blackhat.com
Open in
urlscan Pro
2606:4700::6811:b385
Public Scan
Submitted URL: https://blackhat.com/us-24/briefings/schedule/#ovpnx–
Effective URL: https://blackhat.com/us-24/briefings/schedule/
Submission: On November 15 via api from RU — Scanned from CA
Effective URL: https://blackhat.com/us-24/briefings/schedule/
Submission: On November 15 via api from RU — Scanned from CA
Form analysis
1 forms found in the DOM<form class="filter_wrapper">
<div class="filters_wrapper" id="filters_wrapper">
<div class="session_type_wrapper">
<h3 id="filter_session_type" class="filter_header_background_shown filter_header">Session Type(s)</h3>
<div class="session_type_list">
<div class="select_clear_all_link"><a onclick="select_all_filter('session_type'); return false;" href="javascript:;" data-feathr-click-track="true" data-feathr-link-aids="65414312709dc1f319b80018">Select All</a> |
<a onclick="clear_all_filter('session_type'); return false;" href="javascript:;" data-feathr-click-track="true" data-feathr-link-aids="65414312709dc1f319b80018">Clear</a> </div>
<ul>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="session_type_18_checkbox" id="session_type_18_checkbox" class="session_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="session_type_18_checkbox" id="label_session_type_18" class="session_type_checkbox_label" href="#session/briefings">
<div class="session_type_icon briefings_icon"></div> <span>Briefings</span>
</label> </div>
<div class="clear"></div>
</li>
</ul>
</div>
</div>
<div class="format_type_wrapper">
<h3 id="filter_format_type" class="filter_header_background_shown filter_header">Format(s)</h3>
<div class="format_type_list">
<div class="select_clear_all_link"><a onclick="select_all_filter('format_type'); return false;" href="javascript:;" data-feathr-click-track="true" data-feathr-link-aids="65414312709dc1f319b80018">Select All</a> |
<a onclick="clear_all_filter('format_type'); return false;" href="javascript:;" data-feathr-click-track="true" data-feathr-link-aids="65414312709dc1f319b80018">Clear</a> </div>
<ul>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="format_type_6-203_checkbox" id="format_type_6-203_checkbox" class="format_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="format_type_6-203_checkbox" id="label_format_type_6-203" class="format_type_checkbox_label" href="#format/-minute-keynote">
<div class="format_type_icon -minute-keynote_icon"></div> <span>25-Minute Keynote</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="format_type_439-3_checkbox" id="format_type_439-3_checkbox" class="format_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="format_type_439-3_checkbox" id="label_format_type_439-3" class="format_type_checkbox_label" href="#format/-minute-briefings">
<div class="format_type_icon -minute-briefings_icon"></div> <span>30-Minute Briefings</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="format_type_439-419_checkbox" id="format_type_439-419_checkbox" class="format_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="format_type_439-419_checkbox" id="label_format_type_439-419" class="format_type_checkbox_label" href="#format/-minute-briefings">
<div class="format_type_icon -minute-briefings_icon"></div> <span>40-Minute Briefings</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="format_type_6-419_checkbox" id="format_type_6-419_checkbox" class="format_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="format_type_6-419_checkbox" id="label_format_type_6-419" class="format_type_checkbox_label" href="#format/-minute-keynote">
<div class="format_type_icon -minute-keynote_icon"></div> <span>40-Minute Keynote</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="format_type_6-5_checkbox" id="format_type_6-5_checkbox" class="format_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="format_type_6-5_checkbox" id="label_format_type_6-5" class="format_type_checkbox_label" href="#format/-minute-keynote">
<div class="format_type_icon -minute-keynote_icon"></div> <span>60-Minute Keynote</span>
</label> </div>
<div class="clear"></div>
</li>
</ul>
</div>
</div>
<div class="track_type_wrapper">
<h3 id="filter_track_type" class="filter_header_background_shown filter_header">Track(s)</h3>
<div class="track_type_list">
<div class="select_clear_all_link"><a onclick="select_all_filter('track_type'); return false;" href="javascript:;" data-feathr-click-track="true" data-feathr-link-aids="65414312709dc1f319b80018">Select All</a> |
<a onclick="clear_all_filter('track_type'); return false;" href="javascript:;" data-feathr-click-track="true" data-feathr-link-aids="65414312709dc1f319b80018">Clear</a> </div>
<ul>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1879_checkbox" id="track_type_1879_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1879_checkbox" id="label_track_type_1879" class="track_type_checkbox_label" href="#track/ai-ml--data-science">
<div class="track_type_icon ai-ml--data-science_icon"></div> <span>AI, ML, & Data Science</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1911_checkbox" id="track_type_1911_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1911_checkbox" id="label_track_type_1911" class="track_type_checkbox_label" href="#track/application-security-defense">
<div class="track_type_icon application-security-defense_icon"></div> <span>Application Security: Defense</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1912_checkbox" id="track_type_1912_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1912_checkbox" id="label_track_type_1912" class="track_type_checkbox_label" href="#track/application-security-offense">
<div class="track_type_icon application-security-offense_icon"></div> <span>Application Security: Offense</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1832_checkbox" id="track_type_1832_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1832_checkbox" id="label_track_type_1832" class="track_type_checkbox_label" href="#track/cloud-security">
<div class="track_type_icon cloud-security_icon"></div> <span>Cloud Security</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1896_checkbox" id="track_type_1896_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1896_checkbox" id="label_track_type_1896" class="track_type_checkbox_label" href="#track/community--career">
<div class="track_type_icon community--career_icon"></div> <span>Community & Career</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1768_checkbox" id="track_type_1768_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1768_checkbox" id="label_track_type_1768" class="track_type_checkbox_label" href="#track/cryptography">
<div class="track_type_icon cryptography_icon"></div> <span>Cryptography</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1867_checkbox" id="track_type_1867_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1867_checkbox" id="label_track_type_1867" class="track_type_checkbox_label" href="#track/cyber-insurance">
<div class="track_type_icon cyber-insurance_icon"></div> <span>Cyber Insurance</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1913_checkbox" id="track_type_1913_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1913_checkbox" id="label_track_type_1913" class="track_type_checkbox_label" href="#track/cyber-physical-systems--iot">
<div class="track_type_icon cyber-physical-systems--iot_icon"></div> <span>Cyber-Physical Systems & IoT</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1769_checkbox" id="track_type_1769_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1769_checkbox" id="label_track_type_1769" class="track_type_checkbox_label" href="#track/defense">
<div class="track_type_icon defense_icon"></div> <span>Defense</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1897_checkbox" id="track_type_1897_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1897_checkbox" id="label_track_type_1897" class="track_type_checkbox_label" href="#track/enterprise-security">
<div class="track_type_icon enterprise-security_icon"></div> <span>Enterprise Security</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1933_checkbox" id="track_type_1933_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1933_checkbox" id="label_track_type_1933" class="track_type_checkbox_label" href="#track/exploit-development--vulnerability-discovery">
<div class="track_type_icon exploit-development--vulnerability-discovery_icon"></div> <span>Exploit Development & Vulnerability Discovery</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1947_checkbox" id="track_type_1947_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1947_checkbox" id="label_track_type_1947" class="track_type_checkbox_label" href="#track/forward-focus">
<div class="track_type_icon forward-focus_icon"></div> <span>Forward Focus</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1887_checkbox" id="track_type_1887_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1887_checkbox" id="label_track_type_1887" class="track_type_checkbox_label" href="#track/hardware--embedded">
<div class="track_type_icon hardware--embedded_icon"></div> <span>Hardware / Embedded</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1773_checkbox" id="track_type_1773_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1773_checkbox" id="label_track_type_1773" class="track_type_checkbox_label" href="#track/human-factors">
<div class="track_type_icon human-factors_icon"></div> <span>Human Factors</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1950_checkbox" id="track_type_1950_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1950_checkbox" id="label_track_type_1950" class="track_type_checkbox_label" href="#track/industrial-control-systems">
<div class="track_type_icon industrial-control-systems_icon"></div> <span>Industrial Control Systems</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1741_checkbox" id="track_type_1741_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1741_checkbox" id="label_track_type_1741" class="track_type_checkbox_label" href="#track/keynote">
<div class="track_type_icon keynote_icon"></div> <span>Keynote</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1802_checkbox" id="track_type_1802_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1802_checkbox" id="label_track_type_1802" class="track_type_checkbox_label" href="#track/malware">
<div class="track_type_icon malware_icon"></div> <span>Malware</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_17_checkbox" id="track_type_17_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_17_checkbox" id="label_track_type_17" class="track_type_checkbox_label" href="#track/mobile">
<div class="track_type_icon mobile_icon"></div> <span>Mobile</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1884_checkbox" id="track_type_1884_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1884_checkbox" id="label_track_type_1884" class="track_type_checkbox_label" href="#track/network-security">
<div class="track_type_icon network-security_icon"></div> <span>Network Security</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1827_checkbox" id="track_type_1827_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1827_checkbox" id="label_track_type_1827" class="track_type_checkbox_label" href="#track/platform-security">
<div class="track_type_icon platform-security_icon"></div> <span>Platform Security</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1828_checkbox" id="track_type_1828_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1828_checkbox" id="label_track_type_1828" class="track_type_checkbox_label" href="#track/policy">
<div class="track_type_icon policy_icon"></div> <span>Policy</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1898_checkbox" id="track_type_1898_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1898_checkbox" id="label_track_type_1898" class="track_type_checkbox_label" href="#track/privacy">
<div class="track_type_icon privacy_icon"></div> <span>Privacy</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1779_checkbox" id="track_type_1779_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1779_checkbox" id="label_track_type_1779" class="track_type_checkbox_label" href="#track/reverse-engineering">
<div class="track_type_icon reverse-engineering_icon"></div> <span>Reverse Engineering</span>
</label> </div>
<div class="clear"></div>
</li>
<li class="li2">
<div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1934_checkbox" id="track_type_1934_checkbox" class="track_type_checkboxes"> </div>
<div class="checkbox_label_wrapper"><label for="track_type_1934_checkbox" id="label_track_type_1934" class="track_type_checkbox_label" href="#track/threat-hunting--incident-response">
<div class="track_type_icon threat-hunting--incident-response_icon"></div> <span>Threat Hunting & Incident Response</span>
</label> </div>
<div class="clear"></div>
</li>
</ul>
</div>
</div>
</div>
</form>
Text Content
Informa Black Hat is part of the Informa Tech Division of Informa PLC * Informa PLC * About us * Investor relations * Talent This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726. * * Events Black Hat Fall Online TrainingsBlack Hat EuropeBlack Hat Spring TrainingsBlack Hat AsiaUpcoming Events * Briefings BriefingsCall for PapersSecTor Briefings Call for PapersArchives * Trainings TrainingsOn-Demand Training CoursesSelf Assessment * Arsenal ArsenalResourcesCall for ToolsReview Board * Summits * Webinars WebinarsExecutive Interviews * Sponsorships Sponsorship OpportunitiesSponsor NewsJoin the Sponsor Mailing List * About About UsBlogIn the NewsPress ReleasesBriefings Review BoardTraining Review BoardSecTor Review BoardBriefings Call for PapersSecTor Briefings Call for PapersCode of ConductContact UsSustainability PledgePrivacy USA 2024 Register Now August 3-8, 2024 -------------------------------------------------------------------------------- Mandalay Bay / Las Vegas Event Menu * AttendAttend Attendee RegistrationKnow Before You GoConference at a GlanceGroup DiscountPass ComparisonIn-Person ResourcesMedia RegistrationScholarshipsDEF CON PassesTravelSustainabilityCode of Conduct * TrainingsTrainings Training CoursesDaily ScheduleCertifications * BriefingsBriefings Keynotes & Main StageScheduleOverview & CPEsCall for Papers * ArsenalArsenal OverviewScheduleCall for Tools * SummitsSummits ScheduleCISO SummitThe AI SummitInnovators & Investors SummitOmdia Analyst SummitICS Micro SummitCyber Insurance Micro Summit * FeaturesFeatures Features OverviewFeatures ScheduleCommunityDay ZeroNOCParties & NetworkingStartup Spotlight Competition * Business HallBusiness Hall Business Hall OverviewSponsor ActivitiesSponsored SessionsWho's Hiring * SponsorsSponsors Become a SponsorEvent SponsorsSponsor News All times are Pacific Time (GMT/UTC -7h) * All * Wednesday * Thursday * All * A-E * F-J * K-O * P-T * U-Z All SessionsSpeakers SESSION TYPE(S) Select All | Clear * Briefings FORMAT(S) Select All | Clear * 25-Minute Keynote * 30-Minute Briefings * 40-Minute Briefings * 40-Minute Keynote * 60-Minute Keynote TRACK(S) Select All | Clear * AI, ML, & Data Science * Application Security: Defense * Application Security: Offense * Cloud Security * Community & Career * Cryptography * Cyber Insurance * Cyber-Physical Systems & IoT * Defense * Enterprise Security * Exploit Development & Vulnerability Discovery * Forward Focus * Hardware / Embedded * Human Factors * Industrial Control Systems * Keynote * Malware * Mobile * Network Security * Platform Security * Policy * Privacy * Reverse Engineering * Threat Hunting & Incident Response No sessions found * * Wednesday | 8:00am * Briefings Breakfast Location: TBD Track: Location: Michelob ULTRA Arena LATE * Wednesday | 9:00am * Keynote: Democracy's Biggest Year: The Fight for Secure Elections Around the World Location: TBD Panelist: Jen Easterly, Panelist: Hans de Vries, Panelist: Felicity Oswald OBE, Moderator: Christina A. Cassidy Track: Keynote Format: 60-Minute Keynote Location: Michelob ULTRA Arena LATE * Wednesday | 10:20am * Arbitrary Data Manipulation and Leakage with CPU Zero-Day Bugs on RISC-V Location: TBD Speaker: Fabian Thomas, Contributor: Ruiyi Zhang, Speaker: Lorenz Hetterich, Contributor: Michael Schwarz Tracks: Hardware / Embedded, Exploit Development & Vulnerability Discovery Format: 40-Minute Briefings Location: South Seas AB, Level 3 LATE Breaching AWS Accounts Through Shadow Resources Location: TBD Speaker: Yakir Kadkoda, Speaker: Michael Katchinskiy, Speaker: Ofek Itach Tracks: Cloud Security, Enterprise Security Format: 40-Minute Briefings Location: South Pacific F, Level 0 LATE Fallen Tower of Babel: Rooting Wireless Mesh Networks by Abusing Heterogeneous Control Protocols Location: TBD Speaker: Xin'an Zhou, Speaker: Zhiyun Qian, Contributor: Juefei Pu, Contributor: Qing Deng, Contributor: Srikanth Krishnamurthy, Contributor: Keyu Man Tracks: Cryptography, Network Security Format: 40-Minute Briefings Location: Islander EI, Level 0 LATE Let the Cache Cache and Let the WebAssembly Assemble: Knockin' on Chrome's Shell Location: TBD Speaker: Edouard Bochin, Speaker: Tao Yan, Contributor: Bo Qu Tracks: Exploit Development & Vulnerability Discovery, Application Security: Offense Format: 40-Minute Briefings Location: South Seas CD, Level 3 LATE Listen to the Whispers: Web Timing Attacks that Actually Work Location: TBD Speaker: James Kettle Tracks: Application Security: Offense, Reverse Engineering Format: 40-Minute Briefings Location: Jasmine AE, Level 3 LATE POLICY TRACK MEETUP Location: TBD Moderator: Jason Healey Track: Policy Format: 40-Minute Briefings Location: Breakers C, Level 2 LATE Practical LLM Security: Takeaways From a Year in the Trenches Location: TBD Speaker: Richard Harang Track: AI, ML, & Data Science Format: 40-Minute Briefings Location: Mandalay Bay H, Level 2 LATE Project 0xA11C: Deoxidizing the Rust Malware Ecosystem Location: TBD Speaker: Nicole Fishbein, Speaker: Juan Andrés Guerrero-Saade Tracks: Reverse Engineering, Malware Format: 40-Minute Briefings Location: Oceanside C, Level 2 LATE Tunnel Vision: Exploring VPN Post-Exploitation Techniques Location: TBD Speaker: Ori David Tracks: Network Security, Enterprise Security Format: 40-Minute Briefings Location: Islander FG, Level 0 LATE Windows Downdate: Downgrade Attacks Using Windows Updates Location: TBD Speaker: Alon Leviev Tracks: Platform Security, Malware Format: 40-Minute Briefings Location: Oceanside A, Level 2 LATE * Wednesday | 11:00am * Briefings Refreshment Break Location: TBD Track: Location: Outside Briefings Rooms (Levels 0, 2, & 3) LATE * Wednesday | 11:20am * 15 Ways to Break Your Copilot Location: TBD Speaker: Michael Bargury, Contributor: Avishai Efrati Tracks: Application Security: Defense, Enterprise Security Format: 40-Minute Briefings Location: Mandalay Bay H, Level 2 LATE A Framework for Evaluating National Cybersecurity Strategies Location: TBD Speaker: Fred Heiding, Contributor: Alex O'Neill, Contributor: Lachlan Price, Contributor: Eric Rosenbach Tracks: Policy, Defense Format: 40-Minute Briefings Location: Jasmine AE, Level 3 LATE AI TRACK MEETUP Location: TBD Moderator: Nathan Hamiel Track: AI, ML, & Data Science Format: 40-Minute Briefings Location: Breakers C, Level 2 LATE All Your Secrets Belong to Us: Leveraging Firmware Bugs to Break TEEs Location: TBD Speaker: Tom Dohrmann Tracks: Platform Security, Hardware / Embedded Format: 40-Minute Briefings Location: South Pacific F, Level 0 LATE Bugs of Yore: A Bug Hunting Journey on VMware's Hypervisor Location: TBD Speaker: Zisis Sialveras Tracks: Exploit Development & Vulnerability Discovery, Reverse Engineering Format: 40-Minute Briefings Location: Islander EI, Level 0 LATE From Exploits to Forensics Evidence - Unraveling the Unitronics Attack Location: TBD Speaker: Noam Moshe Tracks: Threat Hunting & Incident Response, Cyber-Physical Systems & IoT Format: 40-Minute Briefings Location: Oceanside C, Level 2 LATE Hardening HSMs for Banking-Grade Crypto Wallets Location: TBD Speaker: Jean-Philippe Aumasson, Speaker: Chervine Majeri Tracks: Cryptography, Hardware / Embedded Format: 40-Minute Briefings Location: Islander FG, Level 0 LATE Low Energy to High Energy: Hacking Nearby EV-Chargers Over Bluetooth Location: TBD Speaker: Thijs Alkemade, Speaker: Khaled Nassar, Contributor: Daan Keuper Tracks: Cyber-Physical Systems & IoT, Exploit Development & Vulnerability Discovery Format: 40-Minute Briefings Location: South Seas CD, Level 3 LATE Project Zero: Ten Years of 'Make 0-Day Hard' Location: TBD Speaker: Natalie Silvanovich Tracks: Defense, Exploit Development & Vulnerability Discovery Format: 40-Minute Briefings Location: Oceanside A, Level 2 LATE We R in a Right Pickle With All These Insecure Serialization Formats Location: TBD Speaker: Kasimir Schulz, Speaker: Tom Bonner Tracks: Reverse Engineering, Application Security: Offense Format: 40-Minute Briefings Location: South Seas AB, Level 3 LATE * Wednesday | 12:00pm * Briefings Lunch Location: TBD Track: Location: Bayside D, Level 1 LATE * Wednesday | 12:15pm * Main Stage: From the Office of the CISO: Smarter, Faster, Stronger Security in the Age of AI Location: TBD Speaker: Ann Johnson, Speaker: Sherrod DeGrippo Track: Keynote Format: 25-Minute Keynote Location: Oceanside A, Level 2 LATE * Wednesday | 12:40pm * Main Stage: Understanding and Reducing Supply Chain and Software Vulnerability Risks Location: TBD Speaker: Danny Jenkins Track: Keynote Format: 25-Minute Keynote Location: Oceanside A, Level 2 LATE * Wednesday | 1:30pm * From HAL to HALT: Thwarting Skynet's Siblings in the GenAI Coding Era Location: TBD Speaker: Chris Wysopal Tracks: Application Security: Defense, AI, ML, & Data Science Format: 40-Minute Briefings Location: Oceanside A, Level 2 LATE Modern Kill Chains: Real World SaaS Attacks and Mitigation Strategies Location: TBD Speaker: Cory Michal, Speaker: Brandon Levene, Speaker: Ben Pruce Tracks: Threat Hunting & Incident Response, Enterprise Security Format: 40-Minute Briefings Location: South Seas CD, Level 3 LATE Predict, Prioritize, Patch: How Microsoft Harnesses LLMs for Security Response Location: TBD Speaker: Bill Demirkapi Tracks: AI, ML, & Data Science, Application Security: Defense Format: 40-Minute Briefings Location: Oceanside C, Level 2 LATE REVERSE ENGINEERING TRACK MEETUP Location: TBD Moderator: Marion Marschalek Track: Reverse Engineering Format: 40-Minute Briefings Location: Breakers C, Level 2 LATE Self-Hosted GitHub CI/CD Runners: Continuous Integration, Continuous Destruction Location: TBD Speaker: Adnan Khan, Speaker: John Stawinski Tracks: Enterprise Security, Application Security: Offense Format: 40-Minute Briefings Location: South Seas AB, Level 3 LATE Splitting the Email Atom: Exploiting Parsers to Bypass Access Controls Location: TBD Speaker: Gareth Heyes Tracks: Application Security: Offense, Enterprise Security Format: 40-Minute Briefings Location: Mandalay Bay H, Level 2 LATE The Fundamentals of Cyber-Insurance Location: TBD Speaker: Tiago Henriques Track: Cyber Insurance Format: 40-Minute Briefings Location: Oceanside D, Level 2 LATE The GCP Jenga Tower: Hacking Millions of Google's Servers With a Single Package (and more) Location: TBD Speaker: Liv Matan Tracks: Cloud Security, Application Security: Offense Format: 40-Minute Briefings Location: South Pacific F, Level 0 LATE The Hack@DAC Story: Learnings from Organizing the World's Largest Hardware Hacking Competition Location: TBD Speaker: Arun Kanuparthi, Speaker: Hareesh Khattri, Contributor: Jason Fung, Contributor: Jeyavijayan JV Rajendran, Contributor: Ahmad-Reza Sadeghi Tracks: Community & Career, Hardware / Embedded Format: 40-Minute Briefings Location: Jasmine AE, Level 3 LATE The Overlooked Attack Surface: Diving into Windows Client Components for RCE Vulnerabilities Location: TBD Speaker: Qinghe Xie, Speaker: Fangming Gu, Speaker: Zong Cao, Contributor: Qingli Guo Tracks: Exploit Development & Vulnerability Discovery, Network Security Format: 40-Minute Briefings Location: Islander EI, Level 0 LATE Unraveling the Mind Behind the APT - Analyzing the Role of Pretexting in CTI and Attribution Location: TBD Speaker: Sanne Maasakkers Tracks: Human Factors, Threat Hunting & Incident Response Format: 40-Minute Briefings Location: Islander FG, Level 0 LATE * Wednesday | 2:30pm * Cracking the 5G Fortress: Peering Into 5G's Vulnerability Abyss Location: TBD Speaker: Kai Tu, Speaker: Yilu Dong, Contributor: Abdullah Al Ishtiaq, Contributor: Syed Md Mukit Rashid, Contributor: Weixuan Wang, Contributor: Tianwei Wu, Contributor: Syed Rafiul Hussain Tracks: Mobile, Exploit Development & Vulnerability Discovery Format: 30-Minute Briefings Location: Oceanside C, Level 2 LATE Deep Backdoors in Deep Reinforcement Learning Agents Location: TBD Speaker: Vasilios Mavroudis, Speaker: Jamie Gawith, Contributor: Sañyam Vyas, Contributor: Chris Hicks Tracks: AI, ML, & Data Science, Cyber-Physical Systems & IoT Format: 30-Minute Briefings Location: South Seas AB, Level 3 LATE Foreign Information Manipulation and Interference (Disinformation 2.0) Based on Learnings from 30 Years at NATO Location: TBD Speaker: Franky Saegerman Tracks: Defense, Human Factors Format: 30-Minute Briefings Location: Jasmine AE, Level 3 LATE Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities for Initial Access Location: TBD Speaker: Nick Frichette Track: Cloud Security Format: 30-Minute Briefings Location: Mandalay Bay H, Level 2 LATE Ops! It is JTAG's Fault: Journey to Unlocking Automotive Grade IC Location: TBD Speaker: Jun Li, Contributor: Zhongjie Wu, Contributor: Yuqiao Yang, Contributor: WenHao Liu, Contributor: Ruicong Shi, Contributor: YuQiao Ning, Contributor: Wu Chao, Contributor: Harry Guo, Contributor: Kun Yang, Contributor: Xiaohang Wang, Contributor: Kui Ren, Contributor: Ting Chen Tracks: Hardware / Embedded, Cyber-Physical Systems & IoT Format: 30-Minute Briefings Location: Islander EI, Level 0 LATE PyLingual: A Python Decompilation Framework for Evolving Python Versions Location: TBD Speaker: Josh Wiedemeier, Contributor: Elliot Tarbet, Contributor: Max Zheng, Contributor: Jerry Teng, Contributor: Ximeng Liu, Contributor: Muhyun Kim, Contributor: Sang Kil Cha, Contributor: Jessica Ouyang, Contributor: Kangkook Jee Track: Reverse Engineering Format: 30-Minute Briefings Location: Oceanside A, Level 2 LATE Relationships Matter: Reconstructing the Organizational and Social Structure of a Ransomware Gang Location: TBD Speaker: Dalya Manatova, Speaker: L Jean Camp Track: Human Factors Format: 30-Minute Briefings Location: Islander FG, Level 0 LATE Strengthen Cyber-security by Leveraging Cyber-Insurance Location: TBD Speaker: Bridget Q. Choi Track: Cyber Insurance Format: 30-Minute Briefings Location: Oceanside D, Level 2 LATE Surveilling the Masses with Wi-Fi Positioning Systems Location: TBD Speaker: Erik Rye Tracks: Privacy, Network Security Format: 30-Minute Briefings Location: South Seas CD, Level 3 LATE TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets Location: TBD Speaker: Qi Wang, Contributor: Xiang Li, Contributor: Chuhan Wang Track: Network Security Format: 30-Minute Briefings Location: South Pacific F, Level 0 LATE * Wednesday | 3:00pm * Briefings Refreshment Break Location: TBD Track: Location: Outside Briefings Rooms (Levels 0, 2, & 3) LATE * Wednesday | 3:20pm * AI Safety and You: Perspectives on Evolving Risks and Impacts Location: TBD Moderator: Nathan Hamiel, Panelist: Amanda Minnich, Panelist: Nikki Pope, Panelist: Mikel Rodriguez Tracks: Forward Focus, AI, ML, & Data Science Format: 40-Minute Briefings Location: Oceanside A, Level 2 LATE Attacking Samsung Galaxy A* Boot Chain, and Beyond Location: TBD Speaker: Maxime Rossi Bellom, Speaker: Raphael Neveu, Contributor: Damiano Melotti, Contributor: Gabrielle Viala Tracks: Mobile, Exploit Development & Vulnerability Discovery Format: 40-Minute Briefings Location: South Seas AB, Level 3 LATE Compromising Confidential Compute, One Bug at a Time Location: TBD Speaker: Maxime Villard, Contributor: Yair Netzer, Contributor: Ben Hania Tracks: Cloud Security, Exploit Development & Vulnerability Discovery Format: 40-Minute Briefings Location: Mandalay Bay H, Level 2 LATE Cyber Claims Outlook 2024: Trends, Threats, and Tomorrow's Challenges Location: TBD Speaker: Catherine Lyle Track: Cyber Insurance Format: 40-Minute Briefings Location: Oceanside D, Level 2 LATE HARDWARE/EMBEDDED TRACK MEETUP Location: TBD Moderator: Daniel Cuthbert Track: Hardware / Embedded Format: 40-Minute Briefings Location: Breakers C, Level 2 LATE Into the Inbox: Novel Email Spoofing Attack Patterns Location: TBD Speaker: Hao Wang, Speaker: Caleb Sargent, Contributor: Harrison Pomeroy, Contributor: Renana Friedlich Tracks: Enterprise Security, Exploit Development & Vulnerability Discovery Format: 40-Minute Briefings Location: Islander FG, Level 0 LATE MaLDAPtive: Diving Deep Into LDAP Obfuscation, Deobfuscation & Detection Location: TBD Speaker: Daniel Bohannon, Speaker: Sabajete Elezaj Tracks: Malware, Defense Format: 40-Minute Briefings Location: Oceanside C, Level 2 LATE Secure Shells in Shambles Location: TBD Speaker: HD Moore, Speaker: Rob King Tracks: Application Security: Offense, Exploit Development & Vulnerability Discovery Format: 40-Minute Briefings Location: South Pacific F, Level 0 LATE Skirting the Tornado: Essential Strategies for CISOs to Sidestep Government Fallout in the Wake of Major Cyberattacks Location: TBD Speaker: Jess Nall Tracks: Community & Career, Defense Format: 40-Minute Briefings Location: Jasmine AE, Level 3 LATE Super Hat Trick: Exploit Chrome and Firefox Four Times Location: TBD Speaker: Nan Wang, Speaker: Zhenghang Xiao, Contributor: Xuehao Guo, Contributor: Qinrun Dai Tracks: Exploit Development & Vulnerability Discovery, Platform Security Format: 40-Minute Briefings Location: South Seas CD, Level 3 LATE That Gambling Site? It's Fueled by Chinese Organized Crime Location: TBD Speaker: Maël Le Touz, Speaker: Renée Burton Tracks: Threat Hunting & Incident Response, Human Factors Format: 40-Minute Briefings Location: Islander EI, Level 0 LATE * Wednesday | 4:20pm * Achilles' Heel of JS Engines: Exploiting Modern Browsers During WASM Execution Location: TBD Contributor: Bohan Liu, Speaker: Zong Cao, Speaker: Zheng Wang, Contributor: Yeqi Fu, Contributor: Cen Zhang Tracks: Exploit Development & Vulnerability Discovery, Mobile Format: 40-Minute Briefings Location: South Seas CD, Level 3 LATE From Doxing to Doorstep: Exposing Privacy Intrusion Techniques used by Hackers for Extortion Location: TBD Speaker: Jacob Larsen Track: Privacy Format: 40-Minute Briefings Location: Jasmine AE, Level 3 LATE Is Defense Winning? Location: TBD Speaker: Jason Healey Track: Policy Format: 40-Minute Briefings Location: Oceanside A, Level 2 LATE Isolation or Hallucination? Hacking AI Infrastructure Providers for Fun and Weights Location: TBD Speaker: Hillai Ben-Sasson, Speaker: Sagi Tzadik Tracks: AI, ML, & Data Science, Cloud Security Format: 40-Minute Briefings Location: Islander EI, Level 0 LATE Moral Hazards and Ethical Considerations in Cyber-Insurance Location: TBD Speaker: Lindsay Nickle, Speaker: Tiago Henriques, Speaker: Scott Stransky Track: Cyber Insurance Format: 40-Minute Briefings Location: Oceanside D, Level 2 LATE Nope, S7ill Not Secure: Stealing Private Keys From S7 PLCs Location: TBD Speaker: Nadav Adir, Speaker: Alon Dankner, Contributor: Eli Biham, Contributor: Sara Bitan, Contributor: Ron Freudenthal, Contributor: Or Keret Tracks: Cyber-Physical Systems & IoT, Cryptography Format: 40-Minute Briefings Location: South Seas AB, Level 3 LATE SnailLoad: Anyone on the Internet Can Learn What You're Doing Location: TBD Speaker: Daniel Gruss, Speaker: Stefan Gast Tracks: Network Security, Exploit Development & Vulnerability Discovery Format: 40-Minute Briefings Location: Oceanside C, Level 2 LATE Surfacing a Hydra: Unveiling a Multi-Headed Chinese State-Sponsored Campaign Against a Foreign Government Location: TBD Speaker: Morgan Demboski, Speaker: Mark Parsons Tracks: Threat Hunting & Incident Response, Defense Format: 40-Minute Briefings Location: South Pacific F, Level 0 LATE The Way to Android Root: Exploiting Your GPU on Smartphone Location: TBD Speaker: Xiling Gong, Speaker: Xuan Xing, Contributor: Eugene Rodionov Tracks: Mobile, Exploit Development & Vulnerability Discovery Format: 40-Minute Briefings Location: Mandalay Bay H, Level 2 LATE UnOAuthorized: A Technique to Privilege Escalation to Global Administrator Location: TBD Speaker: Eric Woodruff Tracks: Cloud Security, Enterprise Security Format: 40-Minute Briefings Location: Islander FG, Level 0 LATE * Thursday | 8:00am * Briefings Breakfast Location: TBD Track: Location: Michelob ULTRA Arena LATE * Thursday | 9:00am * Keynote: Fireside Chat with Moxie Marlinspike Location: TBD Speaker: Moxie Marlinspike, Speaker: Jeff Moss Track: Keynote Format: 60-Minute Keynote Location: Michelob ULTRA Arena LATE * Thursday | 10:20am * ACE Up the Sleeve: Hacking Into Apple's New USB-C Controller Location: TBD Speaker: Thomas Roth Tracks: Hardware / Embedded, Mobile Format: 40-Minute Briefings Location: South Pacific F, Level 0 LATE Driving Forces Behind Industry 4.0 and Digital Transformation for Critical Infrastructure Location: TBD Speaker: Emma Stewart Track: Industrial Control Systems Format: 40-Minute Briefings Location: Oceanside D, Level 2 LATE From Weapon to Target: Quantum Computers Paradox Location: TBD Speaker: Adrian Coleșa, Speaker: Sorin Boloș Track: Platform Security Format: 40-Minute Briefings Location: South Seas CD, Level 3 LATE Gotta Cache Em All: Bending the Rules of Web Cache Exploitation Location: TBD Speaker: Martin Doyhenard Tracks: Application Security: Offense, Cloud Security Format: 40-Minute Briefings Location: Mandalay Bay H, Level 2 LATE How Hackers Changed the Media (and the Media Changed Hackers) Location: TBD Moderator: Sherri Davidoff, Panelist: Lorenzo Franceschi-Bicchierai, Panelist: Robert McMillan, Panelist: Sadia Mirza Track: Community & Career Format: 40-Minute Briefings Location: Oceanside A, Level 2 LATE In Defense of Facts: Setting Standards Against Information Threats Location: TBD Speaker: Lester Godsey Tracks: Human Factors, Threat Hunting & Incident Response Format: 40-Minute Briefings Location: Jasmine AE, Level 3 LATE OVPNX: 4 Zero-Days Leading to RCE, LPE and KCE (via BYOVD) Affecting Millions of OpenVPN Endpoints Across the Globe Location: TBD Speaker: Vladimir Tokarev Tracks: Exploit Development & Vulnerability Discovery, Application Security: Offense Format: 40-Minute Briefings Location: South Seas AB, Level 3 LATE POLICY MEETUP - National Policy and Security: Impact of Emerging Technology and Threats Location: TBD Moderator: Jason Healey, Panelist: Nand Mulchandani, Panelist: Hans de Vries, Panelist: Lauryn Williams, Panelist: Amit Elazari Track: Policy Format: 40-Minute Briefings Location: Breakers C, Level 2 LATE Reinforcement Learning for Autonomous Resilient Cyber Defense Location: TBD Speaker: Sara Farmer, Contributor: David Foster, Contributor: James Short, Contributor: Dr Andy Harrison FORS, Speaker: Ian Miles, Contributor: Matthew Lacey, Contributor: Chris Willis, Contributor: Daniel Harrold, Contributor: Chris Parry, Contributor: Gregory Palmer, Contributor: John H, Contributor: Tom Wilson, Contributor: Ryan Heartfield, Contributor: Mark Dorn, Contributor: Demian Till, Contributor: David Rimmer, Contributor: Samuel Bailey, Contributor: Peter Haubrick, Contributor: Jack Stone, Contributor: Madeline Cheah, Contributor: Pedro Marques, Contributor: Alfie Beard, Contributor: Jonathan Francis Roscoe, Contributor: Alec Wilson, Contributor: Ryan Menzies, Contributor: Marco Casassa Mont, Contributor: Neela Morarji, Contributor: Lisa Gralewski, Contributor: Esin Turkbeyler Tracks: AI, ML, & Data Science, Defense Format: 40-Minute Briefings Location: Islander EI, Level 0 LATE Stop! Sandboxing Exploitable Functions and Modules Using In-Kernel Machine Learning Location: TBD Speaker: Qinrun Dai, Contributor: Tiejin Chen, Contributor: Zicheng Wang, Contributor: Hua Wei, Contributor: Yueqi Chen Tracks: Defense, AI, ML, & Data Science Format: 40-Minute Briefings Location: Islander FG, Level 0 LATE Swipe Left for Identity Theft: An Analysis of User Data Privacy Risks on Location-based Dating Apps Location: TBD Speaker: Karel Dhondt, Speaker: Victor Le Pochat Tracks: Privacy, Mobile Format: 40-Minute Briefings Location: Oceanside C, Level 2 LATE * Thursday | 11:00am * Briefings Refreshment Break Location: TBD Track: Location: Outside Briefings Rooms (Levels 0, 2, & 3) LATE * Thursday | 11:20am * Flipping Bits: Your Credentials Are Certainly