BlackHat USA 2018 作者: Hack Inn 时间: August 21, 2018 分类: 安全大会资料 访问: 1,833 次 ![logo.png](https://data.hackinn.com/ppt/BlackHat-USA-2018/logo.png) #### 1、[Donenfeld WireGuard Next Generation Secure Network Tunnel](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Donenfeld-WireGuard-Next-Generation-Secure-Network-Tunnel.pdf) #### 2、[Gras TLBleed When Protecting Your CPU Caches is Not Enough](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Gras-TLBleed-When-Protecting-Your-CPU-Caches-is-Not-Enough.pdf) #### 3、[Hernandez Are You Trading Stocks Securely Exposing Security Flaws in Trading Technologies](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Hernandez-Are-You-Trading-Stocks-Securely-Exposing-Security-Flaws-in-Trading-Technologies.pdf) #### 4、[SINGH BACK TO THE FUTURE A RADICAL INSECURE DESIGN OF KVM ON ARM wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-SINGH-BACK-TO-THE-FUTURE-A-RADICAL-INSECURE-DESIGN-OF-KVM-ON-ARM-wp.pdf) #### 5、[Domas God Mode Unlocked Hardware Backdoors In x86 CPUs wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Domas-God-Mode-Unlocked-Hardware-Backdoors-In-x86-CPUs-wp.pdf) #### 6、[Wu Towards Automating Exploit Generation For Arbitrary Types of Kernel Vulnerabilities wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Wu-Towards-Automating-Exploit-Generation-For-Arbitrary-Types-of-Kernel-Vulnerabilities-wp.pdf) #### 7、[Dameff Mental Health Hacks Fighting Burnout Depression And Suicide In The Hacker Community](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Dameff-Mental-Health-Hacks-Fighting-Burnout-Depression-And-Suicide-In-The-Hacker-Community.pdf) #### 8、[Seymour Aqil Your Voice Is My Passport wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Seymour-Aqil-Your-Voice-Is-My-Passport-wp.pdf) #### 9、[Waisman Soler The Unbearable Lightness of BMC](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Waisman-Soler-The-Unbearable-Lightness-of-BMC.pdf) #### 10、[Nafeez Compression Oracle Attacks On Vpn Networks](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Nafeez-Compression-Oracle-Attacks-On-Vpn-Networks.pdf) #### 11、[Harang Measuring the Speed of the Red Queens Race](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Harang-Measuring-the-Speed-of-the-Red-Queens-Race.pdf) #### 12、[Mulasmajic Peterson Why So Spurious wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Mulasmajic-Peterson-Why-So-Spurious-wp.pdf) #### 13、[Crowley Outsmarting The Smart City wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Crowley-Outsmarting-The-Smart-City-wp.pdf) #### 14、[Haken Automated Discovery of Deserialization Gadget Chains wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Haken-Automated-Discovery-of-Deserialization-Gadget-Chains-wp.pdf) #### 15、[Rabet Hardening Hyper V Through Offensive Security Research](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Rabet-Hardening-Hyper-V-Through-Offensive-Security-Research.pdf) #### 16、[Shattuck Snooping on Cellular Gateways and Their Critical Role in ICS](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Shattuck-Snooping-on-Cellular-Gateways-and-Their-Critical-Role-in-ICS.pdf) #### 17、[Palansky Legal Liability For IoT Vulnerabilities](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Palansky-Legal-Liability-For-IoT-Vulnerabilities.pdf) #### 18、[Lee The Finest Penetration Testing Framework for Software Defined Networks](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Lee-The-Finest-Penetration-Testing-Framework-for-Software-Defined-Networks.pdf) #### 19、[Santamarta Last Call For Satcom Security wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Santamarta-Last-Call-For-Satcom-Security-wp.pdf) #### 20、[Schranz ARTist A