WiFi in Windows Vista: A Peek Inside the Kimono |
Noel Anderson, Taroon Mandhana |
- |
- |
Bypassing Network Access Control (NAC) Systems |
Ofir Arkin |
Presentation |
- |
Investigating Evil Websites with Monkeyspaw |
Tod Beardsley |
Presentation |
- |
Finding Gold in the Browser Cache |
Corey Benninger |
Presentation |
- |
IPS Shortcomings |
Renaud Bidou |
Presentation |
- |
Automated Malware Classification-Analysis Though Network Theory and Statistics |
Daniel Bilar |
Presentation |
- |
Taming Bugs - The Art and Science of Writing Secure Code |
Paul Bohm |
Presentation |
- |
Physical Memory Forensics |
|
Presentation |
- |
Fuzzing Selected Win32 Interprocess Communication Mechanisms |
Jesse Burns |
Presentation |
- |
R^2 - The Exponential Growth of Rootkit Techniques |
Jamie Butler, Nick Petroni, William Arbaugh |
Presentation |
- |
Device Drivers |
johnny cache & David Maynor |
Presentation |
- |
Thermoptic Camoflauge - Total IDS Evasion |
Brian Caswell, HD Moore |
Presentation |
- |
Microsoft Security Fundamentals - Engineering, Response and Outreach |
Andrew Cushman |
Presentation |
- |
I’m going to shoot the next person who says VLANs |
Himanshu Dwivedi |
Presentation |
- |
Attacking Apple’s Xsan |
Charles Edge |
Presentation |
- |
Hardware Virtualization Based Rootkits |
Dino Dai Zovi |
Presentation |
- |
Sidewinder - An Evolutionary Guidance System for Malicious Input Crafting |
Shawn Embleton, Sherri Sparks, Ryan Cunningham |
Presentation |
- |
Hacking VoIP Exposed |
David Endler, Mark Collier |
Presentation |
- |
Breaking Crypto Without Keys - Analyzing Data in Web Applications |
Chris Eng |
Presentation |
- |
Analysing Complex Systems - the BlackBerry Case |
FX |
Presentation |
- |
MatriXay - When WebApp&Database Security Pen-Test/Audit Is a Joy |
Yuan Fan, Xiao Rong |
Presentation |
- |
How to Unwrap Oracle PL/SQL.pdf |
Pete Finnigan |
Presentation |
- |
Carrier VoIP Security |
Nicolas Fischbach |
Presentation |
- |
RE 2006: New Challenges Need Changing Tools |
Halvar Flake |
- |
- |
Case Study: The Secure Development Lifecycle and Internet Explorer 7 |
Rob Franco |
- |
- |
The Speed of (In)security |
Stefan Frei, Dr. Martin May |
Presentation |
- |
Finding and Preventing Cross-site request Forgery |
Tom Gallagher |
Presentation |
- |
The NetIO Stack - Reinventing TCP-IP in Windows Vista |
Abolade Gbadegesin |
Presentation |
- |
Hacking Intranet Websites from the Outside |
Jeremiah Grossman, TC Niedzialkowski |
Presentation |
- |
New Attack RFID-systems and Their Middleware and Backends |
Lukas Grunwald |
Presentation |
- |
Open to Attack - Vulnerabilities of the Linux Random Number Generator |
Zvi Gutterman |
Presentation |
- |
AJAX (in)security |
Billy Hoffman |
Presentation |
- |
Analysis of Web Application Worms and Viruses |
Billy Hoffman |
Presentation |
- |
Hacking World of Warcraft®: An Exercise in Advanced Rootkit Design |
Greg Hoglund |
- |
- |
Faster Pwning Assured - Hardware Hacks and Cracks with FPGAs |
David Hulton, Dan Moniz |
Presentation |
- |
Black Ops 2006 |
Dan Kaminsky |
- |
- |
Code Integration-Based Vulnerability Auditing |
William Kimball |
Presentation |
- |
Oracle Rootkits 2.0 - The Next Generation |
Alexander Kornbrust |
Presentation |
- |
You Are What You Type - Non-Classical Computer Forensics |
