BlackHat USA 2022 作者: Hack Inn 时间: August 12, 2022 分类: 安全大会资料 访问: 20,562 次 ![logo.png](https://data.hackinn.com/ppt/BlackHatUSA2022/logo.png) > 大会刚刚结束,会议主办方还没有公开全部的议题内容,Hack Inn将持续为您更新 #### 1、[Invisible Finger:Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices](https://data.hackinn.com/ppt/BlackHatUSA2022/Invisible%20Finger:Practical%20Electromagnetic%20Interference%20Attack%20on%20Touchscreen-based%20Electronic%20Devices-NEW.pdf) #### 2、[All Your GNN Models and Data Belong to Me](https://data.hackinn.com/ppt/BlackHatUSA2022/All%20Your%20GNN%20Models%20and%20Data%20Belong%20to%20Me.pdf) #### 3、[In Need of 'Pair' Review:Vulnerable Code Contributions by GitHub Copilot](https://data.hackinn.com/ppt/BlackHatUSA2022/In%20Need%20of%20'Pair'%20Review:Vulnerable%20Code%20Contributions%20by%20GitHub%20Copilot.pdf) #### 4、[A Fully Trained Jedi, You Are Not](https://data.hackinn.com/ppt/BlackHatUSA2022/A%20Fully%20Trained%20Jedi,%20You%20Are%20Not.pdf) #### 5、[UWB Real Time Locating Systems:How Secure Radio Communications May Fail in Practice](https://data.hackinn.com/ppt/BlackHatUSA2022/UWB%20Real%20Time%20Locating%20Systems:How%20Secure%20Radio%20Communications%20May%20Fail%20in%20Practice.pdf) #### 6、[Unlimited Results:Breaking Firmware Encryption of ESP32-V3](https://data.hackinn.com/ppt/BlackHatUSA2022/Unlimited%20Results:Breaking%20Firmware%20Encryption%20of%20ESP32-V3.pdf) #### 7、[Return to Sender - Detecting Kernel Exploits with eBPF](https://data.hackinn.com/ppt/BlackHatUSA2022/Return%20to%20Sender%20-%20Detecting%20Kernel%20Exploits%20with%20eBPF.pdf) #### 8、[Google Reimagined a Phone. It was Our Job to Red Team and Secure it.](https://data.hackinn.com/ppt/BlackHatUSA2022/Google%20Reimagined%20a%20Phone.%20It%20was%20Our%20Job%20to%20Red%20Team%20and%20Secure%20it..pdf) #### 9、[New Memory Forensics Techniques to Defeat Device Monitoring Malware](https://data.hackinn.com/ppt/BlackHatUSA2022/New%20Memory%20Forensics%20Techniques%20to%20Defeat%20Device%20Monitoring%20Malware.pdf) #### 10、[The Growth of Global Election Disinformation:The Role and Methodology of Government-linked Cyber Actors](https://data.hackinn.com/ppt/BlackHatUSA2022/The%20Growth%20of%20Global%20Election%20Disinformation:The%20Role%20and%20Methodology%20of%20Government-linked%20Cyber%20Actors.pdf) #### 11、[Monitoring Surveillance Vendors:A Deep Dive into In-the-Wild Android Full Chains in 2021](https://data.hackinn.com/ppt/BlackHatUSA2022/Monitoring%20Surveillance%20Vendors:A%20Deep%20Dive%20into%20In-the-Wild%20Android%20Full%20Chains%20in%202021.pdf) #### 12、[Trace Me if You Can:Bypassing Linux Syscall Tracing](https://data.hackinn.com/ppt/BlackHatUSA2022/Trace%20Me%20if%20You%20Can:Bypassing%20Linux%20Syscall%20Tracing.pdf) #### 13、[Harm Reduction:A Framework for Effective & Compassionate Security Guidance](https://data.hackinn.com/ppt/BlackHatUSA2022/Harm%20Reduction:A%20Framework%20for%20Effective%20&%20Compassionate%20Security%20Guidance.pdf) #### 14、[Android Universal Root:Exploiting Mobile GPU : Command Queue Drivers](https://data.hackinn.com/ppt/BlackHatUSA2022/Android%20Universal%20Root:Exploiting%20Mobile%20GPU%20:%20Command%20Queue%20Drivers.pdf) #### 15、[BrokenMesh:New Attack Surfaces of Bluetooth Mesh](https://data.hackinn.com/ppt/BlackHatUSA2022/BrokenMesh:New%20Attack%20Surfaces%20of%20Bluetooth%20Mesh.pdf) #### 16、[Blasting Event-Driven Cornucopia:WMI-based User-Space Attacks Blind SIEMs and