploit Bypassing Htaccess Restrictions ] (Augustus I + II) - ''joes, kang'' | |||
* '''Torturing OpenSSL''' - ''Al' | |||
15:30 | 15:30 |