Thursday, 27 July 2023

Sarah Elkins - Black Hat USA 2023


https://www.blackhat.com/us-23/briefings/schedule/#weaponizing-plain-text-ansi-escape-sequences-as-a-forensic-nightmare-31757
https://www.blackhat.com/us-23/briefings/schedule/#compromising-llms-the-advent-of-ai-malware-33075
https://www.blackhat.com/us-23/briefings/schedule/#zero-touch-pwn-abusing-zoom39s-zero-touch-provisioning-for-remote-attacks-on-desk-phones-31341
https://www.blackhat.com/us-23/briefings/schedule/#cookie-crumbles-unveiling-web-session-integrity-vulnerabilities-32551
https://www.blackhat.com/us-23/briefings/schedule/#does-public-disclosure-of-vulnerabilities-affect-hacker-participation-in-bug-bounty-programs-32916
https://www.blackhat.com/us-23/briefings/schedule/#mirage-cyber-deception-against-autonomous-cyber-attacks-33262
https://www.blackhat.com/us-23/briefings/schedule/#route-to-bugs-analyzing-the-security-of-bgp-message-parsing-32162
https://www.blackhat.com/us-23/briefings/schedule/#chained-to-hit-discovering-new-vectors-to-gain-remote-and-root-access-in-sap-enterprise-software-31340
https://www.blackhat.com/us-23/briefings/schedule/#defender-pretender-when-windows-defender-updates-become-a-security-risk-32706
https://www.blackhat.com/us-23/briefings/schedule/#entrepreneur-journeys-what-it-takes-to-start-a-startup-34863
https://www.blackhat.com/us-23/briefings/schedule/#defender-pretender-when-windows-defender-updates-become-a-security-risk-32706
https://www.blackhat.com/us-23/briefings/schedule/#edr--erase-data-remotely-by-cooking-an-unforgettable-byte-signature-dish-32630
https://www.blackhat.com/us-23/briefings/schedule/#all-you-need-is-guest-32647
https://www.blackhat.com/us-23/briefings/schedule/#the-integration-cyber-security-and-insurance-the-journey-of-cysurance-34232
https://www.blackhat.com/us-23/briefings/schedule/#bingbang-hacking-bingcom-and-much-more-with-azure-active-directory-33206
https://www.blackhat.com/us-23/briefings/schedule/#i-watched-you-roll-the-die-unparalleled-rdp-monitoring-reveal-attackers39-tradecraft-33110
https://www.blackhat.com/us-23/briefings/schedule/#devising-and-detecting-phishing-large-language-models-gpt3-gpt4-vs-smaller-human-models-v-triad-generic-emails-31659
https://www.blackhat.com/us-23/briefings/schedule/#dr1v3by-broken-80211-wifi-driver-leads-to-millions-of-vulnerable-cars-32057
https://www.blackhat.com/us-23/briefings/schedule/#i-watched-you-roll-the-die-unparalleled-rdp-monitoring-reveal-attackers39-tradecraft-33110
https://www.blackhat.com/us-23/briefings/schedule/#second-breakfast--implicit-and-mutation-based-serialization-vulnerabilities-in-net-32128
https://www.blackhat.com/us-23/briefings/schedule/#synthetic-trust-exploiting-biases-at-scale-32827
https://www.blackhat.com/us-23/briefings/schedule/#redacted-telecom-talk-31807
https://www.blackhat.com/us-23/briefings/schedule/#close-encounters-of-the-advanced-persistent-kind-leveraging-rootkits-for-post-exploitation-32913
https://www.blackhat.com/us-23/briefings/schedule/#a-pain-in-the-nas-exploiting-cloud-connectivity-to-pwn-your-nas-31536
https://www.blackhat.com/us-23/briefings/schedule/#exploiting-opc-ua-in-every-possible-way-practical-attacks-against-modern-opc-ua-architectures-31535
https://www.blackhat.com/us-23/briefings/schedule/#unsafe-at-any-speed-cisas-plan-to-foster-tech-ecosystem-security-33154
https://www.blackhat.com/us-23/briefings/schedule/#how-not-to-train-your-hack-bot-dos-and-don39ts-of-building-offensive-gpts-32773
https://www.blackhat.com/us-23/briefings/schedule/#me-and-my-evil-digital-twin-the-psychology-of-human-exploitation-by-ai-assistants-32661
