1. EachPod

Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference. - Podcast

Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference.

Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo Video, audio and supporting materials from past conferences will be posted here, starting with the newest and working our way back to the oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp4 h.264 192k video format. If you want to get a better idea of the presentation materials go to http://www.blackhat.com/html/bh-media-archives/bh-archives-2007.html and download them. Put up the pdfs in one window while watching the talks in the other. Almost as good as being there!

Technology Video Audio Tech News
Update frequency
every day
Average duration
56 minutes
Episodes
89
Years Active
2006 - 2007
Share to:
Mark Dowd, John Mcdonald & Neel Mehta: Breaking C++ Applications

Mark Dowd, John Mcdonald & Neel Mehta: Breaking C++ Applications

This presentation addresses the stated problem by focusing specifically on C++-based security, and outlines types of vulnerabilities that can exist in C++ applications. It will examine not only the b…
01:15:15  |   Mon 09 Jan 2006
Jennifer Granick: Disclosure and Intellectual Property Law: Case Studies

Jennifer Granick: Disclosure and Intellectual Property Law: Case Studies

The simple decision by a researcher to tell what he or she has discovered about a software product or website can be very complicated both legally and ethically. The applicable legal rules are compli…
01:13:44  |   Mon 09 Jan 2006
Mikko Hypponen: Status of Cell Phone Malware in 2007

Mikko Hypponen: Status of Cell Phone Malware in 2007

First real viruses infecting mobile phones were found during late 2004. Since then, hundreds of different viruses have been found, most of them targeting smartphones running the Symbian operating sys…
01:08:35  |   Mon 09 Jan 2006
Shawn Moyer: (un)Smashing the Stack: Overflows, Countermeasures, and the Real World

Shawn Moyer: (un)Smashing the Stack: Overflows, Countermeasures, and the Real World

As of today, Vista, XP, 2K03, OS X, every major Linux distro, and each of the BSD's either contain some facet of (stack|buffer|heap) protection, or have one available that's relatively trivial to imp…
00:59:47  |   Mon 09 Jan 2006
Thomas H. Ptacek, Peter Ferrie & Nate Lawson: Don't Tell Joanna, The Virtualized Rootkit Is Dead

Thomas H. Ptacek, Peter Ferrie & Nate Lawson: Don't Tell Joanna, The Virtualized Rootkit Is Dead

Since last year's Black Hat, the debate has continued to grow about how undetectable virtualized rootkits can be made. We are going to show that virtualized rootkits will always be detectable. We wou…
01:03:11  |   Mon 09 Jan 2006
Danny Quist & Valsmith: Covert Debugging: Circumventing Software Armoring Techniques

Danny Quist & Valsmith: Covert Debugging: Circumventing Software Armoring Techniques

Software armoring techniques have increasingly created problems for reverse engineers and software analysts. As protections such as packers, run-time obfuscators, virtual machine and debugger detecto…
00:48:09  |   Mon 09 Jan 2006
Chris Wysopal & Chris Eng: Static Detection of Application Backdoors

Chris Wysopal & Chris Eng: Static Detection of Application Backdoors

Backdoors have been part of software since the first security feature was implemented. So unless there is a process to detect backdoors they will inevitably be inserted into software. Requiring sourc…
01:11:09  |   Mon 09 Jan 2006
Joe Stewart: Just Another Windows Kernel Perl Hacker

Joe Stewart: Just Another Windows Kernel Perl Hacker

This talk will detail the Windows remote kernel debugging protocol and present a Perl framework for communicating with the kernel debug API over a serial/usb/1394 port from non-Windows systems. This …
00:18:55  |   Mon 09 Jan 2006
Andrea Barisani & Daniele Bianco: Injecting RDS-TMC Traffic Information Signals a.k.a. How to freak out your Satellite Navigation.

Andrea Barisani & Daniele Bianco: Injecting RDS-TMC Traffic Information Signals a.k.a. How to freak out your Satellite Navigation.

