Silver Needle in the Skype |
Philippe Biondi, Fabrice Desclaux |
Presentation |
- |
IBM iSeries For Penetration Testers: Bypass Restrictions and Take Over Server |
Shalom Carmel |
Presentation |
- |
WLSI - Windows Local Shellcode Injection |
Cesar Cerrudo |
Presentation |
- |
How to Automatically Sandbox IIS With Zero False Positive and Negative |
Tzi-cker Chiueh |
Presentation |
Paper |
Malware Cinema: A Picture is Worth a Thousand Packets |
Gregory Conti |
Presentation |
- |
Separated By A Common Goal—Emerging EU and US Information Security and Privacy Law: Allies or Adversaries? |
Bryan Cunningham, Amanda Hubbard |
Presentation |
- |
Project Paraegis Round 2: Using Razorwire HTTP proxy to strengthen webapp session handling and reduce attack surface |
Arian J. Evans, Daniel Thompson, Mark Belles |
Presentation |
- |
Analysing Complex Systems: The BlackBerry Case |
FX |
Presentation |
- |
Attacks on Uninitialized Local Variables |
Halvar Flake |
Presentation |
- |
Implementing and Detecting An ACPI BIOS Rootkit |
John Heasman |
Presentation |
- |
Exploiting Embedded Systems |
Barnaby Jack |
Presentation |
- |
Hacking fingerprint Scanners - Why Microsoft's Fingerprint Reader Is Not a Security Feature |
Mikko Kiviharju |
Presentation |
- |
Bluetooth Hacking - The State of The Art |
Adam Laurie, Martin Herfurt, Marcel Holtmann |
- |
- |
Death of a Thousand Cuts- Finding Evidence Everywhere! |
Johnny Long |
- |
- |
Hacking, Hollywood Style |
Johnny Long |
- |
- |
Skeletons in Microsoft's Closet - Silently Fixed Vulnerabilities |
Steve Manzuik and Andre Protas |
Presentation |
- |
Combatting Symbian Malware |
Jarno Niemela |
Presentation |
Paper |
Stopping Automated Application Attack Tools |
Gunter Ollmann |
Presentation |
- |
MPLS and VPLS Security |
Enno Rey |
Presentation |
- |
Rootkit Hunting vs. Compromise Detection |
Joanna Rutkowska |
Presentation |
- |
RAIDE: Rootkit Analysis Identification Elimination |
Peter Silberman, Jamie Butler |
Presentation |
- |
Beyond EIP |
spoonm & skape |
Presentation |
- |
The Science of Code Auditing |
Alex Wheeler, Mark Dowd, Neel Mehta |
Presentation |
- |
Anomaly Detection Through System Call Argument Analysis |
Stefano Zanero |
Presentation |
- |