Security/BlackHat 2012: Difference between revisions

Line 15: Line 15:
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Ridley Advanced ARM Exploitation] (Palace I) - ''kang''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Ridley Advanced ARM Exploitation] (Palace I) - ''kang''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Amit SexyDefense - Maximizing the home-field advantage] (Palace II) - ''joes''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Amit SexyDefense - Maximizing the home-field advantage] (Palace II) - ''joes''
* WORKSHOP: Advanced Chrome Extension- Leveraging API Powers for The Better Evil ''Who is attending, if anyone? Name here'' For Gaia/WebAPI folks some attacks on Chrome extensions that may have relevance to types of attacks we face on apps.
* WORKSHOP: Advanced Chrome Extension- Leveraging API Powers for The Better Evil ''Who is attending, if anyone? Name here''  
 
For Gaia/WebAPI folks some attacks on Chrome extensions that may have relevance to types of attacks we face on apps.


11:45
11:45
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Rohlf Google Native Client - Analysis Of A Secure Browser Plugin Sandbox] -''Who is attending, if anyone? Name here'' For the B2G folks there are a couple that might help us with our phone designs. If nothing else they may inform our testing.
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Rohlf Google Native Client - Analysis Of A Secure Browser Plugin Sandbox] -''Al''  
 
For the B2G folks there are a couple that might help us with our phone designs. If nothing else they may inform our testing.
 
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Argyroudis Exploiting the jemalloc Memory Allocator: Owning Firefox's Heap] - ''gkw''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Argyroudis Exploiting the jemalloc Memory Allocator: Owning Firefox's Heap] - ''gkw''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Weinmann "Scaling Up Baseband Attacks: More (Unexpected) Attack Surface"] -''Who is attending, if anyone? Name here''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Weinmann "Scaling Up Baseband Attacks: More (Unexpected) Attack Surface"] -''Who is attending, if anyone? Name here''
Line 29: Line 34:
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Serna "The Info Leak Era on Software Exploitation"] (an example of one he wrote up on Flash is http://seclists.org/bugtraq/2012/Apr/63 ) -''Who is attending, if anyone? Name here''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Serna "The Info Leak Era on Software Exploitation"] (an example of one he wrote up on Flash is http://seclists.org/bugtraq/2012/Apr/63 ) -''Who is attending, if anyone? Name here''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Wroblewski ModSecurity as Universal Cross-Platform Web Protection Tool] (Augustus I + II) - ''joes, kang''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Wroblewski ModSecurity as Universal Cross-Platform Web Protection Tool] (Augustus I + II) - ''joes, kang''
** [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Soler HTExploit Bypassing Htaccess Restrictions ] (Augustus I + II) - ''joes, kang''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Soler HTExploit Bypassing Htaccess Restrictions ] (Augustus I + II) - ''joes, kang''
* '''Torturing OpenSSL''' - ''Al'


15:30
15:30
canmove, Confirmed users
4,854

edits