RDS-TMC is a standard based on RDS (Radio Data System) for communicating over FM radio Traffic Information for Satellite Navigation Systems. All modern in-car Satellite Navigation systems sold in …
01:06:47  |   Mon 09 Jan 2006
Damiano Bolzoni & Emmanuel Zambon: Sphinx: an anomaly-based Web Intrusion Detection System

Damiano Bolzoni & Emmanuel Zambon: Sphinx: an anomaly-based Web Intrusion Detection System

We present Sphinx, a new fully anomaly-based Web Intrusion Detection Systems (WIDS). Sphinx has been implemented as an Apache module (like ModSecurity, the most deployed Web Application Firewall), th…
01:03:39  |   Mon 09 Jan 2006
Robert W Clark: Computer and Internet Security Law - A Year in Review 2006 - 2007

Robert W Clark: Computer and Internet Security Law - A Year in Review 2006 - 2007

This presentation reviews the important prosecutions, precedents and legal opinions of the last year that affect internet and computer security. We will discuss the differences between legal decision…
01:01:09  |   Mon 09 Jan 2006
Barrie Dempster: VOIP Security

Barrie Dempster: VOIP Security

As VoIP products and services increase in popularity and as the "convergence" buzzword is used as the major selling point, it's time that the impact of such convergence and other VoIP security issues…
00:44:32  |   Mon 09 Jan 2006
Roger Dingledine: TOR

Roger Dingledine: TOR

Tor project, an anonymous communication system for the Internet that has been funded by both the US Navy and the Electronic Frontier Foundation.
01:10:32  |   Mon 09 Jan 2006
Ben Feinstein & Daniel Peck: CaffeineMonkey: Automated Collection, Detection and Analysis of Malicious JavaScript

Ben Feinstein & Daniel Peck: CaffeineMonkey: Automated Collection, Detection and Analysis of Malicious JavaScript

The web browser is ever increasing in its importance to many organizations. Far from its origin as an application for fetching and rendering HTML, today?s web browser offers an expansive attack surfa…
01:00:18  |   Mon 09 Jan 2006
Kenneth Geers: Greetz from Room 101

Kenneth Geers: Greetz from Room 101

Imagine you are king for a day. Enemies are all around you, and they seem to be using the Internet to plot against you. Using real-world cyber war stories from the most tightly controlled nations on …
01:05:17  |   Mon 09 Jan 2006
Jon Callas: Traffic Analysis -- The Most Powerful and Least Understood Attack Methods

Jon Callas: Traffic Analysis -- The Most Powerful and Least Understood Attack Methods

Traffic analysis is gathering information about parties not by analyzing the content of their communications, but through the metadata of those communications. It is not a single technique, but a fam…
00:51:51  |   Mon 09 Jan 2006
Chris Palmer: Breaking Forensics Software: Weaknesses in Critical Evidence Collectio

Chris Palmer: Breaking Forensics Software: Weaknesses in Critical Evidence Collectio

cross the world law enforcement, enterprises and national security apparatus utilize a small but important set of software tools to perform data recovery and investigations. These tools are expected …
01:11:17  |   Mon 09 Jan 2006
Tony Sager: KEYNOTE: The NSA Information Assurance Directorate and the National Security Community

Tony Sager: KEYNOTE: The NSA Information Assurance Directorate and the National Security Community

The Information Assurance Directorate (IAD) within the National Security Agency (NSA) is charged in part with providing security guidance to the national security community. Within the IAD, the Vulne…
00:46:15  |   Mon 09 Jan 2006
Ero Carerra: Reverse Engineering Automation with Python

Ero Carerra: Reverse Engineering Automation with Python

Instead of discussing a complex topic in detail, this talk will discuss 4 different very small topics related to reverse engineering, at a length of 5 minutes each, including some work on intermediat…
00:24:27  |   Mon 09 Jan 2006
Brandon Baker: Kick Ass Hypervisoring: Windows Server Virtualization

Brandon Baker: Kick Ass Hypervisoring: Windows Server Virtualization

Virtualization is changing how operating systems function and how enterprises manage data centers. Windows Server Virtualization, a component of Windows Server 2008, will introduce new virtualization…
00:59:03  |   Mon 09 Jan 2006
Disclaimer: The podcast and artwork embedded on this page are the property of Black Hat/ CMP Media, Inc.. This content is not affiliated with or endorsed by eachpod.com.