https://www.blackhat.com/us-23/briefings/schedule/#bridging-cyber-and-insurance-34233
https://www.blackhat.com/us-23/briefings/schedule/#the-most-dangerous-codec-in-the-world-finding-and-exploiting-vulnerabilities-in-h264-decoders-33272
https://www.blackhat.com/us-23/briefings/schedule/#kill-latest-mpu-based-protections-in-just-one-shot-targeting-all-commodity-rtoses-32733
https://www.blackhat.com/us-23/briefings/schedule/#diving-into-windows-remote-access-service-for-pre-auth-bugs-31968
https://www.blackhat.com/us-23/briefings/schedule/#bad-io_uring-a-new-era-of-rooting-for-android-32243
https://www.blackhat.com/us-23/briefings/schedule/#ironman-interpretable-incident-inspector-based-on-large-scale-language-model-and-association-mining-33072
https://www.blackhat.com/us-23/briefings/schedule/#ironman-interpretable-incident-inspector-based-on-large-scale-language-model-and-association-mining-33072
https://www.blackhat.com/us-23/briefings/schedule/#edr--erase-data-remotely-by-cooking-an-unforgettable-byte-signature-dish-32630
https://www.blackhat.com/us-23/briefings/schedule/#lessons-learned-from-the-ka-sat-cyberattack-response-mitigation-and--information-sharing-34478
https://www.blackhat.com/us-23/briefings/schedule/#hot-topics-in-cyber-and-privacy-regulation-34410
https://www.blackhat.com/us-23/briefings/schedule/#route-to-bugs-analyzing-the-security-of-bgp-message-parsing-32162
https://www.blackhat.com/us-23/briefings/schedule/#diversity-microtalks-perspectives-on-creating-change-34066
https://www.blackhat.com/us-23/briefings/schedule/#leverage-and-demonstrate-value-with-your-cyber-insurance-renewal-34236
https://www.blackhat.com/us-23/briefings/schedule/#a-sslippery-slope-unraveling-the-hidden-dangers-of-certificate-misuse-33364
https://www.blackhat.com/us-23/briefings/schedule/#does-public-disclosure-of-vulnerabilities-affect-hacker-participation-in-bug-bounty-programs-32916
https://www.blackhat.com/us-23/briefings/schedule/#making-and-breaking-nsas-codebreaker-challenge-32912
https://www.blackhat.com/us-23/briefings/schedule/#route-to-bugs-analyzing-the-security-of-bgp-message-parsing-32162
https://www.blackhat.com/us-23/briefings/schedule/#jailbreaking-an-electric-vehicle-in-2023-or-what-it-means-to-hotwire-tesla39s-x86-based-seat-heater-33049
https://www.blackhat.com/us-23/briefings/schedule/#input-output--syslog-ios-obtaining-data-from-locked-ios-devices-via-live-monitoring-32304
https://www.blackhat.com/us-23/briefings/schedule/#keynote-phoenix-soaring-what-we-can-learn-from-ukraines-cyber-defenders-about-building-a-more-resilient-future-34912
https://www.blackhat.com/us-23/briefings/schedule/#harry-parser-and-the-cursed-tracker-breaking-the-spell-of-online-data-collection-32332
https://www.blackhat.com/us-23/briefings/schedule/#harry-parser-and-the-cursed-tracker-breaking-the-spell-of-online-data-collection-32332
https://www.blackhat.com/us-23/briefings/schedule/#kids-in-the-ad-fraud-crosshair-why-international-threat-actors-are-targeting-children-to-steal-money-from-banks-and-major-corporations-33370
https://www.blackhat.com/us-23/briefings/schedule/#diversity-microtalks-perspectives-on-creating-change-34066
https://www.blackhat.com/us-23/briefings/schedule/#apples-predicament-nspredicate-exploits-on-ios-and-macos-32451
https://www.blackhat.com/us-23/briefings/schedule/#compromising-llms-the-advent-of-ai-malware-33075
https://www.blackhat.com/us-23/briefings/schedule/#becoming-a-dark-knight-adversary-emulation-demonstration-for-attck-evaluations-33209
https://www.blackhat.com/us-23/briefings/schedule/#dive-into-apple-userfs-userspace-filesystem-32803
