Low Down and Dirty: Anti-Forensic Rootkits |
Darren Bilby |
Presentation |
- |
Taming Bugs: The Art and Science of Writing Secure Code |
Paul Bohm |
Presentation |
- |
IPv6 World Update: Strategy & Tactics |
Kenneth Geers, Alexander Eisen |
Presentation |
- |
Hacking Intranet Websites from the Outside "JavaScript malware just got a lot more dangerous" |
Jeremiah Grossman |
Presentation |
- |
Increasingly-sophisticated Online Swindlers |
Yuji Hoshizawa |
Presentation |
- |
Input Attack Trees: Death of a Thousand Leaves |
Heikki Kortti |
Presentation |
- |
Six Degrees of XSSploitation |
Dan Moniz |
Presentation |
- |
Subverting Vista Kernel For Fun And Profit |
Joanna Rutkowska |
Presentation |
- |
Breaking AJAX Web Applications: Vulns 2.0 in Web 2.0 |
Alex Stamos, Zane Lackey |
Presentation |
- |
Attacking Internationalized Software |
Scott Stender |
Presentation |
- |
Winny P2P Security |
Takayuki Sugiura |
Presentation |
- |
Catching Malware to Detect, Track and Mitigate Botnets |
Georg Wicherski, Thorsten Holz |
Presentation |
- |