Hacker News
- Everybody Be Cool, This Is a Robbery https://www.blackhat.com/us-19/briefings/schedule/?hootPostID=db681a52c6a321681e1f9281b5124457#everybody-be-cool-this-is-a-robbery-16233 14 comments
- TLBleed: When Protecting Your CPU Caches is Not Enough https://www.blackhat.com/us-18/briefings/schedule/#tlbleed-when-protecting-your-cpu-caches-is-not-enough-10149 8 comments
- Passive Fingerprinting of HTTP/2 Clients [pdf] https://www.blackhat.com/docs/eu-17/materials/eu-17-Shuster-Passive-Fingerprinting-Of-HTTP2-Clients-wp.pdf 12 comments
- Even the LastPass Will Be Stolen https://www.blackhat.com/eu-15/briefings.html#even-the-lastpass-will-be-stolen-deal-with-it 153 comments
Lobsters
- Running Unsigned Code In Intel ME https://www.blackhat.com/docs/eu-17/materials/eu-17-Goryachy-How-To-Hack-A-Turned-Off-Computer-Or-Running-Unsigned-Code-In-Intel-Management-Engine-wp.pdf 8 comments hardware , pdf , security
- Unsigned Code Execution on Intel ME 11.x https://www.blackhat.com/eu-17/briefings/schedule/#how-to-hack-a-turned-off-computer-or-running-unsigned-code-in-intel-management-engine-8668 24 comments hardware , security
- HEIST: HTTP Encrypted Information can be Stolen through TCP-windows https://www.blackhat.com/docs/us-16/materials/us-16-VanGoethem-HEIST-HTTP-Encrypted-Information-Can-Be-Stolen-Through-TCP-Windows-wp.pdf 3 comments pdf , security
- Behind the Scenes with iOS Security https://www.blackhat.com/docs/us-16/materials/us-16-Krstic.pdf 2 comments ios , pdf , security , slides
- Black Hat: Greybox Program Synthesis: A New Approach to Attack Dataflow Obfuscation https://www.blackhat.com/us-21/briefings/schedule/index.html#greybox-program-synthesis-a-new-approach-to-attack-dataflow-obfuscation-22930 2 comments reverseengineering
- On AV signature reversing (and its ethical implications) https://www.blackhat.com/presentations/bh-usa-07/maynor_and_graham/whitepaper/bh-usa-07-maynor_and_graham-wp.pdf 5 comments netsec
- Black Hat 2019: Attacks that allow retrieving all HSM (Hardware Security Modules) secrets remotely https://www.blackhat.com/us-19/briefings/schedule/?hootpostid=db681a52c6a321681e1f9281b5124457#everybody-be-cool-this-is-a-robbery-16233 10 comments crypto
- Intel Visualization of Internal Signals Architecture (VISA): Through the Rabbit Hole https://www.blackhat.com/asia-19/briefings/schedule/index.html#intel-visa-through-the-rabbit-hole-13513 4 comments hardware
- Exploiting the DRAM Rowhammer bug to gain kernel privileges https://www.blackhat.com/docs/us-15/materials/us-15-seaborn-exploiting-the-dram-rowhammer-bug-to-gain-kernel-privileges.pdf 10 comments netsec
- return-to-csu: A New Method to Bypass 64-bit Linux ASLR [Paper - Blackhat Asia 2018] https://www.blackhat.com/docs/asia-18/asia-18-marco-return-to-csu-a-new-method-to-bypass-the-64-bit-linux-aslr-wp.pdf 12 comments netsec
- Syntia: Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis https://www.blackhat.com/docs/asia-18/asia-18-blazytko-breaking-state-of-the-art-binary-code-obfuscation-via-program-synthesis-wp.pdf 6 comments netsec
- How to Hack a Turned-Off Computer, or Running Unsigned Code in Intel Management Engine https://www.blackhat.com/docs/eu-17/materials/eu-17-goryachy-how-to-hack-a-turned-off-computer-or-running-unsigned-code-in-intel-management-engine.pdf 37 comments netsec
- Black Hat Europe 2017 -- 'How to hack a turned-off computer, or running unsigned code in Intel Management Engine' -- "allows an attacker of the machine to run unsigned code in PCH on any motherboard via Skylake+" https://www.blackhat.com/eu-17/briefings/schedule/#how-to-hack-a-turned-off-computer-or-running-unsigned-code-in-intel-management-engine-8668 21 comments intel
- How to hack a turned-off computer, or running unsigned code in Intel ME https://www.blackhat.com/eu-17/briefings/schedule/#how-to-hack-a-turned-off-computer-or-running-unsigned-code-in-intel-management-engine-8668 41 comments hardware
