Index of /blackhat/usa-2015/


../
README.md                                          16-Nov-2015 01:33                  46
us-15-Arnaboldi-Abusing-XSLT-For-Practical-Atta..> 07-Aug-2015 01:40             2076331
us-15-Arnaboldi-Abusing-XSLT-For-Practical-Atta..> 07-Aug-2015 01:40            14207504
us-15-Bailey-Take-A-Hacker-To-Work Day-How-Fede..> 06-Aug-2015 01:02             2372179
us-15-Bell-Automated-Human-Vulnerability-Scanni..> 07-Aug-2015 01:40             4844863
us-15-Bobrov-Certifi-Gate-Front-Door-Access-To-..> 07-Aug-2015 01:40              595363
us-15-Bobrov-Certifi-Gate-Front-Door-Access-To-..> 07-Aug-2015 01:40             5221479
us-15-Branco-Distributing-The-Reconstruction-Of..> 21-Aug-2015 18:04             2985783
us-15-Brossard-SMBv2-Sharing-More-Than-Just-You..> 17-Aug-2015 17:19             1461162
us-15-Brossard-SMBv2-Sharing-More-Than-Just-You..> 21-Aug-2015 18:04             3900508
us-15-Cassidy-Switches-Get-Stitches.pdf            06-Aug-2015 01:02             4346386
us-15-Choi-API-Deobfuscator-Resolving-Obfuscate..> 07-Aug-2015 01:40             3039112
us-15-Conti-Pen-Testing-A-City-wp.pdf              07-Aug-2015 01:40              554562
us-15-Conti-Pen-Testing-A-City.pdf                 07-Aug-2015 01:40            44841843
us-15-Cui-Emanate-Like-A-Boss-Generalized-Cover..> 21-Aug-2015 18:04            27188555
us-15-DAntoine-Exploiting-Out-Of-Order-Executio..> 07-Aug-2015 01:40             1354044
us-15-DAntoine-Exploiting-Out-Of-Order-Executio..> 07-Aug-2015 01:40            16517497
us-15-Dalman-Commercial-Spyware-Detecting-The-U..> 06-Aug-2015 01:02             1403886
us-15-Dalman-Commercial-Spyware-Detecting-The-U..> 06-Aug-2015 01:02             2120941
us-15-Daugherty-Behind-The-Mask-The-Agenda-Tric..> 06-Aug-2015 01:02            59194866
us-15-Davis-Deep-Learning-On-Disassembly.pdf       07-Aug-2015 01:40             5055986
us-15-Diquet-TrustKit-Code-Injection-On-iOS-8-F..> 17-Aug-2015 17:19             1306165
us-15-Domas-The-Memory-Sinkhole-Unleashing-An-x..> 07-Aug-2015 01:40              213798
us-15-Domas-The-Memory-Sinkhole-Unleashing-An-x..> 17-Aug-2015 17:19            17094338
us-15-Drake-Stagefright-Scary-Code-In-The-Heart..> 21-Aug-2015 18:04             1392544
us-15-Evenchick-Breaking-Access-Controls-With-B..> 21-Aug-2015 18:04              839691
us-15-Evenchick-Breaking-Access-Controls-With-B..> 21-Aug-2015 18:04            21421495
us-15-Fillmore-Crash-Pay-How-To-Own-And-Clone-C..> 06-Aug-2015 01:02              309043
us-15-Fillmore-Crash-Pay-How-To-Own-And-Clone-C..> 06-Aug-2015 01:02             1758145
us-15-Gaddam-Securing-Your-Big-Data-Environment..> 19-Aug-2015 19:34             1003063
us-15-Gaddam-Securing-Your-Big-Data-Environment..> 01-Sep-2015 18:45             1140644
us-15-Gavrichenkov-Breaking-HTTPS-With-BGP-Hija..> 06-Aug-2015 01:02              136527
us-15-Gavrichenkov-Breaking-HTTPS-With-BGP-Hija..> 06-Aug-2015 01:02              287960
us-15-Gong-Fuzzing-Android-System-Services-By-B..> 07-Aug-2015 01:40              734313
us-15-Gong-Fuzzing-Android-System-Services-By-B..> 07-Aug-2015 01:40             1241851
us-15-Gorenc-Abusing-Silent-Mitigations-Underst..> 06-Aug-2015 01:02             3697531
us-15-Gorenc-Abusing-Silent-Mitigations-Underst..> 06-Aug-2015 01:02             3460073
us-15-Graeber-Abusing-Windows-Management-Instru..> 06-Aug-2015 01:02               20470
us-15-Graeber-Abusing-Windows-Management-Instru..> 06-Aug-2015 01:02             1056336
us-15-Graeber-Abusing-Windows-Management-Instru..> 06-Aug-2015 01:02             1507349
us-15-Granick-The-Lifecycle-Of-A-Revolution.pdf    05-Aug-2015 17:11             1567071
us-15-Hanif-Internet-Scale-File-Analysis-wp.pdf    07-Aug-2015 01:40              272066
us-15-Hanif-Internet-Scale-File-Analysis.pdf       07-Aug-2015 01:40            42700125
us-15-Herath-These-Are-Not-Your-Grand-Daddys-CP..> 06-Aug-2015 01:02              874328
us-15-Hizver-Taxonomic-Modeling-Of-Security-Thr..> 07-Aug-2015 01:40              366577
us-15-Hizver-Taxonomic-Modeling-Of-Security-Thr..> 07-Aug-2015 01:40              348192
us-15-Hudson-Thunderstrike-2-Sith-Strike.pdf       17-Aug-2015 17:19            45317407
us-15-Jakobsson-How-Vulnerable-Are-We-To-Scams-..> 06-Aug-2015 01:02              750142
us-15-Jakobsson-How-Vulnerable-Are-We-To-Scams.pdf 16-Sep-2015 20:29             3799797
us-15-Keenan-Hidden-Risks-Of-Biometric-Identifi..> 07-Aug-2015 01:40             1213092
us-15-Keenan-Hidden-Risks-Of-Biometric-Identifi..> 07-Aug-2015 01:40             4581783
us-15-Kettle-Server-Side-Template-Injection-RCE..> 06-Aug-2015 01:02             1832664
us-15-King-Taking-Event-Correlation-With-You-to..> 07-Aug-2015 01:40              456546
us-15-King-Taking-Event-Correlation-With-You-wp..> 07-Aug-2015 01:40              174413
us-15-King-Taking-Event-Correlation-With-You.pdf   07-Aug-2015 01:40             1211059
us-15-Kirda-Most-Ransomware-Isn�%80%99t-As-Comp..> 07-Aug-2015 01:40              812495
us-15-Kirda-Most-Ransomware-Isn�%80%99t-As-Comp..> 07-Aug-2015 01:40             6088559
us-15-Klein-Defeating-Machine-Learning-What-You..> 21-Aug-2015 18:04             2882470
us-15-Klick-Internet-Facing-PLCs-A-New-Back-Ori..> 07-Aug-2015 01:40              900055
us-15-Klick-Internet-Facing-PLCs-A-New-Back-Ori..> 17-Aug-2015 17:19             4453894
us-15-Kozy-Bringing-A-Cannon-To-A-Knife-Fight.pdf  01-Sep-2015 18:45            14843030
us-15-Krotofil-Rocking-The-Pocket-Book-Hacking-..> 01-Sep-2015 18:45            10334816
us-15-Krotofil-Rocking-The-Pocket-Book-Hacking-..> 01-Sep-2015 18:45            10434801
us-15-Kruegel-Using-Static-Binary-Analysis-To-F..> 07-Aug-2015 01:40            29472213
us-15-Kubecka-How-To-Implement-IT-Security-Afte..> 07-Aug-2015 01:40              796780
us-15-Lakhotia-Harnessing-Intelligence-From-Mal..> 07-Aug-2015 01:40             2981501
us-15-Larsen-Remote-Physical-Damage-101-Bread-A..> 07-Aug-2015 01:40            16493709
us-15-Lei-Optimized-Fuzzing-IOKit-In-iOS-wp.pdf    06-Aug-2015 01:02              649307
us-15-Lei-Optimized-Fuzzing-IOKit-In-iOS.pdf       06-Aug-2015 01:02             2190602
us-15-Li-Attacking-Interoperability-An-OLE-Edit..> 17-Aug-2015 17:19             1314592
us-15-Long-Graphic-Content-Ahead-Towards-Automa..> 06-Aug-2015 01:02             4650080
us-15-MarquisBoire-Big-Game-Hunting-The-Peculia..> 06-Aug-2015 01:02              597906
us-15-Mayer-Faux-Disk-Encryption-Realities-Of-S..> 06-Aug-2015 01:16             2509034
us-15-Mellen-Mobile-Point-Of-Scam-Attacking-The..> 01-Sep-2015 18:45             5515240
us-15-Mellen-Mobile-Point-Of-Scam-Attacking-The..> 06-Aug-2015 01:02             7418553
us-15-Metcalf-Red-Vs-Blue-Modern-Active-Directo..> 06-Aug-2015 01:02             1464406