https://www.blackhat.com/us-23/briefings/schedule/#moustachedbouncer-aitm-powered-surveillance-via-belarus-isps-31833
https://www.blackhat.com/us-23/briefings/schedule/#uncovering-azure39s-silent-threats-a-journey-into-cloud-vulnerabilities-33073
https://www.blackhat.com/us-23/briefings/schedule/#evading-logging-in-the-cloud-bypassing-aws-cloudtrail-32741
https://www.blackhat.com/us-23/briefings/schedule/#compromising-llms-the-advent-of-ai-malware-33075
https://www.blackhat.com/us-23/briefings/schedule/#small-leaks-billions-of-dollars-practical-cryptographic-exploits-that-undermine-leading-crypto-wallets-32268
https://www.blackhat.com/us-23/briefings/schedule/#ai-assisted-decision-making-of-security-review-needs-for-new-features-31934
https://www.blackhat.com/us-23/briefings/schedule/#over-the-air-under-the-radar-attacking-and-securing-the-pixel-modem-33009
https://www.blackhat.com/us-23/briefings/schedule/#what-does-an-llm-powered-threat-intelligence-program-look-like-32511
https://www.blackhat.com/us-23/briefings/schedule/#compromising-llms-the-advent-of-ai-malware-33075
https://www.blackhat.com/us-23/briefings/schedule/#route-to-bugs-analyzing-the-security-of-bgp-message-parsing-32162
https://www.blackhat.com/us-23/briefings/schedule/#forward-focus-perspectives-on-ai-hype-and-security-34789
https://www.blackhat.com/us-23/briefings/schedule/#lost-control-breaking-hardware-assisted-kernel-control-flow-integrity-with-page-oriented-programming-32061
https://www.blackhat.com/us-23/briefings/schedule/#oddfuzz-hunting-java-deserialization-gadget-chains-via-structure-aware-directed-greybox-fuzzing-31367
https://www.blackhat.com/us-23/briefings/schedule/#devising-and-detecting-phishing-large-language-models-gpt3-gpt4-vs-smaller-human-models-v-triad-generic-emails-31659
https://www.blackhat.com/us-23/briefings/schedule/#forward-focus-perspectives-on-ai-hype-and-security-34789
https://www.blackhat.com/us-23/briefings/schedule/#how-not-to-train-your-hack-bot-dos-and-don39ts-of-building-offensive-gpts-32773
https://www.blackhat.com/us-23/briefings/schedule/#a-manufacturer39s-post-shipment-approach-to-fend-off-iot-malware-in-home-appliances-32528
https://www.blackhat.com/us-23/briefings/schedule/#hot-topics-in-cyber-and-privacy-regulation-34410
https://www.blackhat.com/us-23/briefings/schedule/#ironman-interpretable-incident-inspector-based-on-large-scale-language-model-and-association-mining-33072
https://www.blackhat.com/us-23/briefings/schedule/#input-output--syslog-ios-obtaining-data-from-locked-ios-devices-via-live-monitoring-32304
https://www.blackhat.com/us-23/briefings/schedule/#chained-to-hit-discovering-new-vectors-to-gain-remote-and-root-access-in-sap-enterprise-software-31340
https://www.blackhat.com/us-23/briefings/schedule/#video-based-cryptanalysis-recovering-cryptographic-keys-from-non-compromised-devices-using-video-footage-of-a-device39s-power-led-32093
https://www.blackhat.com/us-23/briefings/schedule/#physical-attacks-against-smartphones-32485
https://www.blackhat.com/us-23/briefings/schedule/#a-manufacturer39s-post-shipment-approach-to-fend-off-iot-malware-in-home-appliances-32528
https://www.blackhat.com/us-23/briefings/schedule/#jailbreaking-an-electric-vehicle-in-2023-or-what-it-means-to-hotwire-tesla39s-x86-based-seat-heater-33049
https://www.blackhat.com/us-23/briefings/schedule/#diversity-microtalks-perspectives-on-creating-change-34066
https://www.blackhat.com/us-23/briefings/schedule/#from-dead-data-to-digestion-extracting-windows-fibers-for-your-digital-forensics-diet-32832
