微信号:zsfnotes

介绍:关于网络安全威胁情报

美国Blackhat2018预览

2018-08-08 16:33 zsfnotes

8月属于注定是网络安全的月份,从这周开始安全会议不断,BlackhatDefconCNCERT的年会、阿里网络安全生态会、Kcon、腾讯CSS峰会、Xcon、微步情报大会。可能由于国内的已经够多了,今年似乎没有看到太多blackhat的报道,所以只能靠自己凑合看了下。Blachat会议两天一共118个议题,214个演讲者。过了一遍议题简介第一个感受是黑客的世界仍然保持着无比精彩,安全不仅仅是AI,不仅仅是ML,即便还是Web,二进制这些领域,其研究的要素组件都是前所未有的,科技化使生活的越来越精彩丰富便利,而黑客的眼里这都一片全新的领域而且在其中还游刃有余。另外一个新奇点是,不知道从什么时候开始,竟然多了这么多关注搬砖工程师心理健康的方面的议题。

万能的google翻译几乎已经可以大概说明白议题的大概方向了,这里就不一一介绍了。今年特别关注了一下演讲人,这里简单的归为三类,甲方科技巨头、乙方安全公司、第三方组织(政府机构、学校、研究组织、独立研究者等等)

总体来说还是乙方的人数较多,但是出现了很多不同类型的领域的厂商了。如今已经不是清一色的杀毒厂商或者NGFW厂商了。Fireeye似乎也不见了踪影。排除了独立研究人员之后的top10演讲人员组织,可以此了解一下有意思的一些新晋安全厂商或者甲方的最佳实践。

演讲组织

演讲人数

Microsoft

10

Riscure

9

Tencent  Keen Security Lab

8

Google

6

Graz  University of Technology

6

EURECOM

5

IBM  Research

5

Duo  Security

4

Endgame

4

Global  Commission on the Stability of Cyberspace

4

KAIST

4

Positive  Technologies

4

其他的乙方公司按演讲顺序简单整理如下,可以感受一下还有剩多少是熟悉的面孔。

VirusBay

Kaspersky

GoSecure

Endgame

Duo Security

Sophos

Riscure

Trail of Bits

Leviathan Security Group

Nozomi Networks

DarkMatter

ZwillGen PLLC

River Loop Security

Eclypsium

PwC

Trimarc

SpecterOps

Immunity Inc

Shostack & Associates

DEVCORE

leveldown security

Cylance Inc

NewAE Technology Inc

Trustwave SpiderLabs

Dragos Inc

Digita Security

Terbium Labs

Cymptom

Positive Technologies

F5 Networks

CrowdStrike Inc

Winsider Seminars & Solutions

Quarkslab

Fleetsmith

Forcepoint

Hex-Rays SA

Lookout

IBM Research

Threatcare

Cisco

NCC Group

G DATA Advanced Analytics

McAfee

IOActive

ForAllSecure

RSM Partners

PortSwigger Web Security

Bastille Networks

Whitescope

QED

HORNE Cyber

Secarma Ltd

Red Sky Solutions,LLC

RSA Security

Tripwire VERT

时间仓促就未对厂商类型再做进一步分类分析了。最后附上议题,供各位与会者参考一下,同一个时间段有上10个议题,也就只能选一个方向听一下了。

Keynote

Optimistic  Dissatisfaction with the Status Quo: Steps We Must Take to Improve Security  in Complex Landscapes

WEDNESDAY  | 9:00AM

AWS上检测凭证被窃

Detecting Credential Compromise in AWS

WEDNESDAY  | 10:30AM

识别online scanners

Dissecting  Non-Malicious Artifacts: One IP at a Time

WEDNESDAY  | 10:30AM

ESI引擎漏洞挖掘

Edge  Side Include Injection: Abusing Caching Servers into SSRF and Transparent  Session Hijacking

WEDNESDAY  | 10:30AM

钓鱼邮件安全意识

Exposing  the Bait: A Qualitative Look at the Impact of Autonomous Peer Communication  to Enhance Organizational Phishing Detection