Novel Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Schranz-ARTist-A-Novel-Instrumentation-Framework-for-Reversing-and-Analyzing-Android-Apps-and-the-Middleware-wp.pdf) #### 21、[Carcano TRITON How It Disrupted Safety Systems And Changed The Threat Landscape Of Industrial Control Systems Forever wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Carcano-TRITON-How-It-Disrupted-Safety-Systems-And-Changed-The-Threat-Landscape-Of-Industrial-Control-Systems-Forever-wp.pdf) #### 22、[Silvanovich The Problems and Promise of WebAssembly](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Silvanovich-The-Problems-and-Promise-of-WebAssembly.pdf) #### 23、[Camurati Screaming Channels When Electromagnetic Side Channels Meet Radio Tranceivers](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Camurati-Screaming-Channels-When-Electromagnetic-Side-Channels-Meet-Radio-Tranceivers.pdf) #### 24、[Domas God Mode Unlocked Hardware Backdoors In x86 CPUs](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Domas-God-Mode-Unlocked-Hardware-Backdoors-In-x86-CPUs.pdf) #### 25、[Boeck Young Return Of Bleichenbachers Oracle Threat wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Boeck-Young-Return-Of-Bleichenbachers-Oracle-Threat-wp.pdf) #### 26、[Graeber Subverting Sysmon Application Of A Formalized Security Product Evasion Methodology](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Graeber-Subverting-Sysmon-Application-Of-A-Formalized-Security-Product-Evasion-Methodology.pdf) #### 27、[Seymour Aqil Your Voice Is My Passport](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Seymour-Aqil-Your-Voice-Is-My-Passport.pdf) #### 28、[Das Two Factor Authentication Usable Or Not](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Das-Two-Factor-Authentication-Usable-Or-Not.pdf) #### 29、[Valsorda Squeezing A Key Through A Carry Bit](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Valsorda-Squeezing-A-Key-Through-A-Carry-Bit.pdf) #### 30、[Wixey Every ROSE Has Its Thorn The Dark Art Of Remote Online Social Engineering](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Wixey-Every-ROSE-Has-Its-Thorn-The-Dark-Art-Of-Remote-Online-Social-Engineering.pdf) #### 31、[Shostack Threat Modeling in 2018](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Shostack-Threat-Modeling-in-2018.pdf) #### 32、[Bengtson Detecting Credential Compromise In AWS](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Bengtson-Detecting-Credential-Compromise-In-AWS.pdf) #### 33、[Graeber Subverting Sysmon Application Of A Formalized Security Product Evasion Methodology wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Graeber-Subverting-Sysmon-Application-Of-A-Formalized-Security-Product-Evasion-Methodology-wp.pdf) #### 34、[Volokitin Software Attacks On Hardware Wallets wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Volokitin-Software-Attacks-On-Hardware-Wallets-wp.pdf) #### 35、[Endahl A Deep Dive Into macOS MDM And How It Can Be Compromised wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Endahl-A-Deep-Dive-Into-macOS-MDM-And-How-It-Can-Be-Compromised-wp.pdf) #### 36、[Gruss Another Flip In The Row wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Gruss-Another-Flip-In-The-Row-wp.pdf) #### 37、[Liu Over The Air How We Remotely Compromised The Gateway Bcm And Autopilot Ecus Of Tesla Cars wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Liu-Over-The-Air-How-We-Remotely-Compromised-The-Gateway-Bcm-And-Autopilot-Ecus-Of-Tesla-Cars-wp.pdf) #### 38、[Beery Open Sesame Picking Locks with Cortana](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Beery-Open-Sesame-Picking-Locks-with-Cortana.pdf) #### 39、[Bulazel Windows Offender Reverse Engineering Windows Defenders Antivirus