https://www.blackhat.com/us-23/briefings/schedule/#i-was-tasked-with-enrolling-millions-of-developers-in-2fa---here39s-what-happened-32925
https://www.blackhat.com/us-23/briefings/schedule/#over-the-air-under-the-radar-attacking-and-securing-the-pixel-modem-33009
https://www.blackhat.com/us-23/briefings/schedule/#hot-topics-in-cyber-and-privacy-regulation-34410
https://www.blackhat.com/us-23/briefings/schedule/#route-to-bugs-analyzing-the-security-of-bgp-message-parsing-32162
https://www.blackhat.com/us-23/briefings/schedule/#smashing-the-state-machine-the-true-potential-of-web-race-conditions-31712
https://www.blackhat.com/us-23/briefings/schedule/#entrepreneur-journeys-what-it-takes-to-start-a-startup-34863
https://www.blackhat.com/us-23/briefings/schedule/#ai-assisted-decision-making-of-security-review-needs-for-new-features-31934
https://www.blackhat.com/us-23/briefings/schedule/#mirage-cyber-deception-against-autonomous-cyber-attacks-33262
https://www.blackhat.com/us-23/briefings/schedule/#lifting-the-fog-of-war---monitoring-identifying-and-mitigating-ms-rpc-based-threats-32792
https://www.blackhat.com/us-23/briefings/schedule/#jailbreaking-an-electric-vehicle-in-2023-or-what-it-means-to-hotwire-tesla39s-x86-based-seat-heater-33049
https://www.blackhat.com/us-23/briefings/schedule/#a-qa-with-a16zs-zane-lackey-unlocking-the-secrets-of-cybersecurity-entrepreneurship-34582
https://www.blackhat.com/us-23/briefings/schedule/#the-living-dead-hacking-mobile-face-recognition-sdks-with-non-deepfake-attacks-32096
https://www.blackhat.com/us-23/briefings/schedule/#mirage-cyber-deception-against-autonomous-cyber-attacks-33262
https://www.blackhat.com/us-23/briefings/schedule/#does-public-disclosure-of-vulnerabilities-affect-hacker-participation-in-bug-bounty-programs-32916
https://www.blackhat.com/us-23/briefings/schedule/#low-level-rasp-protecting-applications-implemented-in-high-level-programming-languages-32690
https://www.blackhat.com/us-23/briefings/schedule/#bad-io_uring-a-new-era-of-rooting-for-android-32243
https://www.blackhat.com/us-23/briefings/schedule/#btd-unleashing-the-power-of-decompilation-for-x86-deep-neural-network-executables-33028
https://www.blackhat.com/us-23/briefings/schedule/#btd-unleashing-the-power-of-decompilation-for-x86-deep-neural-network-executables-33028
https://www.blackhat.com/us-23/briefings/schedule/#maginotdns-attacking-the-boundary-of-dns-caching-protection-31901
https://www.blackhat.com/us-23/briefings/schedule/#maginotdns-attacking-the-boundary-of-dns-caching-protection-31901
https://www.blackhat.com/us-23/briefings/schedule/#low-level-rasp-protecting-applications-implemented-in-high-level-programming-languages-32690
https://www.blackhat.com/us-23/briefings/schedule/#kill-latest-mpu-based-protections-in-just-one-shot-targeting-all-commodity-rtoses-32733
https://www.blackhat.com/us-23/briefings/schedule/#kill-latest-mpu-based-protections-in-just-one-shot-targeting-all-commodity-rtoses-32733
https://www.blackhat.com/us-23/briefings/schedule/#bad-io_uring-a-new-era-of-rooting-for-android-32243
https://www.blackhat.com/us-23/briefings/schedule/#low-level-rasp-protecting-applications-implemented-in-high-level-programming-languages-32690
https://www.blackhat.com/us-23/briefings/schedule/#btd-unleashing-the-power-of-decompilation-for-x86-deep-neural-network-executables-33028
https://www.blackhat.com/us-23/briefings/schedule/#uncovering-azure39s-silent-threats-a-journey-into-cloud-vulnerabilities-33073
https://www.blackhat.com/us-23/briefings/schedule/#reflections-on-trust-in-the-software-supply-chain-31399
https://www.blackhat.com/us-23/briefings/schedule/#unsafe-at-any-speed-cisas-plan-to-foster-tech-ecosystem-security-33154
https://www.blackhat.com/us-23/briefings/schedule/#the-living-dead-hacking-mobile-face-recognition-sdks-with-non-deepfake-attacks-32096
https://www.blackhat.com/us-23/briefings/schedule/#why-cyber-insurance-should-be-your-socs-new-best-friend-34231
https://www.blackhat.com/us-23/briefings/schedule/#small-leaks-billions-of-dollars-practical-cryptographic-exploits-that-undermine-leading-crypto-wallets-32268
https://www.blackhat.com/us-23/briefings/schedule/#keynote-guardians-of-the-ai-era-navigating-the-cybersecurity-landscape-of-tomorrow-34911
https://www.blackhat.com/us-23/briefings/schedule/#the-yandex-leak-how-a-russian-search-giant-uses-consumer-data-33301
https://www.blackhat.com/us-23/briefings/schedule/#entrepreneur-journeys-what-it-takes-to-start-a-startup-34863
https://www.blackhat.com/us-23/briefings/schedule/#redacted-telecom-talk-31807
https://www.blackhat.com/us-23/briefings/schedule/#protecting-the-ciso-a-legal-journey-31541
https://www.blackhat.com/us-23/briefings/schedule/#lessons-learned-from-the-ka-sat-cyberattack-response-mitigation-and--information-sharing-34478
https://www.blackhat.com/us-23/briefings/schedule/#what-does-an-llm-powered-threat-intelligence-program-look-like-32511
https://www.blackhat.com/us-23/briefings/schedule/#know-thy-enemy-the-taxonomies-that-meta-uses-to-map-the-offensive-privacy-space-33230
https://www.blackhat.com/us-23/briefings/schedule/#compromising-llms-the-advent-of-ai-malware-33075
https://www.blackhat.com/us-23/briefings/schedule/#single-instruction-multiple-data-leaks-in-cutting-edge-cpus-aka-downfall-31490
https://www.blackhat.com/us-23/briefings/schedule/#identifying-and-reducing-permission-explosion-in-aws-a-graph-based-and-analytical-approach-33012
https://www.blackhat.com/us-23/briefings/schedule/#a-pain-in-the-nas-exploiting-cloud-connectivity-to-pwn-your-nas-31536
https://www.blackhat.com/us-23/briefings/schedule/#exploiting-opc-ua-in-every-possible-way-practical-attacks-against-modern-opc-ua-architectures-31535
https://www.blackhat.com/us-23/briefings/schedule/#oddfuzz-hunting-java-deserialization-gadget-chains-via-structure-aware-directed-greybox-fuzzing-31367
https://www.blackhat.com/us-23/briefings/schedule/#a-manufacturer39s-post-shipment-approach-to-fend-off-iot-malware-in-home-appliances-32528
https://www.blackhat.com/us-23/briefings/schedule/#video-based-cryptanalysis-recovering-cryptographic-keys-from-non-compromised-devices-using-video-footage-of-a-device39s-power-led-32093
https://www.blackhat.com/us-23/briefings/schedule/#the-9th-annual-black-hat-usa-network-operations-center-noc-report-34408
https://www.blackhat.com/us-23/briefings/schedule/#tsshock-breaking-mpc-wallets-and-digital-custodians-for-billion-profit-33343
https://www.blackhat.com/us-23/briefings/schedule/#tsshock-breaking-mpc-wallets-and-digital-custodians-for-billion-profit-33343
https://www.blackhat.com/us-23/briefings/schedule/#tsshock-breaking-mpc-wallets-and-digital-custodians-for-billion-profit-33343
https://www.blackhat.com/us-23/briefings/schedule/#tsshock-breaking-mpc-wallets-and-digital-custodians-for-billion-profit-33343
https://www.blackhat.com/us-23/briefings/schedule/#tsshock-breaking-mpc-wallets-and-digital-custodians-for-billion-profit-33343
https://www.blackhat.com/us-23/briefings/schedule/#shuffle-up-and-deal-analyzing-the-security-of-automated-card-shufflers-31741
https://www.blackhat.com/us-23/briefings/schedule/#oven-repair-the-hardware-hacking-way-31989
https://www.blackhat.com/us-23/briefings/schedule/#idea-to-realization-cybersecurity-entrepreneurship-34583