WEDNESDAY  | 10:30AM

Xori自动反编译分析恶意软件

Finding  Xori: Malware Analysis Triage with Automated Disassembly

WEDNESDAY  | 10:30AM

安全从业人员人文关怀

Holding  on for Tonight: Addiction in InfoSec

WEDNESDAY  | 10:30AM

SBOM物联网政策

How I  Learned to Stop Worrying and Love the SBOM

WEDNESDAY  | 10:30AM

恶意软件检测

Measuring  the Speed of the Red Queen's Race; Adaption and Evasion in Malware

WEDNESDAY  | 10:30AM

硬件钱包

Software  Attacks on Hardware Wallets

WEDNESDAY  | 10:30AM

Hyper-V漏洞挖掘

A Dive  in to Hyper-V Architecture & Vulnerabilities

WEDNESDAY  | 11:15AM

以太坊智能合约区块链漏洞挖掘

Blockchain  Autopsies - Analyzing Ethereum Smart Contract Deaths

WEDNESDAY  | 11:15AM

深度学习神经网络做安全检测

Deep  Neural Networks for Hackers: Methods, Applications, and Open Source Tools

WEDNESDAY  | 11:15AM

机器人的法律探讨

From  Bot to Robot: How Abilities and Law Change with Physicality

WEDNESDAY  | 11:15AM

Keen  team的iOS越狱

KeenLab  iOS Jailbreak Internals: Userland Read-Only Memory can be Dangerous

WEDNESDAY  | 11:15AM

Miasm工程框架

Miasm:  Reverse Engineering Framework

WEDNESDAY  | 11:15AM

JavaScript引擎内置的即时(JIT)编译器漏洞挖掘

New  Trends in Browser Exploitation: Attacking Client-Side JIT Compilers

WEDNESDAY  | 11:15AM

黑客与压力

Stress  and Hacking: Understanding Cognitive Stress in Tactical Cyber Ops

WEDNESDAY  | 11:15AM

TRITON工控

TRITON:  How it Disrupted Safety Systems and Changed the Threat Landscape of  Industrial Control Systems, Forever

WEDNESDAY  | 11:15AM

软件定义SD-WAN攻击

CANCELLED:  Too Soft[ware Defined] Networks: SD-WAN VulnerabilityAssessment

WEDNESDAY  | 1:30PM

VPN攻击

Compression  Oracle Attacks on VPN Networks

WEDNESDAY  | 1:30PM

ICS防火墙

Deep  Dive into an ICS Firewall, Looking for the Fire Hole

WEDNESDAY  | 1:30PM

法律政策

Legal  Landmines: How Law and Policy are Rapidly Shaping Information Security

WEDNESDAY  | 1:30PM

地缘政治与恶意软件分析

No  Royal Road … Notes on Dangerous Game

WEDNESDAY  | 1:30PM

UEFI  firmware固件攻击

Remotely  Attacking System Firmware

WEDNESDAY  | 1:30PM

无线SD卡攻击

Reversing  a Japanese Wireless SD Card - From Zero to Code Execution

WEDNESDAY  | 1:30PM

侧信道攻击解密

Screaming  Channels: When Electromagnetic Side Channels Meet Radio Transceivers

WEDNESDAY  | 1:30PM

汽车固件ECU攻击

There  will be Glitches: Extracting and Analyzing Automotive Firmware Efficiently

WEDNESDAY  | 1:30PM

检测twitter机器人

Don't @  Me: Hunting Twitter Bots at Scale

WEDNESDAY  | 2:40PM

ROSE远程在线社工

Every  ROSE has its Thorn: The Dark Art of Remote Online Social Engineering

WEDNESDAY  | 2:40PM

工作站到域控的攻击

From  Workstation to Domain Admin: Why Secure Administration isn't Secure and How  to Fix it

WEDNESDAY  | 2:40PM

Meltdown详解

Meltdown:  Basics, Details, Consequences

WEDNESDAY  | 2:40PM

黑客的心理健康

Mental  Health Hacks: Fighting Burnout, Depression and Suicide in the Hacker  Community

WEDNESDAY  | 2:40PM

Sysmon高级玩法

Subverting  Sysmon: Application of a Formalized Security Product Evasion Methodology

