New Security Analysis Techniques |
Christopher Abad |
Presentation |
- |
Packet generation with scapy |
Philippe Biondi |
Presentation |
- |
Windows Internals |
Cesar Cerrudo |
Presentation |
Sources |
Large Memory Usage |
Gael Delalleau |
Presentation |
- |
Mobile Workstations, mitigating the crawling trojans |
Cedric Blancher |
Presentation |
- |
0wn3d by an iPod: Firewire1394 Issues |
Maximillian Dornseif |
Presentation |
- |
Stack Protection Systems (ProPolice, XP SP2...) |
Hiroaki Eto |
Presentation |
- |
The Use of Network Flows in Security |
Nicolas Fischbach |
Presentation |
- |
Binary Difference Analysis |
Halvar Flake |
- |
- |
Hacking NMAP and mapping techniques |
Fyodor |
Presentation |
- |
ICMP Attacks |
Fernando Gont |
- |
- |
Mobile Phone Symbian OS Security |
Job de Haas |
- |
- |
Step into Ring 0 |
Barnaby Jack |
Presentation |
- |
Rogue Access Points |
Shane "K2" Macaulay, Dino Dai Zovi |
- |
- |
OSVDB & Vulnerability Databases |
Brian Martin, Jake Kouns |
Presentation |
- |
0wn3d by everything else - USB/PCMCIA Issues |
David Maynor |
Presentation |
- |
Advances in Exploit Technology |
H D Moore & spoonm |
Presentation |
- |
Target Based IDS and Snort Roadmap |
Marty Roesch |
Presentation |
- |
The Common Vulnerability Scoring System |
Mike Schiffman |
- |
- |
XPSP2 Internals |
Snyder |
- |
- |
Anti-Virus Issues |
Alex Wheeler, Neel Mehta |
Presentation |
- |