us-15-Metcalf-Red-Vs-Blue-Modern-Active-Directo..> 17-Aug-2015 17:19             2861233
us-15-Moore-Defeating Pass-the-Hash-Separation-..> 06-Aug-2015 01:02              722229
us-15-Moore-Defeating Pass-the-Hash-Separation-..> 06-Aug-2015 01:02             1725841
us-15-Moore-Spread-Spectrum-Satcom-Hacking-Atta..> 06-Aug-2015 01:02              208060
us-15-Moore-Spread-Spectrum-Satcom-Hacking-Atta..> 06-Aug-2015 01:02             4472908
us-15-Morgan-Web-Timing-Attacks-Made-Practical-..> 07-Aug-2015 01:40             1010489
us-15-Morgan-Web-Timing-Attacks-Made-Practical.pdf 07-Aug-2015 01:40              759767
us-15-Morris-CrackLord-Maximizing-Password-Crac..> 07-Aug-2015 01:40              911682
us-15-Morris-CrackLord-Maximizing-Password-Crac..> 07-Aug-2015 01:40              278626
us-15-Morris-CrackLord-Maximizing-Password-Crac..> 17-Aug-2015 17:19             2071476
us-15-Mulliner-Breaking-Payloads-With-Runtime-C..> 07-Aug-2015 01:40               81416
us-15-Mulliner-Breaking-Payloads-With-Runtime-C..> 07-Aug-2015 01:40             3038495
us-15-Nafeez-Dom-Flow-Untangling-The-DOM-For-Mo..> 07-Aug-2015 01:40              929987
us-15-Nguyen-Unicorn-Next-Generation-CPU-Emulat..> 21-Aug-2015 18:04              768115
us-15-Ossmann-The-NSA-Playset-A-Year-Of-Toys-An..> 07-Aug-2015 01:40             1931772
us-15-Park-This-Is-DeepERENT-Tracking-App-Behav..> 06-Aug-2015 01:02             1812130
us-15-Park-Winning-The-Online-Banking-War-wp.pdf   06-Aug-2015 01:02             4360716
us-15-Park-Winning-The-Online-Banking-War.pdf      06-Aug-2015 01:02             5746370
us-15-Peterson-GameOver-Zeus-Badguys-And-Backen..> 06-Aug-2015 01:02             1248116
us-15-Peterson-GameOver-Zeus-Badguys-And-Backen..> 16-Oct-2015 15:50             8327691
us-15-Pickett-Staying-Persistent-In-Software-De..> 07-Aug-2015 02:08             1873957
us-15-Pickett-Staying-Persistent-In-Software-De..> 07-Aug-2015 02:08              193622
us-15-Pickett-Staying-Persistent-In-Software-De..> 07-Aug-2015 02:08             2046561
us-15-Pinto-Data-Driven-Threat-Intelligence-Met..> 21-Aug-2015 18:04             5475770
us-15-Pitts-Repurposing-OnionDuke-A-Single-Case..> 07-Aug-2015 01:40             3393602
us-15-Pitts-Repurposing-OnionDuke-A-Single-Case..> 07-Aug-2015 01:40             9151141
us-15-Potter-Understanding-And-Managing-Entropy..> 06-Aug-2015 01:02              445927
us-15-Potter-Understanding-And-Managing-Entropy..> 17-Aug-2015 17:19             6930835
us-15-Price-Hi-This-Is-Urgent-Plz-Fix-ASAP-Crit..> 17-Aug-2015 17:19             5029803
us-15-Remes-Internet-Plumbing-For-Security-Prof..> 06-Aug-2015 01:02              109354
us-15-Remes-Internet-Plumbing-For-Security-Prof..> 06-Aug-2015 01:02             1167748
us-15-Sandvik-When-IoT-Attacks-Hacking-A-Linux-..> 07-Aug-2015 01:40             5329431
us-15-Saxe-Why-Security-Data-Science-Matters-An..> 01-Sep-2015 18:45            97689363
us-15-Seaborn-Exploiting-The-DRAM-Rowhammer-Bug..> 06-Aug-2015 01:02              368167
us-15-Seaborn-Exploiting-The-DRAM-Rowhammer-Bug..> 06-Aug-2015 01:02             1091840
us-15-Shen-Attacking-Your-Trusted-Core-Exploiti..> 07-Aug-2015 01:40              218035
us-15-Shen-Attacking-Your-Trusted-Core-Exploiti..> 07-Aug-2015 01:40             6665421
us-15-Silvanovich-Attacking-ECMA-Script-Engines..> 06-Aug-2015 01:02              185043