WEDNESDAY  | 2:40PM

BMC攻击

The  Unbearable Lightness of BMC's

WEDNESDAY  | 2:40PM

威胁建模

Threat  Modeling in 2018: Attacks, Impacts and Other Updates

WEDNESDAY  | 2:40PM

WireGuard密码学攻击VPN

WireGuard:  Next Generation Secure Network Tunnel

WEDNESDAY  | 2:40PM

iOS 11的async_wake漏洞利用

A Brief  History of Mitigation: The Path to EL1 in iOS 11

WEDNESDAY  | 4:00PM

Meltdown漏洞响应的背后故事

Behind  the Speculative Curtain: The True Story of Fighting Meltdown and Spectre

WEDNESDAY  | 4:00PM

新型web攻击面path normalization漏洞挖掘

Breaking  Parser Logic: Take Your Path Normalization off and Pop 0days Out!

WEDNESDAY  | 4:00PM

工控网关漏洞

Breaking  the IIoT: Hacking industrial Control Gateways

WEDNESDAY  | 4:00PM

LET网络注入恶意包

LTE  Network Automation Under Threat

WEDNESDAY  | 4:00PM

针对用于移动和物联网设备的微软Cortana攻击

Open  Sesame: Picking Locks with Cortana

WEDNESDAY  | 4:00PM

GO语言漏洞

Squeezing  a Key through a Carry Bit

WEDNESDAY  | 4:00PM

X86架构下的提取漏洞

Why so  Spurious? How a Highly Error-Prone x86/x64 CPU "Feature" can be  Abused to Achieve Local Privilege Escalation on Many Operating Systems

WEDNESDAY  | 4:00PM

零信任网络的威胁

ZEROing  Trust:  Do Zero Trust Approaches  Deliver Real Security?

WEDNESDAY  | 4:00PM

AFL的盲点

AFL's  Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries

WEDNESDAY  | 5:05PM

加密货币IOTA的攻击

A  Tangled Curl: Attacks on the Curl-P Hash Function Leading to Signature  Forgeries in the IOTA Signature Scheme

WEDNESDAY  | 5:05PM

KVM  Hypervisor安全设计

Back to  the Future: A Radical Insecure Design of KVM on ARM

WEDNESDAY  | 5:05PM

区块链分散和抗删除的域名技术对抗

Beating  the Blockchain by Mapping Out Decentralized Namecoin and Emercoin  Infrastructure

WEDNESDAY  | 5:05PM

安全社区的X骚扰事件

How can  Communities Move Forward After Incidents of Sexual Harassment or Assault?

WEDNESDAY  | 5:05PM

开源工具ChipWhisperer-Lint在硬件侧信到攻击中使用

I, for  One, Welcome Our New Power Analysis Overlords

WEDNESDAY  | 5:05PM

腐败对信息安全社区的影响

InfoSec  Philosophies for the Corrupt Economy

WEDNESDAY  | 5:05PM

黑手党是否接管了网络犯罪

Is the  Mafia Taking Over Cybercrime?

WEDNESDAY  | 5:05PM

针对物理隔离Air-Gap的攻击

The  Air-Gap Jumpers

WEDNESDAY  | 5:05PM

安卓ARTist逆向分析工具

ARTist  - A Novel Instrumentation Framework for Reversing and Analyzing Android Apps  and the Middleware

THURSDAY  | 9:00AM

网络安全的PTSD创伤后应激障碍

Demystifying  PTSD in the Cybersecurity Environment

THURSDAY  | 9:00AM

基于主机的Mac OS防火墙研究

Fire  & Ice: Making and Breaking macOS Firewalls

THURSDAY  | 9:00AM

WinVote  Voting Machines必胜投票机取证

Lessons  from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines

THURSDAY  | 9:00AM

用网上情报资源预测支付欺诈

Money-rity  Report: Using Intelligence to Predict the Next Payment Card Fraud Victims

THURSDAY  | 9:00AM

deception欺骗检测技术的弱点

Real  Eyes, Realize, Real Lies: Beating Deception Technologies

THURSDAY  | 9:00AM

BlackBerry产品安全管理经验

Stop  that Release, There's a Vulnerability!

