BlackHat USA 2007
 
Dangling Pointer Jonathan Afek Presentation Paper
Fuzzing Sucks! Aaron Portnoy, Pedram Amini - Paper
Injecting RDS-TMC Traffic Information Signals a.k.a. How to freak out your Satellite Navigation Andrea Barisani & Daniele Bianco Presentation Paper
Smoke 'em Out! Rohyt Belani & Keith Jones - Paper
Sphinx: An Anomaly-based Web Intrusion Detection System Damiano Bolzoni, Emmanuel Zambon - -
Remote and Local Exploitation of Network Drivers Yuriy Bulygin Presentation Paper
Blackout: What Really Happened... Jamie Butler, Kris Kendall Presentation -
Intranet Invasion With Anti-DNS Pinning David Byrne Presentation Paper
Traffic Analysis - The Most Powerful and Least Understood Attack Methods Jon Callas, Raven Alder, Riccardo Bettati, Nick Mathewson Presentation -
Reverse Engineering Automation with Python Ero Carrera Presentation -
Defeating Web Browser Heap Spray Attacks Stephan Chenette, Moti Joseph Presentation -
Iron Chef Blackhat Brian Chess, Jacob West, Sean Fay, Toshinari Kureha Presentation Paper
Unforgivable Vulnerabilities Steve Christey - Paper
Computer and Internet Security Law - A Year in Review 2006-2007 Robert W. Clark Presentation -
Building an Effective Application Security Practice on a Shoestring Budget David Coffey, John Viega Presentation Paper
Side Channel Attacks (DPA) and Countermeasures for Embedded Systems Job De Haas Presentation -
The Security Analytics Project: Alternatives in Analysis Mark Ryan del Moral Talabis Presentation Paper
VoIP Security: Methodology and Results Barrie Dempster Presentation Paper
Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing Jared DeMott, Dr. Richard Enbody, Dr. Bill Punch Presentation Paper
PISA: Protocol Identification via Statistical Analysis Rohit Dhamankar, Rob King Presentation Paper
Tor and Blocking-resistance Roger Dingledine - -
Something Old (H.323), Something New (IAX), Something Hollow (Security), and Something Blue (VoIP Administrators) Himanshu Dwivedi, Zane Lackey Presentation Paper
Kernel Wars Joel Eriksson, Christer Öberg, Claes Nyberg, Karl Janmar Presentation Paper
CaffeineMonkey: Automated Collection, Detection and Analysis of Malicious JavaScript Ben Feinstein, Daniel Peck Presentation Paper
Understanding the Heap by Breaking It Justin N. Ferguson Presentation Paper
SQL Server Database Forensics Kevvie Fowler Presentation Paper
Hacking Capitalism Dave G., Jeremy Rauch Presentation -
Greetz from Room 101 Kenneth Geers Presentation Paper
Hacking Intranet Websites from the Outside (Take 2)—"Fun With and Without JavaScript Malware" Jeremiah Grossman, Robert Hansen Presentation Paper
Disclosure and Intellectual Property Law: Case Studies Jennifer Granick - -
A Dynamic Technique for Enhancing the Security and Privacy of Web Applications Ezequiel D. Gutesman & Ariel Waissbein Presentation Paper
Stealth Secrets of the Malware Ninjas Nick Harbour Presentation Paper
Hacking the Extensible Firmware Interface John Heasman Presentation -
Attacking Web Service Security: Message Oriented Madness, XML Worms and Web Service Security Sanity Brad Hill Presentation Paper
Vista Network Attack Surface Analysis and Teredo Security Implications Jim Hoagland Presentation Paper
Active Reversing: The Next Generation of Reverse Engineering Greg Hoglund Presentation -
Status of Cell Phone Malware in 2007 Mikko Hypponen Presentation Paper
Black Ops 2007: Design Reviewing The Web Dan Kaminksy Presentation -
Vulnerabilities in Wi-Fi/Dual-Mode VoIP Phones Krishna Kurapati Presentation Paper