Emulator](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Bulazel-Windows-Offender-Reverse-Engineering-Windows-Defenders-Antivirus-Emulator.pdf) #### 40、[Guilfanov Decompiler Internals Microcode](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Guilfanov-Decompiler-Internals-Microcode.pdf) #### 41、[Gollnick Smyth Money Rity Report Using Intelligence To Predict The Next Payment Card Victims](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Gollnick-Smyth-Money-Rity-Report-Using-Intelligence-To-Predict-The-Next-Payment-Card-Victims.pdf) #### 42、[Metcalf From Workstation To Domain Admin Why Secure Administration Isnt Secure](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Metcalf-From-Workstation-To-Domain-Admin-Why-Secure-Administration-Isnt-Secure.pdf) #### 43、[Milburn There Will Be Glitches Extracting And Analyzing Automotive Firmware Efficiently](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Milburn-There-Will-Be-Glitches-Extracting-And-Analyzing-Automotive-Firmware-Efficiently.pdf) #### 44、[Rikansrud Mainframe [zOS] Reverse Engineering and Exploit Development](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Rikansrud-Mainframe-[zOS]-Reverse-Engineering-and-Exploit-Development.pdf) #### 45、[Shaik LTE Network Automation Under Threat](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Shaik-LTE-Network-Automation-Under-Threat.pdf) #### 46、[Desimone Kernel Mode Threats and Practical Defenses](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Desimone-Kernel-Mode-Threats-and-Practical-Defenses.pdf) #### 47、[Mulasmajic Peterson Why So Spurious](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Mulasmajic-Peterson-Why-So-Spurious.pdf) #### 48、[Guilfanov Decompiler Internals Microcode wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Guilfanov-Decompiler-Internals-Microcode-wp.pdf) #### 49、[Valadon Reversing a Japanese Wireless SD Card From Zero to Code Execution](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Valadon-Reversing-a-Japanese-Wireless-SD-Card-From-Zero-to-Code-Execution.pdf) #### 50、[Wu Towards Automating Exploit Generation For Arbitrary Types of Kernel Vulnerabilities](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Wu-Towards-Automating-Exploit-Generation-For-Arbitrary-Types-of-Kernel-Vulnerabilities.pdf) #### 51、[Volokitin Software Attacks On Hardware Wallets](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Volokitin-Software-Attacks-On-Hardware-Wallets.pdf) #### 52、[Tomasello Holding On For Tonight Addiction In Infosec](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Tomasello-Holding-On-For-Tonight-Addiction-In-Infosec.pdf) #### 53、[Santamarta-Last-Call-For-Satcom-Security](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Santamarta-Last-Call-For-Satcom-Security.pdf) #### 54、[Mueller-Dresen-EFAIL-Breaking-SMIME-And-OpenPGP-Email-Encryption-Using-Exfiltration-Channels](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Mueller-Dresen-EFAIL-Breaking-SMIME-And-OpenPGP-Email-Encryption-Using-Exfiltration-Channels.pdf) #### 55、[Rousseau-Finding-Xori-Malware-Analysis-Triage-With-Automated-Disassembly](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Rousseau-Finding-Xori-Malware-Analysis-Triage-With-Automated-Disassembly.pdf) #### 56、[Holtz-The-Science-Of-Hiring-And-Retaining-Female-Cybersecurity-Engineers](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Holtz-The-Science-Of-Hiring-And-Retaining-Female-Cybersecurity-Engineers.pdf) #### 57、[Slowik-Demystifying-PTSD-In-The-Cybersecurity-Environment](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Slowik-Demystifying-PTSD-In-The-Cybersecurity-Environment.pdf) #### 