https://www.blackhat.com/us-23/briefings/schedule/#a-manufacturer39s-post-shipment-approach-to-fend-off-iot-malware-in-home-appliances-32528
https://www.blackhat.com/us-23/briefings/schedule/#oddfuzz-hunting-java-deserialization-gadget-chains-via-structure-aware-directed-greybox-fuzzing-31367
https://www.blackhat.com/us-23/briefings/schedule/#windows-agentless-c2-abusing-the-mdm-client-stack-32549
https://www.blackhat.com/us-23/briefings/schedule/#close-encounters-of-the-advanced-persistent-kind-leveraging-rootkits-for-post-exploitation-32913
https://www.blackhat.com/us-23/briefings/schedule/#poisoning-web-scale-training-datasets-is-practical-32112
https://www.blackhat.com/us-23/briefings/schedule/#risks-of-ai-risk-policy-five-lessons-32619
https://www.blackhat.com/us-23/briefings/schedule/#dismantling-ddos---lessons-in-scaling-31408
https://www.blackhat.com/us-23/briefings/schedule/#badge-of-shame-breaking-into-secure-facilities-with-osdp-32762
https://www.blackhat.com/us-23/briefings/schedule/#civil-cyber-defense-use-your-resources-to-defend-non-profits-as-they-combat-human-trafficking-and-subvert-authoritarian-regimes-32394
https://www.blackhat.com/us-23/briefings/schedule/#know-thy-enemy-the-taxonomies-that-meta-uses-to-map-the-offensive-privacy-space-33230
https://www.blackhat.com/us-23/briefings/schedule/#protecting-the-ciso-a-legal-journey-31541
https://www.blackhat.com/us-23/briefings/schedule/#codeql-also-a-powerful-binary-analysis-engine-31995
https://www.blackhat.com/us-23/briefings/schedule/#over-the-air-under-the-radar-attacking-and-securing-the-pixel-modem-33009
https://www.blackhat.com/us-23/briefings/schedule/#diversity-microtalks-perspectives-on-creating-change-34066
https://www.blackhat.com/us-23/briefings/schedule/#npm-and-sigstore-provenance-comes-to-the-world39s-largest-oss-ecosystem-32893
https://www.blackhat.com/us-23/briefings/schedule/#diversity-microtalks-perspectives-on-creating-change-34066
https://www.blackhat.com/us-23/briefings/schedule/#seeing-through-the-invisible-radiation-spikes-detected-in-chernobyl-during-the-russian-invasion-show-possible-evidence-of-fabrication-32941
https://www.blackhat.com/us-23/briefings/schedule/#lessons-learned-from-the-ka-sat-cyberattack-response-mitigation-and--information-sharing-34478
https://www.blackhat.com/us-23/briefings/schedule/#me-and-my-evil-digital-twin-the-psychology-of-human-exploitation-by-ai-assistants-32661
https://www.blackhat.com/us-23/briefings/schedule/#synthetic-trust-exploiting-biases-at-scale-32827
https://www.blackhat.com/us-23/briefings/schedule/#devising-and-detecting-phishing-large-language-models-gpt3-gpt4-vs-smaller-human-models-v-triad-generic-emails-31659
https://www.blackhat.com/us-23/briefings/schedule/#dismantling-ddos---lessons-in-scaling-31408
https://www.blackhat.com/us-23/briefings/schedule/#apple-pac-four-years-later-reverse-engineering-the-customized-pointer-authentication-hardware-implementation-on-apple-m1-32824
https://www.blackhat.com/us-23/briefings/schedule/#becoming-a-dark-knight-adversary-emulation-demonstration-for-attck-evaluations-33209
https://www.blackhat.com/us-23/briefings/schedule/#evasive-maneuvers-trends-in-phishing-evasion--anti-evasion-32161
https://www.blackhat.com/us-23/briefings/schedule/#the-most-dangerous-codec-in-the-world-finding-and-exploiting-vulnerabilities-in-h264-decoders-33272
https://www.blackhat.com/us-23/briefings/schedule/#shuffle-up-and-deal-analyzing-the-security-of-automated-card-shufflers-31741
https://www.blackhat.com/us-23/briefings/schedule/#civil-cyber-defense-use-your-resources-to-defend-non-profits-as-they-combat-human-trafficking-and-subvert-authoritarian-regimes-32394