THURSDAY  | 9:00AM

WebAssembly漏洞挖掘

The  Problems and Promise of WebAssembly

THURSDAY  | 9:00AM

YubiKey双因子

Two-Factor  Authentication, Usable or Not? A Two-Phase Usability Study of the FIDO U2F  Security Key

THURSDAY  | 9:00AM

ATM机攻击设备

Black  Box is Dead. Long Live Black Box!

THURSDAY  | 9:45AM

SSO  SAML漏洞挖掘

Identity  Theft: Attacks on SSO Systems

THURSDAY  | 9:45AM

内核攻击

Kernel  Mode Threats and Practical Defenses

THURSDAY  | 9:45AM

网络安全外交

New  Norms and Policies in Cyber-Diplomacy

THURSDAY  | 9:45AM

VSS备份特性攻击

Reconstruct  the World from Vanished Shadow: Recovering Deleted VSS Snapshots

THURSDAY  | 9:45AM

iot领域蜂窝设备的漏洞挖掘

Snooping  on Cellular Gateways and Their Critical Role in ICS

THURSDAY  | 9:45AM

女网络安全工程师的招聘

The  Science of Hiring and Retaining Female Cybersecurity Engineers

THURSDAY  | 9:45AM

针对Windows Notification的攻击

The  Windows Notification Facility: Peeling the Onion of the Most Undocumented  Kernel Attack Surface Yet

THURSDAY  | 9:45AM

构造语音认证攻击

Your  Voice is My Passport

THURSDAY  | 9:45AM

macOS  MDM安全

A Deep  Dive into macOS MDM (and How it can be Compromised)

THURSDAY  | 11:00AM

对机器学习算法的攻击

AI  & ML in Cyber Security - Why Algorithms are Dangerous

THURSDAY  | 11:00AM

交易安全Trading Stocks

Are You  Trading Stocks Securely? Exposing Security Flaws in Trading Technologies

THURSDAY  | 11:00AM

微码安全研究

Decompiler  Internals: Microcode

THURSDAY  | 11:00AM

检测恶意云账号行为

Detecting  Malicious Cloud Account Behavior: A Look at the New Native Platform  Capabilities

THURSDAY  | 11:00AM

针对OpenPGP and S/MIME攻击

Efail:  Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels

THURSDAY  | 11:00AM

x86处理器的硬件后门

GOD MODE UNLOCKED -  Hardware Backdoors in x86 CPUs

THURSDAY  | 11:00AM

医疗领域hl7协议漏洞挖掘

Pestilential  Protocol: How Unsecure HL7 Messages Threaten Patient Lives

THURSDAY  | 11:00AM

移动端的监听技术

Stealth  Mango and the Prevalence of Mobile Surveillanceware

THURSDAY  | 11:00AM

自动驾驶的安全

Applied  Self-Driving Car Security

THURSDAY  | 12:10PM

视频水印的攻击

None of  My Pixel is Your Business: Active Watermarking Cancellation Against Video  Streaming Service

THURSDAY  | 12:10PM

智慧城市的漏洞挖掘

Outsmarting  the Smart City

THURSDAY  | 12:10PM

TLS 1.3安全

Playback:  A TLS 1.3 Story

THURSDAY  | 12:10PM

增强机器学习抗攻击能力

Protecting  the Protector, Hardening Machine Learning Defenses Against Adversarial  Attacks

THURSDAY  | 12:10PM

域控攻击

So I  became a Domain Controller

THURSDAY  | 12:10PM

TLB的侧信道攻击

TLBleed:  When Protecting Your CPU Caches is Not Enough

THURSDAY  | 12:10PM

WebAssembly漏洞挖掘

WebAssembly:  A New World of Native Exploits on the Browser

THURSDAY  | 12:10PM

缓解speculative漏洞的故事

Wrangling  with the Ghost: An Inside Story of Mitigating Speculative Execution Side  Channel Vulnerabilities

THURSDAY  | 12:10PM

关于DRAM的漏洞Rowhammer

Another  Flip in the Row

THURSDAY  | 2:30PM

反序列化漏洞自动发现

Automated  Discovery of Deserialization Gadget Chains

THURSDAY  | 2:30PM

社工攻击研究

Catch  me, Yes we can! – Pwning Social Engineers using Natural  Language Processing Techniques in Real-Time

THURSDAY  | 2:30PM

智能手机baseband攻击

Exploitation  of a Modern Smartphone Baseband

THURSDAY  | 2:30PM

自动漏洞利用(内核)

From  Thousands of Hours to a Couple of Minutes: Automating Exploit Generation for  Arbitrary Types of Kernel Vulnerabilities

THURSDAY  | 2:30PM

Autism  Spectrum Disorder研究

How can  Someone with Autism Specifically Enhance the Cyber Security Workforce?