Mine Location: TBD Speaker: STÖK STÖK, Speaker: Joona Hoikkala Tracks: Application Security: Offense, Exploit Development & Vulnerability Discovery Format: 40-Minute Briefings Location: Oceanside A, Level 2 LATE From MLOps to MLOops - Exposing the Attack Surface of Machine Learning Platforms Location: TBD Speaker: Shachar Menashe Tracks: AI, ML, & Data Science, Platform Security Format: 40-Minute Briefings Location: South Seas AB, Level 3 LATE Laser Beams & Light Streams: Letting Hackers Go Pew Pew, Building Affordable Light-Based Hardware Security Tooling Location: TBD Speaker: Sam Beaumont, Speaker: Larry Trowell Tracks: Hardware / Embedded, Exploit Development & Vulnerability Discovery Format: 40-Minute Briefings Location: Islander EI, Level 0 LATE Listen Up: Sonos Over-The-Air Remote Kernel Exploitation and Covert Wiretap Location: TBD Speaker: Alex Plaskett, Speaker: Robert Herrera Tracks: Cyber-Physical Systems & IoT, Hardware / Embedded Format: 40-Minute Briefings Location: South Pacific F, Level 0 LATE Living off Microsoft Copilot Location: TBD Speaker: Michael Bargury, Contributor: Tamir Ishay Sharbat, Contributor: Gal Malka, Contributor: Lana Salameh Tracks: Enterprise Security, Cloud Security Format: 40-Minute Briefings Location: Mandalay Bay H, Level 2 LATE Modern Anti-Abuse Mechanisms in Competitive Video Games Location: TBD Speaker: Julien Voisin Tracks: Defense, Human Factors Format: 40-Minute Briefings Location: Jasmine AE, Level 3 LATE Navigating the Complex Challenges of Setting Up Efficient and Robust OT SOC Capabilities Location: TBD Speaker: Piotr Ciepiela Track: Industrial Control Systems Format: 40-Minute Briefings Location: Oceanside D, Level 2 LATE Overcoming State: Finding Baseband Vulnerabilities by Fuzzing Layer-2 Location: TBD Speaker: Dyon Goos, Speaker: Marius Muench Tracks: Mobile, Hardware / Embedded Format: 40-Minute Briefings Location: Oceanside C, Level 2 LATE Terrapin Attack: Breaking SSH Channel Integrity by Sequence Number Manipulation Location: TBD Speaker: Fabian Bäumer Tracks: Cryptography, Application Security: Offense Format: 40-Minute Briefings Location: Islander FG, Level 0 LATE You've Already Been Hacked: What if There Is a Backdoor in Your UEFI OROM? Location: TBD Speaker: Kazuki Matsuo Tracks: Malware, Platform Security Format: 40-Minute Briefings Location: South Seas CD, Level 3 LATE * Thursday | 12:00pm * Briefings Lunch Location: TBD Track: Location: Bayside D, Level 1 LATE * Thursday | 12:15pm * Main Stage: Let Me Tell You a Story: Technology and the 4 Vs Location: TBD Speaker: Jen Easterly Track: Keynote Format: 25-Minute Keynote Location: Oceanside A, Level 2 LATE * Thursday | 12:40pm * Main Stage: Solving the Cyber Hard Problems: A View into Problem Solving from the White House Location: TBD Speaker: Harry Coker, Moderator: Steven Kelly Track: Keynote Format: 25-Minute Keynote Location: Oceanside A, Level 2 LATE * Thursday | 1:30pm * Bytecode Jiu-Jitsu: Choking Interpreters to Force Execution of Malicious Bytecode Location: TBD Speaker: Toshinori Usui, Speaker: Yuto Otsuki, Contributor: Ryo Kubota, Contributor: Yuhei Kawakoya, Contributor: Makoto Iwamura, Contributor: Kanta Matsuura Tracks: Malware, Reverse Engineering Format: 40-Minute Briefings Location: South Seas AB, Level 3 LATE Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server! (PRE-RECORDED) Location: TBD Speaker: Orange Tsai Tracks: Application Security: Offense, Exploit Development & Vulnerability Discovery Format: 40-Minute Briefings Location: Islander FG, Level 0 LATE ICS Risk Management: Strategies for Assessing and Mitigating Operational, Safety, Financial, and Cybersecurity Risks Location: TBD Moderator: Daniel Cuthbert, Panelist: Thomas Brandstetter, Panelist: Noam Moshe, Panelist: Cassie Crossley Track: Industrial Control Systems Format: 40-Minute Briefings Location: Oceanside D, Level 2 LATE Locked Down but Not Out: Fighting the Hidden War in Your Bootloader Location: TBD Speaker: Bill Demirkapi Tracks: Defense, Platform Security Format: 40-Minute Briefings Location: Oceanside A, Level 2 LATE MOBILE TRACK MEETUP Location: TBD Moderator: Stephanie Domas Track: Mobile Format: 40-Minute Briefings Location: Breakers C, Level 2 LATE One Hack to Rule Them All: Pervasive Account Takeovers in Integration Platforms for Workflow Automation, Virtual Voice Assistant, IoT, & LLM Services Location: TBD Speaker: Kaixuan Luo, Speaker: Xianbo Wang, Contributor: Adonis Fung, Contributor: Julien Lecomte, Contributor: Wing Cheong Lau Tracks: Cloud Security, Application Security: Offense Format: 40-Minute Briefings Location: South Seas CD, Level 3 LATE Quantum Security: Myths, Facts, and Realities Location: TBD Panelist: Jean-Philippe Aumasson, Panelist: Mark Carney, Panelist: Tommaso Gagliardoni, Moderator: Nathan Hamiel Tracks: Forward Focus, Cryptography Format: 40-Minute Briefings Location: South Pacific F, Level 0 LATE Securing Network Appliances: New Technologies and Old Challenges Location: TBD Speaker: Vladyslav Babkin Tracks: Enterprise Security, Network Security Format: 40-Minute Briefings Location: Jasmine AE, Level 3 LATE The Hidden Treasure of Crash Reports? Location: TBD Speaker: Patrick Wardle Tracks: Threat Hunting & Incident Response, Exploit Development & Vulnerability Discovery Format: 40-Minute Briefings Location: Mandalay Bay H, Level 2 LATE Uncovering Supply Chain Attack with Code Genome Framework Location: TBD Speaker: Dhilung Kirat, Speaker: Jiyong Jang Track: Application Security: Defense Format: 40-Minute Briefings Location: Islander EI, Level 0 LATE What Lies Beneath the Surface? Evaluating LLMs for Offensive Cyber Capabilities through Prompting, Simulation & Emulation Location: TBD Speaker: Michael Kouremetis, Speaker: Marissa Dotter, Speaker: Alex Byrne, Contributor: Dan Martin, Contributor: Ethan Michalak, Contributor: Gianpaolo Russo, Contributor: Michael Threet Tracks: AI, ML, & Data Science, Defense Format: 40-Minute Briefings Location: Oceanside C, Level 2 LATE * Thursday | 2:30pm * Becoming Cybersecurity Bilingual: Effective Communication for Hackers Location: TBD Speaker: John