https://www.blackhat.com/us-23/briefings/schedule/#kill-latest-mpu-based-protections-in-just-one-shot-targeting-all-commodity-rtoses-32733
https://www.blackhat.com/us-23/briefings/schedule/#apple-pac-four-years-later-reverse-engineering-the-customized-pointer-authentication-hardware-implementation-on-apple-m1-32824
https://www.blackhat.com/us-23/briefings/schedule/#fast-ever-evolving-defenders-the-resilience-revolution-32751
https://www.blackhat.com/us-23/briefings/schedule/#hot-topics-in-cyber-and-privacy-regulation-34410
https://www.blackhat.com/us-23/briefings/schedule/#entrepreneur-journeys-what-it-takes-to-start-a-startup-34863
https://www.blackhat.com/us-23/briefings/schedule/#risks-of-ai-risk-policy-five-lessons-32619
https://www.blackhat.com/us-23/briefings/schedule/#first-party-problems-in-a-zero-trust-world-the-accidental-discovery-of-a-new-vulnerability-in-google39s-oauth-implementation-32992
https://www.blackhat.com/us-23/briefings/schedule/#cookie-crumbles-unveiling-web-session-integrity-vulnerabilities-32551
https://www.blackhat.com/us-23/briefings/schedule/#npm-and-sigstore-provenance-comes-to-the-world39s-largest-oss-ecosystem-32893
https://www.blackhat.com/us-23/briefings/schedule/#mtls-when-certificate-authentication-is-done-wrong-33203
https://www.blackhat.com/us-23/briefings/schedule/#the-9th-annual-black-hat-usa-network-operations-center-noc-report-34408
https://www.blackhat.com/us-23/briefings/schedule/#uncovering-azure39s-silent-threats-a-journey-into-cloud-vulnerabilities-33073
https://www.blackhat.com/us-23/briefings/schedule/#lessons-learned-from-the-ka-sat-cyberattack-response-mitigation-and--information-sharing-34478
https://www.blackhat.com/us-23/briefings/schedule/#shuffle-up-and-deal-analyzing-the-security-of-automated-card-shufflers-31741
https://www.blackhat.com/us-23/briefings/schedule/#three-new-attacks-against-json-web-tokens-31695
https://www.blackhat.com/us-23/briefings/schedule/#code16-16-zero-day-vulnerabilities-affecting-codesys-framework-leading-to-remote-code-execution-on-millions-of-industrial-devices-across-industries-31706
https://www.blackhat.com/us-23/briefings/schedule/#a-manufacturer39s-post-shipment-approach-to-fend-off-iot-malware-in-home-appliances-32528
https://www.blackhat.com/us-23/briefings/schedule/#badge-of-shame-breaking-into-secure-facilities-with-osdp-32762
https://www.blackhat.com/us-23/briefings/schedule/#the-most-dangerous-codec-in-the-world-finding-and-exploiting-vulnerabilities-in-h264-decoders-33272
https://www.blackhat.com/us-23/briefings/schedule/#devising-and-detecting-phishing-large-language-models-gpt3-gpt4-vs-smaller-human-models-v-triad-generic-emails-31659
https://www.blackhat.com/us-23/briefings/schedule/#entrepreneurs-dilemma-managing-growth-and-dedication-to-product-quality-35129
https://www.blackhat.com/us-23/briefings/schedule/#keynote-acting-national-cyber-director-kemba-walden-discusses-the-national-cybersecurity-strategy-and-workforce-efforts-34913
https://www.blackhat.com/us-23/briefings/schedule/#lessons-learned-from-the-ka-sat-cyberattack-response-mitigation-and--information-sharing-34478
https://www.blackhat.com/us-23/briefings/schedule/#kill-latest-mpu-based-protections-in-just-one-shot-targeting-all-commodity-rtoses-32733
https://www.blackhat.com/us-23/briefings/schedule/#the-hat-trick-exploit-chrome-twice-from-runtime-to-jit-31557
https://www.blackhat.com/us-23/briefings/schedule/#btd-unleashing-the-power-of-decompilation-for-x86-deep-neural-network-executables-33028
