Final Batch of Black Hat Europe 2017 Briefings Released

Black Hat Staff, Contributor

October 17, 2017

2 Min Read

After receiving a record number of submissions, 40 Briefings have been selected for presentation at Black Hat Europe 2017! Below are a few of the most recently announced Briefings, with links to their abstracts.

For a complete list of ALL Briefings selected to date, and to search by specific tracks, click here.

Attacking NextGen Roaming Networks

by Hendrik Schmidt and Daniel Mende

Breaking Bad: Stealing Patient Data Through Medical Devices

by Saurabh Harit

Breaking Out HSTS (and HPKP) on Firefox, IE/Edge and (possibly) Chrome

by Sheila Berta and Sergio De Los Santos

CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management

by Adrian Tang, Simha Sethumadhavan and Salvatore Stolfo

DIFUZZing Linux Kernel Drivers

by Aravind Machiry, Chris Salls, Yan Shoshitaishvili, Shuang Hao, and Jake Corina

GDPR and third party JS - can it be done?

by Avital Grushcovski

Hiding Pin's Artifacts to Defeat Evasive Malware

by Mario Polino, Andrea Continella, Sebastiano Mariani, Lorenzo Fontana, Stefano D'Alessio, Fabio Gritti and Stefano Zanero

How to Rob a Bank Over the Phone - Lessons Learned and Real Audio from an Actual Social Engineering Engagement

by Joshua Crumbaugh

Intel ME: Flash File System Explained

by Dmitry Sklyarov

Red Team Techniques for Evading, Bypassing, and Disabling MS Advanced Threat Protection and Advanced Threat Analytics

by Chris Thompson

The Apple of Your EFI: An Updated Analysis of the State of Apple's EFI Security Support

by Rich Smith and Pepijn Bruienne

A Process is No One: Hunting for Token Manipulation

by Jared Atkinson and Robby Winchester

Becoming You: A Glimpse into Credential Abuse

by Sonia Burney and Brent Maynard

Exposing Hidden Exploitable Behaviors in Programming Languages Using Differential Fuzzing

by Fernando Arnaboldi

Inside Android's SafetyNet Attestation

by John Kozyrakis and Collin Mulliner

Jailbreaking Apple Watch

by Max Bazaliy

Lost in Transaction: Process Doppelgänging

by Tal Liberman and Eugene Kogan

Passive Fingerprinting of HTTP/2 Clients

by Elad Shuster and Ory Segal

Self-Verifying Authentication – Bug-Free Integrations for All SSO Services

by Shuo Chen

Ro(o)tten Apples: Vulnerability Heaven in the iOS Sandbox

by Adam Donenfeld

The Great Escapes of VMWare: A Retrospective Case Study of VMWare G2H Escape Vulnerabilities

by Debasish Mandal and Yakun Zhang

Don't miss your chance to stay up-to-date on the latest security developments and technologies when Black Hat Europe returns to London, December 4-7, 2017. Lock in your Briefings pass today.

About the Author(s)

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights