NAC |
Ofir Arkin |
Presentation |
Paper |
Attack Patterns: Knowing Your Enemies in Order to Defeat Them |
Sean Barnum |
Presentation |
Paper |
Secure Processors for Embedded Applications |
James D. Broesch |
Presentation |
Paper |
Practical 10 Minute Security Audit: The Oracle Case |
Cesar Cerrudo |
Presentation |
Paper |
Firmware Rootkits and the Threat to the Enterprise |
John Heasman |
- |
Paper |
Practical Malware Analysis: Fundamental Techniques and a New Method for Malware Discovery |
Kris Kendall, Chad McMillan |
Presentation |
Paper |
Advanced Oracle Attack Techniques |
David Litchfield |
Presentation |
- |
Agile Incident Response: Operating through Ongoing Confrontation |
Kevin Mandia |
Presentation |
- |
Being Explicit about Software Weaknesses |
Robert A. Martin, Steve Christey, Sean Barnum |
Presentation |
Paper |
Device Drivers 2.0 |
David Maynor |
- |
- |
Data Seepage: How to Give Attackers a Roadmap to Your Network |
David Maynor, Robert Graham |
Presentation |
- |
Botnet Tracking: Tools, Techniques, and Lessons Learned |
Jose Nazario |
Presentation |
Paper |
Beyond The CPU: Defeating Hardware Based RAM Acquisition Tools (Part I: AMD case) |
Joanna Rutkowska |
Presentation |
- |
Reversing C++ |
Paul Vincent Sabanal & Mark Vincent Yason |
Presentation |
Paper |
Danger From Below: The Untold Tale of Database Communication Protocol Vulnerabilities |
Amichai Shulman |
Presentation |
Paper |
Smashing Web Apps: Applying Fuzzing to Web Applications and Web Services |
Michael Sutton |
Presentation |
- |
Exploting Similarity Between Variants to Defeat Malware |
Andrew Walenstein |
Presentation |
Paper |
Volatools: Integrating Volatile Memory Forensics into the Digital Investigation Process |
Aaron Walters, Nick Petroni, Jr |
Presentation |
Paper |
GS and ASLR in Windows Vista |
Ollie Whitehouse |
Presentation |
Paper |
Web Application Incident Response and Forensics - A Whole New Ball Game! |
Chuck Willis, Rohyt Belani |
Presentation |
Paper |
360° Anomaly Based Unsupervised Intrusion Detection |
Stefano Zanero |
Presentation |
Paper |