- Black Hat USA 2013 - Above My Pay Grade: Cyber Response at the National Level
- Black Hat USA 2013 - Abusing Web APIs Through Scripted Android Applications
- Black Hat USA 2013 - Android: one root to own them all
- Black Hat USA 2013 - A Practical Attack against MDM Solutions
- Black Hat USA 2013 - A Tale of One Software Bypass of Windows 8 Secure Boot
- Black Hat USA 2013 - A Tribute to Barnaby Jack
- Black Hat USA 2013 - Beyond the Application: Cellular Privacy Regulation Space
- Black Hat USA 2013 - Big Data for Web Application Security
- Black Hat USA 2013 - BinaryPig - Scalable Malware Analytics in Hadoop
- Black Hat USA 2013 - BIOS Security
- Black Hat USA 2013 - BlackBerryOS 10 from a security perspective
- Black Hat USA 2013 - Black-Box Assessment of Pseudorandom Algorithms
- Black Hat USA 2013 - Bluetooth Smart: The Good, The Bad, The Ugly, and The Fix!
- Black Hat USA 2013 - Bochspwn: Identifying 0-days via System-wide Memory Access Pattern Analysis
- Black Hat USA 2013 - Bugalyze.com - Detecting Bugs Using Decompilation and Data Flow Analysis
- Black Hat USA 2013 - Buying into the Bias: Why Vulnerability Statistics Suck
- Black Hat USA 2013 - Clickjacking Revisited: A Perceptual View of UI Security
- Black Hat USA 2013 - CMX: IEEE Clean File Metadata Exchange
- Black Hat USA 2013 - Combating the Insider Threat at the FBI: Real World Lessons Learned
- Black Hat USA 2013 - Compromising Industrial Facilities From 40 Miles Away
- Black Hat USA 2013 - CreepyDOL: Cheap, Distributed Stalking
- Black Hat USA 2013 - CrowdSource: Crowd Trained Machine Learning Model for Malware Capability Det.
- Black Hat USA 2013 - Defending Networks with Incomplete Information: A Machine Learning Approach
- Black Hat USA 2013 - Denial of Service as a Service - asymmetrical warfare at its finest
- Black Hat USA 2013 - Denying service to DDOS protection services
- Black Hat USA 2013 - Detecting Vulnerabilities in Virtual Devices with Conformance Testing
- Black Hat USA 2013 - Dissecting CSRF Attacks & Countermeasures
- Black Hat USA 2013 - End-to-End Analysis of a Domain Generating Algorithm Malware Family
- Black Hat USA 2013 - Energy Fraud & Blackouts: Issues with Wireless Metering Protocols (wM-Bus)
- Black Hat USA 2013 - Evading deep inspection for fun and shell
- Black Hat USA 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker
- Black Hat USA 2013 - Fact and Fiction: Defending your Medical Devices
- Black Hat USA 2013 - Fully Arbitrary 802.3 Packet Injection: Maximizing the Ethernet Attack Surface
- Black Hat USA 2013 - Funderbolt: Adventures in Thunderbolt DMA Attacks
- Black Hat USA 2013 - Hacking like in the Movies: Visualizing Page Tables for Local Exploitation
- Black Hat USA 2013 - Hacking, Surveilling, and Deceiving victims on Smart TV
- Black Hat USA 2013 - Hiding @ Depth - Exploring, Subverting and Breaking NAND Flash memory
- Black Hat USA 2013 - Home Invasion v2.0 - Attacking Network-Controlled Hardware
- Black Hat USA 2013 - Honey, I'm home!! - Hacking Z-Wave Home Automation Systems
- Black Hat USA 2013 - Hot Knives Through Butter: Bypassing Automated Analysis Systems
- Black Hat USA 2013 - HOW CVSS is DOSsing YOUR PATCHING POLICY (and wasting your money)
- Black Hat USA 2013 - How to Build a SpyPhone
- Black Hat USA 2013 - How to Grow a TREE from CBASS
- Black Hat USA 2013 - Hunting the Shadows: In Depth Analysis of Escalated APT Attacks
- Black Hat USA 2013 - I Can Hear You Now: Traffic Interception & Remote Mobile Phone Cloning
- Black Hat USA 2013 - Is that a government in your network or are you just happy to see me?
