Dynamic Taint Propagation: Finding Vulnerabilities Without Attacking |
Brian Chess, Chief Scientist, Jacob West, Manager, Security Research Group |
Presentation |
- |
Botnet Population and Intelligence Gathering Techniques |
David Dagon, Christopher Davis |
Presentation |
- |
Side Channel Analysis on Embedded Systems. Impact and Countermeasures |
Job De Haas |
Presentation |
- |
Bad Sushi - Beating Phishers at Their Own Game |
Nitesh Dhanjani, Billy Rios |
Presentation |
- |
Entertainment Talk - Social Engineering |
Peter Earnest |
- |
- |
IO in the Cyber Domain, Immunity Style |
Sinan Eren |
Presentation |
- |
Biometric and Token-Based Access Control Systems |
Zac Franken |
Presentation |
- |
Threats to the 2008 Presidential Election |
Oliver Friedrichs |
Presentation |
Paper |
Developments in Cisco IOS Forensics |
FX |
- |
Paper |
Cracking GSM |
David Hulton |
Presentation |
Paper |
Hacking VoIP through IPSec Tunnels |
Sachin Jogkelar |
- |
- |
A Picture's Worth: Digital Image Analysis |
Dr. Neal Krawetz |
Presentation |
Paper |
SCADA Security |
Jason Larsen |
Presentation |
- |
RFIDIOts!!! -Practical RFID hacking (without soldering irons) |
Adam Laurie |
Presentation |
- |
Oracle Security |
David Litchfield |
- |
- |
URI Use and Abuse |
Nathan McFeters |
Presentation |
Paper |
Analyzing an Unknown RF-Based Data Transmission |
Max Moser |
- |
Paper |
(un)Smashing the Stack: Overflows, Countermeasures, and the Real World |
Shawn Moyer |
Presentation |
Paper |
Exploiting Live Virtual Machine Migration |
Jon Oberheide |
Presentation |
Paper |
Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools |
Sheeraj Shah |
Presentation |
- |
Security Failures in Secure Devices |
Christopher Tarnovsky |
Presentation |
- |
Preparing for the Cross Site Request Forgery Defense |
Chuck Willis |
Presentation |
Paper |
DTRACE: The Reverse Engineer's Unexpected Swiss Army Knife |
David Weston, Tiller Beauchamp |
Presentation |
Paper |
Classification and Detection of Application Backdoors |
Chris Wysopal |
- |
- |