58、[Malmquist-Exposing-The-Bait-A-Qualitative-Look-At-The-Impact-Of-Autonomous-Peer-Communication-To-Enhance-Organizational-Phishing-Detection](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Malmquist-Exposing-The-Bait-A-Qualitative-Look-At-The-Impact-Of-Autonomous-Peer-Communication-To-Enhance-Organizational-Phishing-Detection.pdf) #### 59、[Kettle-Practical-Web-Cache-Poisoning-Redefining-Unexploitable](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Kettle-Practical-Web-Cache-Poisoning-Redefining-Unexploitable.pdf) #### 60、[Lipner-SDL-For-The-Rest-Of-Us](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Lipner-SDL-For-The-Rest-Of-Us.pdf) #### 61、[Carcano-TRITON-How-It-Disrupted-Safety-Systems-And-Changed-The-Threat-Landscape-Of-Industrial-Control-Systems-Forever](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Carcano-TRITON-How-It-Disrupted-Safety-Systems-And-Changed-The-Threat-Landscape-Of-Industrial-Control-Systems-Forever.pdf) #### 62、[McGrew-An-Attacker-Looks-At-Docker-Approaching-Multi-Container-Applications-wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-McGrew-An-Attacker-Looks-At-Docker-Approaching-Multi-Container-Applications-wp.pdf) #### 63、[Dion_Marcil-Edge-Side-Include-Injection-Abusing-Caching-Servers-into-SSRF-and-Transparent-Session-Hijacking](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Dion_Marcil-Edge-Side-Include-Injection-Abusing-Caching-Servers-into-SSRF-and-Transparent-Session-Hijacking.pdf) #### 64、[Shaik-LTE-Network-Automation-Under-Threat-wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Shaik-LTE-Network-Automation-Under-Threat-wp.pdf) #### 65、[Schranz-ARTist-A-Novel-Instrumentation-Framework-for-Reversing-and-Analyzing-Android-Apps-and-the-Middleware](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Schranz-ARTist-A-Novel-Instrumentation-Framework-for-Reversing-and-Analyzing-Android-Apps-and-the-Middleware.pdf) #### 66、[Dameff-Pestilential-Protocol-How-Unsecure-HL7-Messages-Threaten-Patient-Lives-wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Dameff-Pestilential-Protocol-How-Unsecure-HL7-Messages-Threaten-Patient-Lives-wp.pdf) #### 67、[Kirat-DeepLocker-Concealing-Targeted-Attacks-with-AI-Locksmithing](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Kirat-DeepLocker-Concealing-Targeted-Attacks-with-AI-Locksmithing.pdf) #### 68、[Lukasiewicz-WebAssembly-A-New-World-of-Native_Exploits-On-The-Web-wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Lukasiewicz-WebAssembly-A-New-World-of-Native_Exploits-On-The-Web-wp.pdf) #### 69、[Hart-Real-Eyes-Realize-Real-Lies-Beating-Deception-Technologies](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Hart-Real-Eyes-Realize-Real-Lies-Beating-Deception-Technologies.pdf) #### 70、[Camurati-Screaming-Channels-When-Electromagnetic-Side-Channels-Meet-Radio-Tranceivers-wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Camurati-Screaming-Channels-When-Electromagnetic-Side-Channels-Meet-Radio-Tranceivers-wp.pdf) #### 71、[Geesaman-Detecting-Malicious-Cloud-Account-Behavior-A-Look-At-The-New-Native-Platform-Capabilities](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Geesaman-Detecting-Malicious-Cloud-Account-Behavior-A-Look-At-The-New-Native-Platform-Capabilities.pdf) #### 72、[Goland-Dissecting-Non-Malicious-Artifacts-One-IP-At-A-Time](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Goland-Dissecting-Non-Malicious-Artifacts-One-IP-At-A-Time.pdf) #### 73、[Lusthaus-Is-The-Mafia-Taking-Over-Cybercrime](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Lusthaus-Is-The-Mafia-Taking-Over-Cybercrime.pdf) #### 74、[Stennikov-Blackbox-is-dead--Long-live-Blackbox!](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Stennikov-Blackbox-is-dead--Long-live-Blackbox!.pdf) #### 75、[Haken-Automated-Discovery-of-Deserialization-Gadget-Chains](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Haken-Automated-Discovery-of-Deserialization-Gadget-Chains.pdf) #### 