- Black Hat USA 2013 - Java Every-Days: Exploiting Software Running on 3 Billion Devices
- Black Hat USA 2013 - Just-In-Time Code Reuse: The more things change, the more they stay the same
- Black Hat USA 2013 Keynote - Take Risk, Don't Fail
- Black Hat USA 2013 - KickaaS Security with Automation and Cloud
- Black Hat USA 2013 - Lawful Access Panel
- Black Hat USA 2013 - Legal Aspects of Full Spectrum Computer Network (Active) Defense
- Black Hat USA 2013 - Legal Considerations for Cellular Research
- Black Hat USA 2013 - Lessons from Surviving a 300Gbps Denial of Service Attack
- Black Hat USA 2013 - Let's get physical: Breaking home security systems & bypassing controls
- Black Hat USA 2013 - Mactans: Injecting Malware into iOS Devices via Malicious Chargers
- Black Hat USA 2013 - Mainframes: The Past Will Come Back to Haunt You
- Black Hat USA 2013 - Malicious File for Exploiting Forensic Software
- Black Hat USA 2013 - Maltego Tungsten as a collaborative attack platform
- Black Hat USA 2013 - Million Browser Botnet
- Black Hat USA 2013 - Mobile Malware: Why traditional AV paradigm is doomed
- Black Hat USA 2013 - Multiplexed Wired Attack Surfaces
- Black Hat USA 2013 - New Trends in FastFlux Networks
- Black Hat USA 2013 - OPSEC failures of spies
- Black Hat USA 2013 - OptiROP: hunting for ROP gadgets in style
- Black Hat USA 2013 - Out of Control: Demonstrating SCADA device exploitation
- Black Hat USA 2013 - Owning the Routing Table - Part II
- Black Hat USA 2013 - Pass the Hash 2: The Admin's Revenge
- Black Hat USA 2013 - Pass the Hash & Other Credential Theft/Reuse: Mitigating Risk
- Black Hat USA 2013 - Password Hashing: the Future is Now
- Black Hat USA 2013 - Pixel Perfect Timing Attacks with HTML5
- Black Hat USA 2013 - Post Exploitation Operations with Cloud Synchronization Services
- Black Hat USA 2013 - Power Analysis Attacks for Cheapskates
- Black Hat USA 2013 - Predicting Susceptibility to Social Bots on Twitter
- Black Hat USA 2013 - Press ROOT to continue: Detecting OSX and Windows bootkits with RDFU
- Black Hat USA 2013 - Pwnie Awards
- Black Hat USA 2013 - Revealing Embedded Fingerprints: Deriving intelligence - USB stack interactions
- Black Hat USA 2013 - RFID Hacking: Live Free or RFID Hard
- Black Hat USA 2013 - Rooting SIM cards
- Black Hat USA 2013 - Shattering Illusions in Lock-Free Worlds: Compiler/Hardware Behaviors OSes/ VMs
- Black Hat USA 2013 - Smashing The Font Scaler Engine in Windows Kernel
- Black Hat USA 2013 - Spy-Jacking the Booters
- Black Hat USA 2013 - SSL, gone in 30 seconds - a BREACH beyond CRIME
- Black Hat USA 2013 - Stepping P3wns: Adventures in full-spectrum embedded exploitation (& defense!)
- Black Hat USA 2013 - Teridian SoC Exploitation: Harvard architecture smart grid systems
- Black Hat USA 2013 - The Factoring Dead: Preparing for the Cryptopocalypse
- Black Hat USA 2013 - The Outer Limits: Hacking the Samsung Smart TV
- Black Hat USA 2013 - The SCADA That Didn't Cry Wolf- Who's Really Attacking Your ICS Devices
- Black Hat USA 2013 - TLS 'secrets'
- Black Hat USA 2013 - TOR... ALL-THE-THINGS!
- Black Hat USA 2013 - Truncating TLS Connections to Violate Beliefs in Web Applications
- Black Hat USA 2013 - UART THOU MAD?
