Spam-Evolution |
Aseem "@" Jakhar |
Presentation |
- |
LDAP Injection & Blind LDAP Injection |
Chema Alonso, Jose Parada Gimeno |
Presentation |
Paper |
Malware on the Net - Behind the Scenes |
Iftach Ian Amit |
Presentation |
Paper |
CrackStation |
Nick Breese |
Presentation |
- |
Bad Sushi - Beating Phishers at Their Own Game |
Nitesh Dhanjani, Billy Rios |
- |
- |
Side Channel Analysis on Embedded Systems. Impact and Countermeasures |
Job DeHaas |
Presentation |
- |
New Viral Threats of PDF Language |
Eric Filiol |
Presentation |
Paper |
0-Day Patch -Exposing Vendors (In)Security Performance |
Stefan Frei, Bernard Tellenbach |
Presentation |
Paper |
Intercepting Mobile Phone/GSM Traffic |
David Hulton, Steve |
Presentation |
Paper |
Biologger - A Biometric Keylogger |
Matthew Lewis |
Presentation |
Paper |
Developments in Cisco IOS Forensics |
Felix "FX" Lindner |
Presentation |
- |
URI Use and Abuse |
Nathan McFeters, Rob Carter, Billy Rios |
Presentation |
Paper |
Mobile Phone Spying Tools |
Jarno Niemela |
Presentation |
- |
Attacking Anti-Virus |
Feng Xue |
Presentation |
Paper |
The Fundamentals of Physical Security |
Deviant Ollam |
Presentation |
Paper |
Client-side Security |
Petko D. Petkov |
Presentation |
Paper |
Antiphishing Security Strategy |
Angelo P.E. Rosiello |
Presentation |
- |
Security Failures in Secure Devices |
Christopher Tarnovsky |
Presentation |
- |
Investigating Individuals and Organizations Using Open Source Intelligence |
Roelof Temmingh, Chris Bohme |
Presentation |
- |
Exposing Vulnerabilities in Media Software |
David Thiel |
Presentation |
Paper |
Hacking Second Life |
Michael Thumann |
Presentation |
Paper |
Iron Chef Black Hat: John Henry Challenge |
Jacob West, Pravir Chandra, Brian Chess, Sean Fay |
Presentation |
- |
DTRACE: The Reverse Engineer's Unexpected Swiss Army Knife |
David Weston, Tiller Beauchamp |
Presentation |
Paper |