EDRs](https://data.hackinn.com/ppt/BlackHatUSA2022/Blasting%20Event-Driven%20Cornucopia:WMI-based%20User-Space%20Attacks%20Blind%20SIEMs%20and%20EDRs.pdf) #### 17、[RCE-as-a-Service:Lessons Learned from 5 Years of Real-World CI:CD Pipeline Compromise](https://data.hackinn.com/ppt/BlackHatUSA2022/RCE-as-a-Service:Lessons%20Learned%20from%205%20Years%20of%20Real-World%20CI:CD%20Pipeline%20Compromise.pdf) #### 18、[The Open Threat Hunting Framework:Enabling Organizations to Build, Operationalize, and Scale Threat Hunting](https://data.hackinn.com/ppt/BlackHatUSA2022/The%20Open%20Threat%20Hunting%20Framework:Enabling%20Organizations%20to%20Build,%20Operationalize,%20and%20Scale%20Threat%20Hunting.pdf) #### 19、[Dragon Tails – Measuring Dependence on International Vulnerability Research](https://data.hackinn.com/ppt/BlackHatUSA2022/Dragon%20Tails%20–%20Measuring%20Dependence%20on%20International%20Vulnerability%20Research.pdf) #### 20、[Elevating Kerberos to the Next Level](https://data.hackinn.com/ppt/BlackHatUSA2022/Elevating%20Kerberos%20to%20the%20Next%20Level.pdf) #### 21、[Attacks From a New Front Door in 4G & 5G Mobile Networks](https://data.hackinn.com/ppt/BlackHatUSA2022/Attacks%20From%20a%20New%20Front%20Door%20in%204G%20&%205G%20Mobile%20Networks.pdf) #### 22、[Glitched on Earth by Humans:A Black-Box Security Evaluation of the SpaceX Starlink User Terminal](https://data.hackinn.com/ppt/BlackHatUSA2022/Glitched%20on%20Earth%20by%20Humans:A%20Black-Box%20Security%20Evaluation%20of%20the%20SpaceX%20Starlink%20User%20Terminal.pdf) #### 23、[Backdooring and Hijacking Azure AD Accounts by Abusing External Identities](https://data.hackinn.com/ppt/BlackHatUSA2022/Backdooring%20and%20Hijacking%20Azure%20AD%20Accounts%20by%20Abusing%20External%20Identities.pdf) #### 24、[Better Privacy Through Offense:How To Build a Privacy Red Team](https://data.hackinn.com/ppt/BlackHatUSA2022/Better%20Privacy%20Through%20Offense:How%20To%20Build%20a%20Privacy%20Red%20Team.pdf) #### 25、[Fault-Injection Detection Circuits:Design, Calibration, Validation and Tuning](https://data.hackinn.com/ppt/BlackHatUSA2022/Fault-Injection%20Detection%20Circuits:Design,%20Calibration,%20Validation%20and%20Tuning.pdf) #### 26、[AAD Joined Machines - The New Lateral Movement](https://data.hackinn.com/ppt/BlackHatUSA2022/AAD%20Joined%20Machines%20-%20The%20New%20Lateral%20Movement.pdf) #### 27、[A New Trend for the Blue Team - Using a Practical Symbolic Engine to Detect Evasive Forms of Malware:Ransomware](https://data.hackinn.com/ppt/BlackHatUSA2022/A%20New%20Trend%20for%20the%20Blue%20Team%20-%20Using%20a%20Practical%20Symbolic%20Engine%20to%20Detect%20Evasive%20Forms%20of%20Malware:Ransomware.pdf) #### 28、[Automatic Protocol Reverse Engineering](https://data.hackinn.com/ppt/BlackHatUSA2022/Automatic%20Protocol%20Reverse%20Engineering.pdf) #### 29、[Internal Server Error:Exploiting Inter-Process Communication in SAP's HTTP Server](https://data.hackinn.com/ppt/BlackHatUSA2022/Internal%20Server%20Error:Exploiting%20Inter-Process%20Communication%20in%20SAP's%20HTTP%20Server.pdf) #### 30、[Breaking the Chrome Sandbox with Mojo](https://data.hackinn.com/ppt/BlackHatUSA2022/Breaking%20the%20Chrome%20Sandbox%20with%20Mojo.pdf) #### 31、[Devils Are in the File Descriptors:It Is Time To Catch Them All](https://data.hackinn.com/ppt/BlackHatUSA2022/Devils%20Are%20in%20the%20File%20Descriptors:It%20Is%20Time%20To%20Catch%20Them%20All.pdf) #### 32、[Trying to Be Everything to Everyone:Let’s