Upload
others
View
6
Download
0
Embed Size (px)
Citation preview
AMOUNT FOR PURCHASE $___________SHIPPING AND HANDLING $___________
SALES TAX (SEE RATES BELOW) $___________
TOTAL AMOUNT $___________
Please order online at blackhatbriefingsonline.com or visit our sales desk location
PLEASE PROVIDE BUSINESS CARD OR COMPLETE FORM
NAME:
COMPANY:
STREET (NO INT’L PO BOX):
CITY: ST: ZIP:
COUNTRY:
TEL: ( )
EMAIL:
CV CODE
ALL SALES ARE FINAL
Scan & Order OnlineHOW TO ORDERONLINE blackhatbriefingsonline.comQR-CODE Scan with a QR-Code Reader ON-SITE Bring this form with payment and shipping information to the Sales DeskEMAIL [email protected]
MAIL Send completed form & payment to Source of Knowledge 3137 West Tompkins Ave. Las Vegas, NV 89103 PHONE +1 702 600 1990 8am-3pm (PST) M-F FAX +1 858 408 9423
BILLING ZIP CODE
EXPIRATION DATE
CREDIT CARD OR P.O. NUMBER
TAX RATES: CA 7.75% FL 6.5% NV 8.15% NY 8.13% TX 8.25%
q VISA q MASTERCARD q AMEX q DISCOVER
Signature:
SHIPPING AND HANDLING COSTS*
U.S. and U.S. TERRITORIES $10 PER ORDER EUROPE ‡, MEXICO, CANADA and AUSTRALIA $40 PER ORDER ASIA‡ $100 PER ORDER AFRICA, SOUTH AMERICA and MIDDLE EAST: STREAMING ONLY All U.S. orders shipped priority mail‡ Orders outside the U.S. shipped via trackable carrier
2017 Black Hat Asia
The sessions are being recorded at Black Hat Asia 2017. The recordings are professional, unedited, live recordings that are guaranteed for life. PLEASE NOTE: Recording options may change. Some sessions may be omitted due to speaker or program revisions.
EVEN
T RE
CORD
ING
S
Online Streaming
USB + Enterprise License (Includes: Online Streaming)
View slides and demos “synched” with speaker video of recorded sessions storedon a USB thumb drive plus an Enterprise License to provide accessand/or post the media files within your organization
View slides and demos “synched” with speaker video of all recorded sessionsvia online streaming
Annual Pass: Black Hat Asia 2017; Black Hat USA 2017; Black Hat Europe 2017
Black Hat Asia 2017
On-Site
On-Site
Post-Con
Post-Con
$599 (+ s/h)
$199 (+ s/h)
$799 (+ s/h)
$299 (+ s/h)
Annual Pass: Black Hat Asia 2017; Black Hat USA 2017; Black Hat Europe 2017 Pay only one shipping fee
Black Hat Asia 2017 $499+s/h
(+ s/h)
$299+s/h
(+ s/h)
$999+s/h
(+ s/h)
$799+s/h
(+ s/h)
**Multi Seat Licenses Available (see flyer at sales desk)**
SESSIONS AVAILABLE . . .
001 Welcome & Introduction to Black Hat Asia 2017 TBD
002 Keynote: Why We are Not Building a Defendable Internet Halvar Flake
003 What Malware Authors Don’t Want You to Know - Evasive Hollow Process Injection Monnappa KA
004 Domo Arigato, Mr. Roboto: Security Robots a la Unit-Testing Seth Law
005 Fried Apples: Jailbreak DIY Max Bazaliy, Vlad Putin, Alex Hude
006 Exploiting USB/IP in Linux Ignat
007 Daily-Life Peeper: Bug Hunting and Exploit Techniques in IoT Yuhao Song, Huiming Liu
008 Delegate to the Top: Abusing Kerberos for Arbitrary Impersonations and RCE Matan Hart
009 Phishing for Funds: Understanding Business Email Compromise Keith Turpin
010 Anti-Plugin: Don’t Let Your App Play as an Android Plugin Tongbo Luo, Zhi Xu, Cong Zheng
011 “Man-in-the-SCADA:” Anatomy of Data Integrity Attacks in Industrial Control Systems Marina Krotofil, Chris Sistrunk
012 Open Sourcing Automotive Diagnostics Eric Evenchick
013 Hello From the Other Side: SSH Over Robust Cache Covert Channels in the Cloud Michael Schwarz, Manuel Weber
014 Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge Henry Li
015 Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox Marco Grassi
016 TBD TBD
017 Drop the ROP: Fine-Grained Control-Flow Integrity for the Linux Kernel João Moreira
018 The Irrelevance of K-Bytes Detection - Building a Robust Pipeline for Malicious Documents Dan Amiga, Dor Knafo
019 Hacking HTTP/2 - New Attacks on the Internet’s Next Generation Foundation Nadav Avital
020 TBD TBD
021 Dig Into the Attack Surface of PDF and Gain 100+ CVEs in 1 Year Ke Liu
022 Breaking Korea Transit Card with Side-Channel Attack - Unauthorized Recharging Tae Won Kim
023 Keynote: The Seven Axioms of Security Saumil Shah
024 Beyond the Blacklists: Detecting Malicious URL Through Machine Learning Hao Dong, Jin Shang
025 The UEFI Firmware Rootkits: Myths and Reality Alex Matrosov, Eugene Rodionov
026 Hack Microsoft Using Microsoft Signed Binaries Pierre-Alexandre Braeken
027 Never Let Your Guard Down: Finding Unguarded Gates to Bypass Control Flow Guard with Big Data Ke Sun, Ya Ou
028 24 Techniques to Gather Threat Intel and Track Actors Sun Huang, Wayne Huang
029 3G/4G Intranet Scanning and its Application on the WormHole Vulnerability Guangdong Bai, Zhang Qing
030 Myth and Truth About Hypervisor-Based Kernel Protector: The Reason Why You Need Shadow-Box Seunghun Han, Junghwan Kang
031 The Power of Data-Oriented Attacks: Bypassing Memory Mitigation Using Data-Only Exploitation Techniques Bing Sun, Chong Xu, Stanley Zhu
032 Mobile-Telephony Threats in Asia Payas Gupta
033 What Malware Authors Don’t Want You to Know - Evasive Hollow Process Injection Monnappa KA
034 Go Get My/Vulnerabilities: An In-Depth Analysis of Go Language Runtime and the New Class of Vulnerabilities It Introduces Roberto Clapis
035 Cache Side Channel Attack: Exploitability and Countermeasures Xiaofei Guo, Gorka Irazoqui
036 All Your Emails Belong to Us: Exploiting Vulnerable Email Clients via Domain Name Collision Ilya Nesterov, Maxim Goncharov
037 TBD TBD
038 Betting Against the House: Security and Stability When the Odds are Against You Neil Wyler, Bart Stump
039 MASHaBLE: Mobile Applications of Secret Handshakes Over Bluetooth LE Yan Michalevsky
040 Locknote: Conclusions & Key Takeaways from Black Hat Asia 2017 Moderated by Jeff Moss
Thursday, March 30, 2017 Thursday, March 30, 2017 (cont.)
Friday, March 31, 2017