THURSDAY  | 2:30PM

SATCOM安全研究

Last  Call for SATCOM Security

THURSDAY  | 2:30PM

iot漏洞的合法责任

Legal  Liability for IOT Cybersecurity Vulnerabilities

THURSDAY  | 2:30PM

widnows  Defender的仿真器

Windows  Offender: Reverse Engineering Windows Defender's Antivirus Emulator

THURSDAY  | 3:50PM

mPOSl漏洞挖掘

For the  Love of Money: Finding and Exploiting Vulnerabilities in Mobile Point of  Sales Systems

THURSDAY  | 3:50PM

微软OSR团队对Hyper-V漏洞的挖掘

Hardening  Hyper-V through Offensive Security Research

THURSDAY  | 3:50PM

IoT恶意软件的综合调查分析框架

IoT  Malware: Comprehensive Survey, Analysis Framework and Case Studies

THURSDAY  | 3:50PM

通过深度学习来帮助侧信道攻击

Lowering  the Bar: Deep Learning for Side Channel Analysis

THURSDAY  | 3:50PM

大型机漏洞挖掘

Mainframe  [z/OS] Reverse Engineering and Exploit Development

THURSDAY  | 3:50PM

web缓存中毒攻击

Practical  Web Cache Poisoning: Redefining 'Unexploitable'

THURSDAY  | 3:50PM

小型组织创建SDL的实践

SDL  That Won't Break the Bank

THURSDAY  | 3:50PM

无线电紧急系统的攻击

SirenJack: Cracking  a 'Secure' Emergency Warning Siren System

THURSDAY  | 3:50PM

植入式医疗设备的漏洞挖掘

Understanding  and Exploiting Implanted Medical Devices

THURSDAY  | 3:50PM

docker攻击

An  Attacker Looks at Docker: Approaching Multi-Container Applications

THURSDAY  | 5:00PM

IBM的AI攻击DeepLocker研究DeepLocker - Concealing Targeted Attacks with AI Locksmithing

DeepLocker  - Concealing Targeted Attacks with AI Locksmithing

THURSDAY  | 5:00PM

模糊测试Fuzz研究

Follow  the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina

THURSDAY  | 5:00PM

PHP的非序列漏洞研究

It's a  PHP Unserialization Vulnerability Jim

THURSDAY  | 5:00PM

NOC BH统计分析报告

Lessons  and Lulz: The 4th Annual Black Hat USA NOC Report

THURSDAY  | 5:00PM

NOC报告

Lessons  and Lulz: The 4th Annual Black Hat USA NOC Report

THURSDAY  | 5:00PM

Keen  team对特斯拉攻击的分享

Over-the-Air:  How we Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla  Cars

THURSDAY  | 5:00PM

TLS漏洞分析

Return  of Bleichenbacher's Oracle Threat (ROBOT)

THURSDAY  | 5:00PM

SDN的渗透测试框架

The  Finest Penetration Testing Framework for Software-Defined Networks

THURSDAY  | 5:00PM

移动恶意软件攻击技术分析

Unpacking  the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native  Library

THURSDAY  | 5:00PM

 
张三丰的疯言疯语 更多文章 新春招聘 7月北京安全会议周回顾 Esteemaudit(XP&2003 3389 0day)缓解方法初探 SANS2017情报调查报告 2017SANS网络威胁情报峰会
猜您喜欢 干货丨 Wireshark抓包过滤及导出csv方法 你还需要另一个周刊吗? 福利|毕业季,兄弟连为你的梦想助力! 是时候把Android 项目切换到Android Studio 要怎样和程序猿谈一场没有bug的恋爱