Talk About Burnout](https://data.hackinn.com/ppt/BlackHatUSA2022/Trying%20to%20Be%20Everything%20to%20Everyone:Let’s%20Talk%20About%20Burnout.pdf) #### 33、[Smishmash - Text Based 2fa Spoofing Using OSINT, Phishing Techniques and a Burner Phone](https://data.hackinn.com/ppt/BlackHatUSA2022/Smishmash%20-%20Text%20Based%202fa%20Spoofing%20Using%20OSINT,%20Phishing%20Techniques%20and%20a%20Burner%20Phone.pdf) #### 34、[Stalloris:RPKI Downgrade Attack](https://data.hackinn.com/ppt/BlackHatUSA2022/Stalloris:RPKI%20Downgrade%20Attack.pdf) #### 35、[IAM The One Who Knocks](https://data.hackinn.com/ppt/BlackHatUSA2022/IAM%20The%20One%20Who%20Knocks.pdf) #### 36、[A Journey Into Fuzzing WebAssembly Virtual Machines](https://data.hackinn.com/ppt/BlackHatUSA2022/A%20Journey%20Into%20Fuzzing%20WebAssembly%20Virtual%20Machines.pdf) #### 37、[Demystifying Key Stretching and PAKEs](https://data.hackinn.com/ppt/BlackHatUSA2022/Demystifying%20Key%20Stretching%20and%20PAKEs.pdf) #### 38、[Trust Dies in Darkness:Shedding Light on Samsung's TrustZone Keymaster Design](https://data.hackinn.com/ppt/BlackHatUSA2022/Trust%20Dies%20in%20Darkness:Shedding%20Light%20on%20Samsung's%20TrustZone%20Keymaster%20Design.pdf) #### 39、[Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS](https://data.hackinn.com/ppt/BlackHatUSA2022/Let's%20Dance%20in%20the%20Cache%20-%20Destabilizing%20Hash%20Table%20on%20Microsoft%20IIS.pdf) #### 40、[ELF Section Docking:Revisiting Stageless Payload Delivery](https://data.hackinn.com/ppt/BlackHatUSA2022/ELF%20Section%20Docking:Revisiting%20Stageless%20Payload%20Delivery.pdf) #### 41、[Architecturally Leaking Data from the Microarchitecture](https://data.hackinn.com/ppt/BlackHatUSA2022/Architecturally%20Leaking%20Data%20from%20the%20Microarchitecture.pdf) #### 42、[sOfT7:Revealing the Secrets of Siemens S7 PLCs](https://data.hackinn.com/ppt/BlackHatUSA2022/sOfT7:Revealing%20the%20Secrets%20of%20Siemens%20S7%20PLCs.pdf) #### 43、[I Am Whoever I Say I Am:Infiltrating Identity Providers Using a 0Click Exploit](https://data.hackinn.com/ppt/BlackHatUSA2022/I%20Am%20Whoever%20I%20Say%20I%20Am:Infiltrating%20Identity%20Providers%20Using%20a%200Click%20Exploit.pdf) #### 44、[Dive Into Apple IO80211Family Vol. 2](https://data.hackinn.com/ppt/BlackHatUSA2022/Dive%20Into%20Apple%20IO80211Family%20Vol.%202.pdf) #### 45、[Browser-Powered Desync Attacks:A New Frontier in HTTP Request Smuggling](https://data.hackinn.com/ppt/BlackHatUSA2022/Browser-Powered%20Desync%20Attacks:A%20New%20Frontier%20in%20HTTP%20Request%20Smuggling.pdf) #### 46、[To Flexibly Tame Kernel Execution With Onsite Analysis](https://data.hackinn.com/ppt/BlackHatUSA2022/To%20Flexibly%20Tame%20Kernel%20Execution%20With%20Onsite%20Analysis.pdf) #### 47、[Industroyer2:Sandworm's Cyberwarfare Targets Ukraine's Power Grid Again](https://data.hackinn.com/ppt/BlackHatUSA2022/Industroyer2:Sandworm's%20Cyberwarfare%20Targets%20Ukraine's%20Power%20Grid%20Again.pdf) #### 48、[Is WebAssembly Really Safe? --Wasm VM Escape and RCE Vulnerabilities Have Been Found in New Way](https://data.hackinn.com/ppt/BlackHatUSA2022/Is%20WebAssembly%20Really%20Safe?%20--Wasm%20VM%20Escape%20and%20RCE%20Vulnerabilities%20Have%20Been%20Found%20in%20New%20Way.pdf) 关注**Hack Inn微信公众号**,回复“**BlackHat USA 2022**”获取《BlackHat USA 2022》会议完整**资料打包下载**地址,含会议简报、白皮书及工具~ ![gzh](https://data.hackinn.com/photo/gzh/qr-sys.jpg) > 版权归主办方BlackHat及演讲者所有,若有任何问题请及时联系我们或者在下方留言, 邮箱:admin“@”hackinn.com 标签: none