Dwyer Track: Community & Career Format: 30-Minute Briefings Location: Islander FG, Level 0 LATE Break the Wall from Bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls Location: TBD Speaker: Qi Wang, Contributor: Jianjun Chen, Contributor: Run Guo, Contributor: Chao Zhang, Contributor: Haixin Duan Tracks: Application Security: Offense, Cloud Security Format: 30-Minute Briefings Location: South Pacific F, Level 0 LATE Bypassing ARM's Memory Tagging Extension with a Side-Channel Attack Location: TBD Speaker: Juhee Kim, Contributor: Jinbum Park, Contributor: Sihyeon Roh, Contributor: Jaeyoung Chung, Contributor: Youngjoo Lee, Contributor: Taesoo Kim, Contributor: Byoungyoung Lee Tracks: Hardware / Embedded, Exploit Development & Vulnerability Discovery Format: 30-Minute Briefings Location: Oceanside A, Level 2 LATE CANCELLED: Unmasking Privacy Risks in Post-Cookie Adtech Solutions Location: TBD Speaker: Narayana Pappu Tracks: Privacy, AI, ML, & Data Science Format: 30-Minute Briefings Location: Islander FG, Level 0 LATE Crashing the Party: Vulnerabilities in RPKI Validation Location: TBD Speaker: Niklas Vogel, Speaker: Donika Mirdita, Contributor: Haya Schulmann, Contributor: Michael Waidner Tracks: Network Security, Application Security: Offense Format: 30-Minute Briefings Location: Islander EI, Level 0 LATE CYBER-PHYSICAL SYSTEMS & IOT TRACK MEETUP Location: TBD Moderator: Stefano Zanero Track: Cyber-Physical Systems & IoT Format: 30-Minute Briefings Location: Breakers C, Level 2 LATE Hook, Line and Sinker: Phishing Windows Hello for Business Location: TBD Speaker: Yehuda Smirnov Tracks: Enterprise Security, Cloud Security Format: 30-Minute Briefings Location: South Seas CD, Level 3 LATE PageJack: A Powerful Exploit Technique With Page-Level UAF Location: TBD Speaker: Zhiyun Qian, Contributor: Jiayi Hu, Contributor: Jinmeng Zhou, Contributor: Qi Tang, Contributor: Wenbo Shen Track: Exploit Development & Vulnerability Discovery Format: 30-Minute Briefings Location: South Seas AB, Level 3 LATE Threat Hunting with LLM: From Discovering APT SAAIWC to Tracking APTs with AI (PRE-RECORDED) Location: TBD Speaker: Hongfei Wang, Speaker: Dong Wu, Contributor: Yuan Gu Tracks: Threat Hunting & Incident Response, AI, ML, & Data Science Format: 30-Minute Briefings Location: Oceanside C, Level 2 LATE Use Your Spell Against You: Threat Prevention of Smart Contract Exploit By Reusing Opcode Trace Location: TBD Speaker: Yajin Zhou Tracks: Defense, Application Security: Defense Format: 30-Minute Briefings Location: Mandalay Bay H, Level 2 LATE Will We Survive the Transitive Vulnerability Locusts? Location: TBD Speaker: Eyal Paz, Speaker: Liad Cohen Tracks: Application Security: Defense, Exploit Development & Vulnerability Discovery Format: 30-Minute Briefings Location: Jasmine AE, Level 3 LATE * Thursday | 3:00pm * Briefings Refreshment Break Location: TBD Track: Location: Outside Briefings Rooms (Levels 0, 2, & 3) LATE * Thursday | 3:20pm * Are Your Backups Still Immutable, Even Though You Can't Access Them? Location: TBD Speaker: Ryan Kane, Speaker: Rushank Shetty Tracks: Enterprise Security, Application Security: Offense Format: 40-Minute Briefings Location: South Seas CD, Level 3 LATE Attention Is All You Need for Semantics Detection: A Novel Transformer on Neural-Symbolic Approach Location: TBD Speaker: Sheng-Hao Ma, Speaker: Yi-An Lin, Speaker: Mars Cheng Tracks: AI, ML, & Data Science, Threat Hunting & Incident Response Format: 40-Minute Briefings Location: South Seas AB, Level 3 LATE Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panels Location: TBD Speaker: Vangelis Stykas Tracks: Threat Hunting & Incident Response, Malware Format: 40-Minute Briefings Location: South Pacific F, Level 0 LATE Ignore Your Generative AI Safety Instructions. Violate the CFAA? Location: TBD Speaker: Kendra Albert, Contributor: Jonathon Penney, Contributor: Ram Shankar Siva Kumar Tracks: Policy, AI, ML, & Data Science Format: 40-Minute Briefings Location: Islander FG, Level 0 LATE Microarchitecture Vulnerabilities: Past, Present, and Future Location: TBD Speaker: Anders Fogh, Speaker: Daniel Gruss Tracks: Forward Focus, Hardware / Embedded Format: 40-Minute Briefings Location: Mandalay Bay H, Level 2 LATE Remote, One-Click, Breaking through Smartphones via a Non Well-Known Remote Attack Surface Location: TBD Contributor: Fan Yang, Contributor: Haikuo Xie, Speaker: Qinrun Dai Tracks: Exploit Development & Vulnerability Discovery, Application Security: Offense Format: 40-Minute Briefings Location: Islander EI, Level 0 LATE The 10th Annual Black Hat USA Network Operations Center (NOC) Report Location: TBD Speaker: Neil Wyler, Speaker: Bart Stump Tracks: Network Security, Application Security: Defense Format: 40-Minute Briefings Location: Oceanside A, Level 2 LATE Tracing Origins: Navigating Content Authenticity in the Deepfake Era Location: TBD Speaker: Peleus Uhley Tracks: Human Factors, Policy Format: 40-Minute Briefings Location: Jasmine AE, Level 3 LATE Unveiling Mac Security: A Comprehensive Exploration of Sandboxing and AppData TCC Location: TBD Speaker: Zhongquan Li, Speaker: Qidan He Tracks: Platform Security, Application Security: Offense Format: 40-Minute Briefings Location: Oceanside C, Level 2 LATE * Thursday | 4:20pm * Locknote: Conclusions & Key Takeaways from Black Hat USA 2024 Location: TBD Panelist: Ellen Cram Kowalczyk, Moderator: Jeff Moss, Panelist: Nathan Hamiel, Panelist: Window Snyder, Panelist: Jos Wetzels Tracks: Keynote, Forward Focus Format: 40-Minute Keynote Location: Mandalay Bay H, Level 2 LATE Discover more from Informa Tech * Dark Reading * SecTor * Black Hat Trainings * Omdia Working With Us * About Us * Code of Conduct * Contact us * Upcoming Events Follow on Social * * * * * * * Cookie * CCPA: Do not sell my personal info * Privacy * Terms Copyright © 2024 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and head office is 5 Howick Place, London, SW1P 1WG. × > This site uses cookies to provide you with the best user experience possible. By continuing to use this site, you accept our use of cookies. I Agree