Nematodes |
David Aitel |
Presentation |
- |
Finding Digital Evidence in Physical Memory |
Mariusz Burdach |
Presentation |
- |
Client Side Penetration Testing |
Max Caceres |
Presentation |
- |
How to Automatically Sandbox IIS With Zero False Positive and Negative |
Tzi-cker Chiueh |
Presentation |
- |
Angel Recon System (ARS) Prototype: Heuristic Vulnerability Analysis and Attack |
Drew Copley |
Presentation |
- |
Attacks on Uninitialized Local Variables |
Halvar Flake |
Presentation |
- |
New Directions in Disk Forensics |
Simson L. Garfinkel |
Presentation |
- |
Implementing and Detecting An ACPI BIOS Rootkit |
John Heasman |
Presentation |
- |
Analysis of Web Application Worms and Viruses |
Billy Hoffman |
Presentation |
- |
Network Black Ops: Extracting Unexpected Functionality from Existing Networks |
Dan Kaminsky |
Presentation |
- |
Analysis of Adversarial Code: Problem, Challenges, Results |
Arun Lakhotia |
Presentation |
- |
Breakable |
David Litchfield |
- |
- |
Foreign Attacks on Corporate America |
Kevin Mandia |
Presentation |
- |
SCADA Security and Terrorism: We're Not Crying Wolf! |
David Maynor, Robert Graham |
Presentation |
- |
Combatting Symbian Malware |
Jarno Niemela |
Presentation |
Paper |
The Era of a Zero-Day Nation-State: Characterising the real threats to our nation’s critical information systems |
Tom Parker, Matthew G. Devost |
Presentation |
- |
Rootkit Hunting vs. Compromise Detection |
Joanna Rutkowska |
Presentation |
- |
Pentesting J2EE |
Marc Schoenefeld |
Presentation |
- |
Beyond EIP |
spoonm, skape |
Presentation |
- |
Playing Server Hide and Seek on the Tor Anonymity Network |
Paul Syverson, Lasse Øverlier |
Presentation |
- |
FragFS: An Advanced NTFS Data Hiding Technique |
Irby Thompson, Mathew Monroe |
Presentation |
- |
My IDS is better than yours. Or is it? |
Stefano Zanero |
Presentation |
- |