76、[Costin-Zaddach-IoT-Malware-Comprehensive-Survey-Analysis-Framework-and-Case-Studies](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Costin-Zaddach-IoT-Malware-Comprehensive-Survey-Analysis-Framework-and-Case-Studies.pdf) #### 77、[Paul-Stress-and-Hacking](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Paul-Stress-and-Hacking.pdf) #### 78、[Kobayashi-Reconstruct-The-World-From-Vanished-Shadow-Recovering-Deleted-VSS-Snapshots](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Kobayashi-Reconstruct-The-World-From-Vanished-Shadow-Recovering-Deleted-VSS-Snapshots.pdf) #### 79、[Endahl-A-Deep-Dive-Into-macOS-MDM-And-How-It-Can-Be-Compromised](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Endahl-A-Deep-Dive-Into-macOS-MDM-And-How-It-Can-Be-Compromised.pdf) #### 80、[Perlow-Beating-the-Blockchain-by-Mapping-Out_Decentralized_Namecoin-and-Emercoin-Infrastructure](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Perlow-Beating-the-Blockchain-by-Mapping-Out_Decentralized_Namecoin-and-Emercoin-Infrastructure.pdf) #### 81、[Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-And-Pop-0days-Out-2](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-And-Pop-0days-Out-2.pdf) #### 82、[Marty-AI-and-ML-in-Cybersecurity](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Marty-AI-and-ML-in-Cybersecurity.pdf) #### 83、[Bengtson-Detecting-Credential-Compromise-In-AWS-wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Bengtson-Detecting-Credential-Compromise-In-AWS-wp.pdf) #### 84、[Munro-Infosec-Philosophies-For-The-Corrupt-Economy](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Munro-Infosec-Philosophies-For-The-Corrupt-Economy.pdf) #### 85、[Boeck-Young-Return-Of-Bleichenbachers-Oracle-Threat](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Boeck-Young-Return-Of-Bleichenbachers-Oracle-Threat.pdf) #### 86、[Waisman-Soler-The-Unbearable-Lightness-of-BMC-wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Waisman-Soler-The-Unbearable-Lightness-of-BMC-wp.pdf) #### 87、[Perlow-Beating-the-Blockchain-by-Mapping-Out_Decentralized_Namecoin-and-Emercoin-Infrastructure-wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Perlow-Beating-the-Blockchain-by-Mapping-Out_Decentralized_Namecoin-and-Emercoin-Infrastructure-wp.pdf) #### 88、[GarciaAlguacil-MurilloMoya-Playback-A-TLS-1.3-Story](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-GarciaAlguacil-MurilloMoya-Playback-A-TLS-1.3-Story.pdf) #### 89、[Guri-AirGap](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Guri-AirGap.pdf) #### 90、[Little-Blockchain-Autopsies-Analyzing-Ethereum-Smart-Contract-Deaths](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Little-Blockchain-Autopsies-Analyzing-Ethereum-Smart-Contract-Deaths.pdf) #### 91、[Das-Two-Factor-Authentication-Usable-Or-Not-A-Two-Phase-Usability](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Das-Two-Factor-Authentication-Usable-Or-Not-A-Two-Phase-Usability.pdf) #### 92、[Gras-TLBleed-When-Protecting-Your-CPU-Caches-is-Not-Enough-w](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Gras-TLBleed-When-Protecting-Your-CPU-Caches-is-Not-Enough-w.pdf) #### 93、[Lusthaus-Is-The-Mafia-Taking-Over-Cybercrime-wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Lusthaus-Is-The-Mafia-Taking-Over-Cybercrime-wp.pdf) #### 94、[Fogh-Ertl-Wrangling-with-the-Ghost-An-Inside-Story-of-Mitigating-Speculative-Execution-Side-Channel-Vulnerabilities](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Fogh-Ertl-Wrangling-with-the-Ghost-An-Inside-Story-of-Mitigating-Speculative-Execution-Side-Channel-Vulnerabilities.pdf) #### 95、[Gruss-Another-Flip-in-the-Row](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Gruss-Another-Flip-in-the-Row.pdf) #### 