Dr. Neal Krawetz |
Presentation |
- |
Security Engineering in Windows Vista |
John Lambert |
Presentation |
- |
Death by 1000 Cuts |
Johnny Long |
- |
- |
Hacking, Hollywood Style |
Johnny Long |
- |
- |
The State of Incidence Response |
Kevin Mandia |
Presentation |
- |
Windows Vista Heap Management Enhancements– Security, Reliability and Performance |
Adrian Marinescu |
Presentation |
- |
The BlueBag - A Mobile, Covert Bluetooth Attack and Infection Device |
Claudio Merloni, Luca Carettoni |
Presentation |
- |
Defending Against Social Engineering with Voice Analytics |
Doug Mohney |
Presentation |
- |
Six Degrees of XSSploitation |
Dan Moniz, HD Moore |
- |
- |
Metasploit Reloaded |
HD Moore |
Presentation |
- |
Building Security into the Software LifeCycle, A Business Case |
Marco Morana |
Presentation |
- |
Runtime Packers - The Hidden Problem |
Maik Morgenstern, Tom Brosch |
Presentation |
- |
Defending Black Box Web Applications - Building an Open Source Web Security Gateway |
Shawn Moyer |
Presentation |
- |
SQL Injections by Truncation |
Bala Neerumalla |
Presentation |
- |
Vulnerabilities in Not-So Embedded Systems |
Brendan O'Connor |
Presentation |
- |
Bluetooth Defense Kit |
Bruce Potter |
Presentation |
- |
The Trusted Computing Revolution |
Bruce Potter |
Presentation |
- |
Do Enterprise Management Applications Dream of Electric Sheep |
Tom Ptacek, Dave Goldsmith |
Presentation |
- |
PDB - The Protocol DeBugger |
Jeremy Rauch |
Presentation |
- |
RFID Malware Demystified |
Melanie Rieback |
Presentation |
- |
Subverting Vista Kernel For Fun And Profit |
Joanna Rutkowska |
Presentation |
- |
SIP Stack Fingerprinting and Stack Difference Attacks |
Hendrik Scholz |
Presentation |
- |
A Tale of Two Proxies |
SensePost |
- |
- |
Writing Metasploit Plugins - From Vulnerability to Exploit |
Saumil Shah |
- |
- |
Phishing with Asterisk PBX |
Jay Schulman |
Presentation |
- |
RAIDE - Rootkit Analysis Identification Elimination v1.0 |
Peter Silberman, Jamie Butler |
Presentation |
- |
Hotpatching and the Rise of Third-Party Patches |
Alexander Sotirov |
Presentation |
- |
Auditing Data Access Without Bringing Your Database To Its Knees |
Kimber Spradlin, Dale Brocklehurst |
Presentation |
- |
$30, 30 minutes, 30 networks (Project Cowbird) |
Jonathan Squire |
Presentation |
- |
Breaking AJAX Web Applications: Vulns 2.0 in Web 2.0 |
Alex Stamos, Zane Lackey |
- |
- |
Attacking Internationalized Software |
Scott Stender |
Presentation |
- |
Punk Ode - Hiding Shellcode In Plain Sight |
Michael Sutton, Greg MacManus |
Presentation |
- |
Rootkits - Attacking Personal Firewalls |
Alexander Tereshkin |
Presentation |
- |
The Statue of Liberty - Utilizing Active Honeypots for Hosting Potentially Malicious Events |
Philip Trainor |
Presentation |
- |
Wi-Fi Advanced Stealth |
Franck Veysset, Laurent Butti |
Presentation |
- |
VOIP Security Essentials |
Jeff Waldron |
Presentation |
- |
Web Application Incident Response & Forensics - A Whole New Ball Game! |
Chuck Willis, Rohyt Belani |
Presentation |
- |
NIDS - False Positive Reduction Through Anomaly Detection |
Emmanuelle Zambon, Damiano Bolzoni |
Presentation |
- |
Host Based Anomaly Detection on System Call Arguments |
Stefano Zanero |
Presentation |
- |