- Black Hat USA 2013 - UNION SELECT `This_Talk` AS ('New Optimization and Obfuscation Techniques')%00
- Black Hat USA 2013 - Universal DDoS Mitigation Bypass
- Black Hat USA 2013 - Untwining Twine
- Black Hat USA 2013 - Using Online Activity as Digital Fingerprints to Create a Better Spear Phisher
- Black Hat USA 2013 - Virtual Deobfuscator - a DARPA Cyber Fast Track funded effort
- Black Hat USA 2013 - What's on the Wire? Physical Layer Tapping with Project Daisho
- Black Hat USA 2013 - What Security Researchers Need to Know About Anti-Hacking Law
- Black Hat USA 2013 - With BIGDATA comes BIG responsibility: Practical exploiting of MDX injections
- Black Hat 2013 - Above My Pay Grade: Cyber Response at the National Level
- Black Hat 2013 - Abusing Web APIs Through Scripted Android Applications
- Black Hat 2013 - Android: One Root to Own them All
- Black Hat 2013 - A Tale of One Software Bypass of Windows 8 Secure Boot
- Black Hat 2013 - Beyond the Application: Cellular Privacy Regulatory Space
- Black Hat 2013 - Big Data for Web Application Security
- Black Hat 2013 - BinaryPig - Scalable Malware Analytics in Hadoop
- Black Hat 2013 - BIOS Security
- Black Hat 2013 - BlackberryOS 10 From a Security Perspective
- Black Hat 2013 - Black-box Assessment of Pseudorandom Algorithms
- Black Hat 2013 - Bluetooth Smart: The Good, the Bad, the Ugly, and the Fix!
- Black Hat 2013 - Bochspwn: Identifying 0-Days via System-Wide Memory Access Pattern Analysis
- Black Hat 2013 - Buying into the Bias: Why Vulnerability Statistics Suck
- Black Hat 2013 - Clickjacking Revisted: A Perceptual View of UI Security
- Black Hat 2013 - CMX: IEEE Clean File Metadata Exchange
- BlackHat 2013 - Combating the Insider Threat at the FBI: Real-world Lessons Learned
- Black Hat 2013 - Compromising Industrial Facilities from 40 Miles Away
- Black Hat 2013 - CreepyDOL: Cheap, Distributed Stalking
- Black Hat 2013 - CrowdSource: Open Source Crowd Trained Machine Learning Model for Malware Detection
- Black Hat 2013 - Defending Networks With Incomplete Information: A Machine Learning Approach
- Black Hat 2013 - Denial of Service as a Service - Asymmetrical Warfare at its Finest
- Black Hat 2013 - Denying Service to DDoS Protection Services
- Black Hat 2013 - Detecting Vulnerabilities in Virtual Devices with Conformance Testing
- Black Hat 2013 - Dissecting CSRF Attacks and Countermeasures
- Black Hat 2013 - End-to-end Analysis of Domain Generating Algorithm Malware Family
- Black Hat 2013 - Energy Fraud and Orchestrated Blackouts: Issues with Wireless Metering Protocols...
- Black Hat 2013 - Evading Deep Inspection for Fun and Shell
- Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker
- Black Hat 2013 - Fact and Fiction: Defending Medical Device
- Black Hat 2013 - Fully Arbitrary 802.3 Packet Injection: Maximizing Ethernet Attack Surface
- Black Hat 2013 - Funderbolt: Adventures in Thunderbolt DMA Attacks
- Black Hat 2013 - Hacking Like in the Movies: Visualizing Page Tables for Local Exploitation
- Black Hat 2013 - Hacking, Surveiling, and Deceiving Victims on Smart TV
- Black Hat 2013 - Hiding @ Depth - Exploring, Subverting, and Breaking NAND Flash Memory
- Black Hat 2013 - Home Invasion v2.0 - Attacking Network-Controlled Hardware
- Black Hat 2013 - Honey, I'm Home!! - Hacking Z-Wave Home Automation Systems
- Black Hat 2013 - Hot Knives Through Butter: Bypassing Automated Analysis Systems
- Black Hat 2013 - How CVSS is DOSsing Your Patching Policy (and wasting your money)
- Black Hat 2013 - How to Build a SpyPhone
- Black Hat 2013 - How to grow a TREE (Taint-Enabled Reverse Engineering Environment) from a CBASS...
- Black Hat 2013 - Hunting the Shadows: In-Depth Analysis of Escalated APT Attacks
- Black Hat 2013 - I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning...
