BlackHat Europe 2007 |
  |
Web Service Vulnerabilities | Nish Bhalla | - | Paper |
Software Virtualization Based Rootkits | Sun Bing | Presentation | Paper |
NIDS: False Positive Reduction Through Anomaly Detection | Damiano Bolzoni | Presentation | APHRODITE POSEIDON |
Wi-Fi Advanced Fuzzing | Laurent Butti | Presentation | Paper |
New Botnets Trends and Threats | Augusto Paes de Barros, André Fucs, Victor Pereira | Presentation | Paper |
Hacking Databases for Owning Your Data | Cesar Cerrudo, Esteban Martinez Fayo | Presentation | Paper |
Kernel Wars | Joel Eriksson | Presentation | Paper |
Next Generation Debuggers for Reverse Engineering | ERESI Team | Presentation | Paper |
Making Windows Exploits More Reliable | Kostya Kortchinsky | Presentation | Paper |
Vboot Kit - Compromising Windows Vista Security | Nitin Kumar, Vipin Kumar | Presentation | Paper |
Make My Day – Just Run a Web Scanner | Toshinari Kureha, Dr. Brian Chess | Presentation | Paper |
SCTPscan | Philippe Langlois | Presentation | Paper |
Advanced Oracle Attack Techniques | David Litchfield | - | - |
Challenging Malicious Inputs with Fault Tolerance Techniques | Bruno Luiz | Presentation | Paper |
SMTP Information Gathering | Lluis Mora | Presentation | Paper |
Attacking the Giants - Exploiting SAP Internals | Presentation | Paper | |
Kicking Down the Cross Domain Door | Billy K Rios, Raghav Dube | Presentation | Paper |
NACATTACK | Dror-John Roecher, Michael Thumann | Presentation | Paper |
Heap Feng Shui in JavaScript | Alexander Sotirov | Presentation | Paper |
GS and ASLR in Windows Vista | Ollie Whitehouse | Presentation | Paper |
ScarabMon - Automating Web Application Penetration Tests | Jonathan Wilkins | Presentation | - |
360° Anomaly Based Unsupervised Intrusion Detection | Stefano Zanero | Presentation | Paper |
  |