Point, Click, RTPInject Zane Lackey, Alex Garbutt Presentation -
RFIDIOts!!! - Practical RFID Hacking (Without Soldering Irons or Patent Attorneys) Adam Laurie Presentation -
Anonymous Authentication - Preserving Your Privacy Online Dr. Andrew Lindell Presentation Paper
Attacking the Windows Kernel Jonathan Lindsay Presentation Paper
Database Forensics David Litchfield Presentation -
OpenBSD Remote Exploit Alfredo Ortega Presentation Paper
It's All About the Timing Haroon Meer, Marco Slaviero Presentation Paper
Hacking Leopard: Tools and techniques for attacking the newest Mac OS X Charlie Miller Presentation Paper
Other Wireless: New ways of being Pwned Luis Miras Presentation Paper
Defeating Information Leak Prevention Eric Monti, Dan Moniz Presentation -
Tactical Exploitation HD Moore, Valsmith Presentation Paper
Type Conversion Errors: How a Little Data Type Can Do a Whole Lot of Damage Jeff Morin Presentation Paper
(un)Smashing the Stack Shawn Moyer Presentation Paper
RFID for Beginners++ Chris Paget Presentation -
Social Network Site Data Mining Stephen Patton Presentation Paper
Securing the Tor Network Mike Perry Presentation Paper
Don't Tell Joanna, The Virtualized Rootkit Is Dead Thomas Ptacek, Nate Lawson Presentation -
Covert Debugging: Circumventing Software Armoring Techniques Danny Quist, Valsmith Presentation Paper
NACATTACK Dror-John Roecher, Michael Thumann Presentation Paper
IsGameOver(), anyone? Joanna Rutkowska, Alexander Tereshkin Presentation -
Reversing C++ Paul Vincent Sabanal - -
Strengths and Weaknesses of Access Control Systems Eric Schmiedl, Mike Spindell Presentation Paper
Reflection DNS Poisoning Jerry Schneider - -
Building and Breaking the Browser Window Snyder, Mike Shaver Presentation Paper
Heap Feng Shui in JavaScript Alexander Sotirov Presentation Paper
Blind Security Testing - An Evolutionary Approach Scott Stender Presentation Paper
Just Another Windows Kernel Perl Hacker Joe Stewart Presentation Paper
Premature Ajax-ulation Bryan Sullivan, Billy Hoffman - Paper
Transparent Weaknesses in VoIP Peter Thermos Presentation -
Exposing Vulnerabilities in Media Software David Thiel Presentation Paper
OpenID: Single Sign-On for the Internet Eugene Tsyrklevich, Vlad Tsyrklevich Presentation Paper
Timing Attacks for Recovering Private Entries From Database Engines Ariel Waissbein, Damian Saura Presentation Paper
Static Detection of Application Backdoors Chris Wysopal, Chris Eng Presentation Paper
The Art of Unpacking Mark Vincent Yason Presentation Paper
Kick Ass Hypervisoring: Windows Server Virtualization Brandon Baker Architecture Security -
Breaking C++ Applications Mark Dowd, John McDonald, Neel Mehta - Paper
Estonia: Information Warfare and Strategic Lessons Gadi Evron - -
The Little Hybrid Web Worm that Could Billy Hoffman, John Terrill - Paper
A Picture's Worth... Dr. Neal Krawetz Presentation Paper
Practical Sandboxing - Techniques for Isolating Processes David LeBlanc - -
Longhorn Server Foundation & Server Roles Iain McDonald - -
Simple Solutions to Complex Problems from the Lazy Hacker's Handbook David Maynor, Robert Graham - Paper
Breaking Forensics Software: Weaknesses in Critical Evidence Collection Chris Palmer, Tim Newsham, Alex Stamos, Chris Ridder - -
Anonymity and its Discontents Len Sassaman - Paper
Reversing MSRC Updates: Case Studies of MSRC Bulletins 2004-2007 Greg Wroblewski - -
Observing the Tidal Waves of Malware Stefano Zanero - -
Z-Phone Phil Zimmermann - -