- Black Hat 2013 - Java Every-Days: Exploiting Software Running on Three Billion Devices
- Black Hat 2013 - Javascript Static Security Analysis Made Easy with JSPrime
- Black Hat 2013 - Just-In-Time Code Reuse: The More Things Change, the More They Stay the Same
- Black Hat 2013 - Lawful Access Panel
- Black Hat 2013 - Legal Considerations for Cellular Research
- Black Hat 2013 - Let's Get Physical: Breaking Home Security Systems and Bypassing Building Controls
- Black Hat 2013 - Mactans: Injecting Malware Into iOS Devices via Malicious Chargers
- Black Hat 2013 - Mainframes: The Past Will Come to Haunt You
- Black Hat 2013 - Malicious File for Exploiting Forensic Software
- Black Hat 2013 - Maltego Tungsten As a Collaborative Attack Platform
- Black Hat 2013 - Million Browser Botnet
- Black Hat 2013 - Mobile Malware: Why the Traditional AV Paradigm is Doomed
- Black Hat 2013 - Multiplexed Wired Attack Surfaces
- Black Hat 2013 - New Trends in FastFlux Networks
- Black Hat 2013 - OPSEC Failures of Spies
- Black Hat 2013 - OptiROP: The Art of Hunting ROP Gadgets
- Black Hat 2013 - Out of Control: Demonstrating SCADA Device Exploitation
- Black Hat 2013 - Owning the Routing Table - Part II
- Black Hat 2013 - Pass-the-Hash 2: The Admin's Revenge
- Black Hat 2013 - Pass the Hash and other credential theft and reuse: Preventing Lateral Movement...
- Black Hat 2013 - Password Hashing: The Future is Now
- Black Hat 2013 - Post Exploitation Operations with Cloud Synchronization
- Black Hat 2013 - Power Analysis Attacks for Cheapskates
- Black Hat 2013 - Predicting Susceptibility to Socialbots on Twitter
- Black Hat 2013 - Press ROOT to Continue: Detecting OSX and Windows Bootkits with RDFU
- Black Hat 2013 - PWNIE AWARDS
- Black Hat 2013 - Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions
- Black Hat 2013 - RFID Hacking: Live Free or RFID Hard
- Black Hat 2013 - Rooting SIM Cards
- Black Hat 2013 - Shattering Illusions in Lock-Free Worlds: Compiler/Hardware Behaviors in OS and VMs
- Black Hat 2013 - Smashing the Font Scaler Engine in Windows Kernel
- Black Hat 2013 - Spy-jacking the Booters
- Black Hat 2013 - SSL, Gone in 30 Seconds - A BREACH beyond CRIME
- Black Hat 2013 - Stepping p3wns: Adventures in Full Spectrum Embedded Exploitation
- Black Hat 2013 - Teridian SoC Exploitation: Exploration of Harvard Architecture Smart Grid Systems
- Black Hat 2013 - The Factoring Dead: Preparing for Cyptopocalypse
- Black Hat 2013 - The Outer Limits: Hacking The Samsung Smart TV
- Black Hat 2013 - The SCADA That Didn't Cry Wolf - Who's Really Attacking Your ICS Devices - 2/2
- Black Hat 2013 - The Web IS Vulnerable: XSS Defense on the BattleFront
- Black Hat 2013 - TLS 'SECRETS'
- Black Hat 2013 - TOR... ALL-THE-THINGS!
- Black Hat 2013 - Tribute to Barnaby Jack
- Black Hat 2013 - Truncating TLS Connections to Violate Beliefs in Web Applications
- Black Hat 2013 - UART THOU MAD?
- Black Hat 2013 - Universal DDoS Mitigation Bypass
- Black Hat 2013 - Untwining Twine
- Black Hat 2013 - Using Online Activity as Digital DNA to Create a Better Spear Phisher
- Black Hat 2013 - Virtual Deobfuscator - A DARPA Cyber Fast Track Funded Effort
- Black Hat 2013 - Welcome & Introduction to Black Hat USA 2013
- Black Hat 2013 - What's on the Wire? - Physical Layer Tapping with Project Daisho
- Black Hat 2013 - With BIGDATA comes BIG responsibility: Practical exploiting of MDX injections