https://www.blackhat.com/us-23/briefings/schedule/#the-living-dead-hacking-mobile-face-recognition-sdks-with-non-deepfake-attacks-32096
https://www.blackhat.com/us-23/briefings/schedule/#make-ksma-great-again-the-art-of-rooting-android-devices-by-gpu-mmu-features-32132
https://www.blackhat.com/us-23/briefings/schedule/#apple-pac-four-years-later-reverse-engineering-the-customized-pointer-authentication-hardware-implementation-on-apple-m1-32824
https://www.blackhat.com/us-23/briefings/schedule/#kill-latest-mpu-based-protections-in-just-one-shot-targeting-all-commodity-rtoses-32733
https://www.blackhat.com/us-23/briefings/schedule/#mac-ing-sense-of-the-3cx-supply-chain-attack-analysis-of-the-macos-payloads-32498
https://www.blackhat.com/us-23/briefings/schedule/#nothing-but-net-leveraging-macoss-networking-frameworks-to-heuristically-detect-malware-32583
https://www.blackhat.com/us-23/briefings/schedule/#windows-agentless-c2-abusing-the-mdm-client-stack-32549
https://www.blackhat.com/us-23/briefings/schedule/#apple-pac-four-years-later-reverse-engineering-the-customized-pointer-authentication-hardware-implementation-on-apple-m1-32824
https://www.blackhat.com/us-23/briefings/schedule/#core-escalation-unleashing-the-power-of-cross-core-attacks-on-heterogeneous-system-31670
https://www.blackhat.com/us-23/briefings/schedule/#jailbreaking-an-electric-vehicle-in-2023-or-what-it-means-to-hotwire-tesla39s-x86-based-seat-heater-33049
https://www.blackhat.com/us-23/briefings/schedule/#redacted-telecom-talk-31807
https://www.blackhat.com/us-23/briefings/schedule/#houston-we-have-a-problem-analyzing-the-security-of-low-earth-orbit-satellites-32468
https://www.blackhat.com/us-23/briefings/schedule/#lemons-and-liability-cyber-warranties-as-an-experiment-in-software-regulation-32104
https://www.blackhat.com/us-23/briefings/schedule/#entrepreneur-journeys-what-it-takes-to-start-a-startup-34863
https://www.blackhat.com/us-23/briefings/schedule/#endoscope-unpacking-android-apps-with-vm-based-obfuscation-33137
https://www.blackhat.com/us-23/briefings/schedule/#the-hat-trick-exploit-chrome-twice-from-runtime-to-jit-31557
https://www.blackhat.com/us-23/briefings/schedule/#btd-unleashing-the-power-of-decompilation-for-x86-deep-neural-network-executables-33028
https://www.blackhat.com/us-23/briefings/schedule/#bad-io_uring-a-new-era-of-rooting-for-android-32243
https://www.blackhat.com/us-23/briefings/schedule/#over-the-air-under-the-radar-attacking-and-securing-the-pixel-modem-33009
https://www.blackhat.com/us-23/briefings/schedule/#one-drive-double-agent-clouded-onedrive-turns-sides-32695
https://www.blackhat.com/us-23/briefings/schedule/#small-leaks-billions-of-dollars-practical-cryptographic-exploits-that-undermine-leading-crypto-wallets-32268
https://www.blackhat.com/us-23/briefings/schedule/#btd-unleashing-the-power-of-decompilation-for-x86-deep-neural-network-executables-33028
https://www.blackhat.com/us-23/briefings/schedule/#apple-pac-four-years-later-reverse-engineering-the-customized-pointer-authentication-hardware-implementation-on-apple-m1-32824
https://www.blackhat.com/us-23/briefings/schedule/#codeql-also-a-powerful-binary-analysis-engine-31995
https://www.blackhat.com/us-23/briefings/schedule/#maginotdns-attacking-the-boundary-of-dns-caching-protection-31901
https://www.blackhat.com/us-23/briefings/schedule/#keynote-phoenix-soaring-what-we-can-learn-from-ukraines-cyber-defenders-about-building-a-more-resilient-future-34912
https://www.blackhat.com/us-23/briefings/schedule/#when-a-zero-day-and-access-keys-collide-in-the-cloud-responding-to-the-sugarcrm-0-day-vulnerability-32997