96、[perin-ege-vanwoudenberg-Lowering-the-bar-Deep-learning-for-side-channel-analysis](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-perin-ege-vanwoudenberg-Lowering-the-bar-Deep-learning-for-side-channel-analysis.pdf) #### 97、[Stone-Unpacking-The-Packed-Unpacker](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Stone-Unpacking-The-Packed-Unpacker.pdf) #### 98、[perin-ege-vanwoudenberg-Lowering-the-bar-Deep-learning-for-side-channel-analysis-wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-perin-ege-vanwoudenberg-Lowering-the-bar-Deep-learning-for-side-channel-analysis-wp.pdf) #### 99、[Narula-Heilman-Cryptanalysis-of-Curl-P-wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Narula-Heilman-Cryptanalysis-of-Curl-P-wp.pdf) #### 100、[Ludwig-Identity-Theft-Attacks-On-SSO-Systems](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Ludwig-Identity-Theft-Attacks-On-SSO-Systems.pdf) #### 101、[McGrew-An-Attacker-Looks-At-Docker-Approaching-Multi-Container-Applications](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-McGrew-An-Attacker-Looks-At-Docker-Approaching-Multi-Container-Applications.pdf) #### 102、[Gollnick-Smyth-Money-Rity-Report-Using-Intelligence-To-Predict-The-Next-Payment-Card-Victims-wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Gollnick-Smyth-Money-Rity-Report-Using-Intelligence-To-Predict-The-Next-Payment-Card-Victims-wp.pdf) #### 103、[Costin-Zaddach-IoT-Malware-Comprehensive-Survey-Analysis-Framework-and-Case-Studies-wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Costin-Zaddach-IoT-Malware-Comprehensive-Survey-Analysis-Framework-and-Case-Studies-wp.pdf) #### 104、[Valsorda-Squeezing-A-Key-Through-A-Carry-Bit-wp](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Valsorda-Squeezing-A-Key-Through-A-Carry-Bit-wp.pdf) #### 105、[DesclauxMougey-Miasm-Reverse-Engineering-Framework](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-DesclauxMougey-Miasm-Reverse-Engineering-Framework.pdf) #### 106、[Narula-Heilman-Cryptanalysis-of-Curl-P](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Narula-Heilman-Cryptanalysis-of-Curl-P.pdf) #### 107、[Lukasiewicz-WebAssembly-A-New-World-of-Native_Exploits-On-The-Web](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Lukasiewicz-WebAssembly-A-New-World-of-Native_Exploits-On-The-Web.pdf) #### 108、[Peterson-How-Can-Communities-Move-Forward-After-Incidents-Of-Sexual-Harassment-Or-Assault](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Peterson-How-Can-Communities-Move-Forward-After-Incidents-Of-Sexual-Harassment-Or-Assault.pdf) #### 109、[Dameff-Pestilential-Protocol-How-Unsecure-HL7-Messages_Threaten-Patient-Lives](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Dameff-Pestilential-Protocol-How-Unsecure-HL7-Messages_Threaten-Patient-Lives.pdf) #### 110、[saxe-Deep-Learning-For-Hackers-Methods-Applications-and-Open-Source-Tools](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-saxe-Deep-Learning-For-Hackers-Methods-Applications-and-Open-Source-Tools.pdf) #### 111、[Postnikoff-From-Bot-To-Robot-How-Abilities-And-Law-Change-With-Physicality](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Postnikoff-From-Bot-To-Robot-How-Abilities-And-Law-Change-With-Physicality.pdf) #### 112、[Hui-None-Of-My-Pixel-Is-Your-Business-Active-Watermarking-Cancellation-Against-Video-Streaming-Service](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Hui-None-Of-My-Pixel-Is-Your-Business-Active-Watermarking-Cancellation-Against-Video-Streaming-Service.pdf) #### 113、[Hart-Real-Eyes-Realize-Real-Lies-Beating-Deception-Technologies](https://data.hackinn.com/ppt/BlackHat-USA-2018/us-18-Hart-Real-Eyes-Realize-Real-Lies-Beating-Deception-Technologies.pdf) 标签: none