us-15-Silvanovich-Attacking-ECMA-Script-Engines..> 06-Aug-2015 01:02              306767
us-15-Siman-The-Node-Js-Highway-Attacks-Are-At-..> 06-Aug-2015 01:02              730509
us-15-Smith-My-Bro-The-ELK-Obtaining-Context-Fr..> 07-Aug-2015 01:40              419211
us-15-Smith-My-Bro-The-ELK-Obtaining-Context-Fr..> 07-Aug-2015 01:40             1719044
us-15-Stone-WSUSpect-Compromising-Windows-Enter..> 07-Aug-2015 02:08              529500
us-15-Stone-WSUSpect-Compromising-Windows-Enter..> 07-Aug-2015 02:08             1861912
us-15-Talmat-Subverting-Satellite-Receivers-For..> 06-Aug-2015 01:02              686275
us-15-Talmat-Subverting-Satellite-Receivers-For..> 06-Aug-2015 01:02             7079774
us-15-Thomas-Advanced-IC-Reverse-Engineering-Te..> 01-Sep-2015 18:45             7068341
us-15-Thomas-Advanced-IC-Reverse-Engineering-Te..> 07-Aug-2015 01:40            21644362
us-15-Vandevanter-Exploiting-XXE-Vulnerabilitie..> 07-Aug-2015 01:40               49025
us-15-Vandevanter-Exploiting-XXE-Vulnerabilitie..> 07-Aug-2015 01:40             1044770
us-15-Vixie-Targeted-Takedowns-Minimizing-Colla..> 06-Aug-2015 01:02              898650
us-15-Wang-FileCry-The-New-Age-Of-XXE-ie-wp.pdf    07-Aug-2015 01:40              739289
us-15-Wang-FileCry-The-New-Age-Of-XXE-java-wp.pdf  07-Aug-2015 01:40               83859
us-15-Wang-FileCry-The-New-Age-Of-XXE.pdf          17-Aug-2015 17:19            10465137
us-15-Wang-Review-And-Exploit-Neglected-Attack-..> 07-Aug-2015 01:40             3791752
us-15-Wang-The-Applications-Of-Deep-Learning-On..> 07-Aug-2015 01:40              331500
us-15-Wang-The-Applications-Of-Deep-Learning-On..> 07-Aug-2015 01:40             1972734
us-15-Wardle-Writing-Bad-A-Malware-For-OS-X.pdf    06-Aug-2015 01:02            49567267
us-15-Wilhoit-The-Little-Pump-Gauge-That-Could-..> 06-Aug-2015 01:02             3230495
us-15-Wilhoit-The-Little-Pump-Gauge-That-Could-..> 06-Aug-2015 01:02             4257610
us-15-Xenakis-ROPInjector-Using-Return-Oriented..> 07-Aug-2015 01:40              724266
us-15-Xenakis-ROPInjector-Using-Return-Oriented..> 07-Aug-2015 01:40              383538
us-15-Xu-Ah-Universal-Android-Rooting-Is-Back-w..> 07-Aug-2015 01:40              580545
us-15-Xu-Ah-Universal-Android-Rooting-Is-Back.pdf  17-Aug-2015 17:19             4864479
us-15-Yason-Understanding-The-Attack-Surface-An..> 01-Sep-2015 18:45              847294
us-15-Yason-Understanding-The-Attack-Surface-An..> 01-Sep-2015 18:45             1365003
us-15-Yu-Cloning-3G-4G-SIM-Cards-With-A-PC-And-..> 06-Aug-2015 01:02             1572154
us-15-Yu-Cloning-3G-4G-SIM-Cards-With-A-PC-And-..> 21-Aug-2015 18:04             2567626
us-15-Zadeh-From-False-Positives-To-Actionable-..> 17-Aug-2015 17:19             1458495
us-15-Zadeh-From-False-Positives-To-Actionable-..> 17-Aug-2015 17:19            16984850
us-15-Zhang-Bypass-Control-Flow-Guard-Comprehen..> 07-Aug-2015 01:40              435447
us-15-Zhang-Bypass-Control-Flow-Guard-Comprehen..> 07-Aug-2015 01:40              657488
us-15-Zhang-Fingerprints-On-Mobile-Devices-Abus..> 07-Aug-2015 01:40              981671
us-15-Zhang-Fingerprints-On-Mobile-Devices-Abus..> 07-Aug-2015 01:40             3663689
us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad..> 17-Aug-2015 17:19             2419842
us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad..> 17-Aug-2015 17:19             6669855