Well, my friends, once again it's that time of year when the crème de la sécurité meet in that most low-key and modest of towns, Las Vegas, to show off just how complicated and frightening computer security has become. At this event you'll see hacking, drones, artificial intelligence … you name it. If it's something to do with security then it will probably be at Black Hat.
My current interests include SMB security, the Internet of Things, and machine learning because they're the technologies that will define how business is done in the next decade. These are covered the list of sessions below (the drone session is included just because it sounds really cool).
If you plan attend any of these or there are any I've missed that you think are particularly valuable where my obsessions are concerned, drop me note at [email protected]. Want to have covfefe? Let's see if we can meet up.
STEPPING UP OUR GAME: RE-FOCUSING THE SECURITY COMMUNITY ON DEFENSE AND MAKING SECURITY WORK FOR EVERYONE
Date: Wednesday, July 26 | 9:00am-10:00am
This talk will explore how we can adapt to better confront the obstacles we face as security practitioners. Can we incentivize and celebrate defensive security research in the same way that we applaud the discovery of vulnerabilities? How do we foster intelligent discussion of real-world trade-offs while avoiding sensationalism? We will discuss real situations from the last year where our community could have risen to the occasion, we will analyze what failed, and propose how we can further help protect people.
WIRE ME THROUGH MACHINE LEARNING
Date: Wednesday, July 26 | 10:30am-10:55am
This paper will throw light on one of the most important tactics used by attacker(s) to design and execute a BEC attack through machine learning. BEC attacks are highly targeted attacks and involve high level of research through skillful social engineering. Attackers have access to more than enough data through social media accounts of high level executives or financially responsible member of the target organization, official websites, news, current affairs, travel plans, data breaches and insider(s). All this vital information can be used to build and train machine learning algorithms.
WHEN IOT ATTACKS: UNDERSTANDING THE SAFETY RISKS ASSOCIATED WITH CONNECTED DEVICES
Date: Wednesday, July 26 | 11:15am-12:05pm
The Internet of Things (IoT) is all around us, making our lives more convenient. We've seen IoT devices being taken over to conduct DDoS attacks. We've heard about connected refrigerators being used to SPAM users and baby monitors being used to scream obscenities at innocent infants, but could an IoT device be re-purposed to physically attack an unsuspecting user? Let's find out.
GAME OF DRONES: PUTTING THE EMERGING 'DRONE DEFENSE' MARKET TO THE TEST - ARSENAL THEATER DEMO
Date: Wednesday, July 26 | 1:45pm-2:45pm
We've taken a MythBusters-style approach to testing the effectiveness of a variety of drone defense solutions, pitting them against our DangerDrone. Videos demonstrating the results should be almost as fun for you to watch as they were for us to produce. Expect to witness epic aerial battles against an assortment of drone defense types …
BIG GAME THEORY HUNTING: THE PECULIARITIES OF HUMAN BEHAVIOR IN THE INFOSEC GAME
Date: Wednesday, July 26 | 2:40pm-3:30pm
In this session, I will examine traditional game theory and propose why behavioral game theory should take its place in the philosophy of defense. Next, I'll review the first principles of game theory, through the lens of behavioral game theory, which empirically measures how humans actually behave in games, rather than assumes they will behave coldly rational.
THE SHADOW BROKERS – CYBER FEAR GAME-CHANGERS
Date: Thursday, July 27 | 9:00am-9:25am
In this talk, I'll detail the leaks The Shadow Brokers have conducted and examine the short and long term impact these leaks present. I’ll also perform a deep dive in some of the most intrusive tools designed by the most sophisticated nation state intelligence agency. Additionally, attendees will learn what changed pre-The Shadow Brokers and during-The Shadow Brokers regarding geopolitical interests using cyber fear as a service.
TAKING OVER THE WORLD THROUGH MQTT - AFTERMATH
Date: Thursday, July 27 | 2:30pm-3:20pm
MQTT it is used by a lot of M2M IoT devices, especially devices that require low-bandwidth communication. There is very little previous research on this protocol and the devices that use it; all we found was a very basic fuzzer and a few posts about security.
IOTCANDYJAR: TOWARDS AN INTELLIGENT-INTERACTION HONEYPOT FOR IOT DEVICES
Date: Thursday, July 27 | 5:00pm-6:00pm
Due to the heterogeneity of IoT devices, manually crafting the low-interaction honeypot is not affordable; on the other hand, we cannot purchase all of the physical IoT devices to build high-interaction honeypot. This dilemma forced us to seek an innovative way to build honeypot for IoT devices. We propose an automatic way to learn the behavioral knowledge of IoT devices and build "intelligent-interaction" honeypot. We also leverage multiple machine learning techniques to improve the quality and quantity.