- How to Hack a Turned-Off Computer, or Running Unsigned Code in Intel Management Engine | Black Hat Europe 2017 https://www.blackhat.com/eu-17/briefings/schedule/#how-to-hack-a-turned-off-computer-or-running-unsigned-code-in-intel-management-engine-8668 4 comments technology
- Friday the 13th: JSON Attacks (remote code execution via .NET JSON libraries) https://www.blackhat.com/docs/us-17/thursday/us-17-Munoz-Friday-The-13th-Json-Attacks.pdf 6 comments dotnet
- [BlackHat2016] - Executing malware from a digitally signed executable, hashes unchanged https://www.blackhat.com/docs/us-16/materials/us-16-nipravsky-certificate-bypass-hiding-and-executing-malware-from-a-digitally-signed-executable-wp.pdf 7 comments netsec
- Demystifying the Secure Enclave Processor [pdf] https://www.blackhat.com/docs/us-16/materials/us-16-mandt-demystifying-the-secure-enclave-processor.pdf 27 comments apple
- I’m not a human: Breaking the Google reCAPTCHA https://www.blackhat.com/docs/asia-16/materials/asia-16-sivakorn-im-not-a-human-breaking-the-google-recaptcha-wp.pdf 37 comments programming
- I’m not a human: Breaking the Google reCAPTCHA https://www.blackhat.com/docs/asia-16/materials/asia-16-sivakorn-im-not-a-human-breaking-the-google-recaptcha-wp.pdf 44 comments netsec
- Black Hat Europe 2015 slides https://www.blackhat.com/eu-15/briefings.html 10 comments netsec
- BitLocker encryption without pre-boot authentication (which is Microsoft’s recommended deployment strategy for BitLocker) is easily broken. The attack can be done by non-sophisticated attackers and takes seconds to execute - [PDF] https://www.blackhat.com/docs/eu-15/materials/eu-15-haken-bypassing-local-windows-authentication-to-defeat-full-disk-encryption-wp.pdf 22 comments crypto
- Hey Man, Have You Forgotten to Initialize Your Memory? - Pwn2Own IE exploit https://www.blackhat.com/docs/eu-15/materials/eu-15-chen-hey-man-have-you-forgotten-to-initialize-your-memory.pdf 7 comments netsec
- [PDF] Attacking the XNU Kernel in El Capitan https://www.blackhat.com/docs/eu-15/materials/eu-15-todesco-attacking-the-xnu-kernal-in-el-capitain.pdf 37 comments netsec
- BlackHat USA 2015 presentation slides/white papers - Day 1 https://www.blackhat.com/us-15/briefings.html 26 comments netsec
- C++11 metaprogramming applied to software obfuscation [pdf] https://www.blackhat.com/docs/eu-14/materials/eu-14-andrivet-c-plus-plus11-metaprogramming-applied-to-software-obfuscation-wp.pdf 8 comments cpp
- BlackHat Vegas 2014 Training is live. Some classes fill up very fast. https://www.blackhat.com/us-14/training/index.html 2 comments netsec
- Cisco and NSA employees, chairs at CFRG. IETF supports "lawful intercept" backdoor standard for Cisco routers https://www.blackhat.com/presentations/bh-dc-10/cross_tom/blackhat-dc-2010-cross-attacking-lawfuli-intercept-wp.pdf 10 comments programming
- Cisco and NSA employees, chairs at CFRG. IETF supports "lawful intercept" backdoor standard for Cisco routers https://www.blackhat.com/presentations/bh-dc-10/cross_tom/blackhat-dc-2010-cross-attacking-lawfuli-intercept-wp.pdf 3 comments worldnews
- Black Hat USA 2013 Archives https://www.blackhat.com/us-13/archives.html 13 comments netsec
- USB device disguised as charger injects malware into IOS devices http://www.blackhat.com/us-13/briefings.html#lau 10 comments netsec
- General Keith Alexander, Director of the NSA, to keynote Black Hat USA 2013 https://www.blackhat.com/latestintel/05142013-day-one-keynote-announced.html 21 comments netsec
- Onity Lock Flaw Being Used by Criminals https://www.blackhat.com/html/bh-us-12/bh-us-12-archives.html#Brocious 6 comments netsec
- Blackhat "phishing" mail post-mortem https://www.blackhat.com/html/latestintel/07222012-usa-reg-email.html 7 comments netsec
- Black Hat USA 2011 First Round Briefings & Workshops Announced https://www.blackhat.com/html/bh-us-11/bh-us-11-briefings.html 4 comments netsec
- Blackhat 2008 Presentations available online https://www.blackhat.com/html/bh-usa-08/bh-usa-08-archive.html 2 comments reddit.com