A Paranoid Perspective of an Interpreted Language |
Dominique Brezinski |
Presentation |
- |
Hacking in a Foreign Language: A Network Security Guide to Russia (and Beyond) |
Kenneth Geers |
Presentation |
- |
Phishing with Super Bait |
Jeremiah Grossman |
Presentation |
- |
Identifying and Responding to Wireless Attacks |
Chris Hurley (Roamer) |
Presentation |
- |
Forensics in Japan |
Hideaki Ihara |
Presentation |
- |
Black Ops Of TCP/IP 2005 |
Dan Kaminsky |
Presentation |
- |
Botnet survey result. "Our security depends on your security." |
Satoru Koyama |
Presentation |
- |
Architecture Flaws in Common Security Tools |
David Maynor |
Presentation |
- |
The Art of SIP fuzzing and Vulnerabilities Found in VoIP |
Ejovi Nuwere |
Presentation |
- |
Adware/Spyware |
Saumil Shah, Dave Cole |
Presentation |
- |
"Shadow Walker" - Raising The Bar For Rootkit Detection |
Sherri Sparks, Jamie Butler |
Presentation |
- |
The Art of File Format Fuzzing |
Michael Sutton, Adam Greene |
Presentation |
- |