Attacking the IPv6 protocol suite |
van Hauser |
- |
- |
Protecting the Infrastructure |
Jim DeLeskie, Danny McPherson |
- |
- |
An hour of Rap and Comedy about SAP - Mo' Budget, Mo' Problems |
Steve Lord |
Presentation |
- |
Magstripe Madness |
Major Malfunction |
Presentation |
- |
Metasploitation |
HD Moore |
Presentation |
- |
Carrier VoIP Security |
Nico Fischbach |
Presentation |
- |
Attacking VoIP Networks |
Hendrik Scholz |
Presentation |
- |
Security Issues related to Pentium System Management Mode |
Duflot |
Presentation |
- |
Real Time Threat Mitigation Techniques |
Josh Ryder |
Presentation |
- |
Stunt Profiling: Securing a System While You Wait |
Crispin Cowan |
- |
- |
Visualizing source code for auditing |
Lisa Thalheim |
- |
- |
Attacking Web Services |
Alex Stamos, Scott Stender |
Presentation |
- |
Reverse Engineering Microsoft Binaries |
Alexander Sotirov |
Presentation |
- |
Zen and the art of collecting and analyzing Malware |
Fred Arbogast, Sascha Rommelfangen |
Presentation |
- |
How to test an IPS |
Renaud Bidou |
Presentation |
- |
Insiders View: Network Security Devices |
Dennis Cox |
Presentation |
- |
More on Uninitialized Variables |
Halvar Flake |
- |
- |
Security Testing SCADA and Control Systems |
Eric Byres |
Presentation |
- |
Windows HIPS evaluation with Slipfest |
Julien Tinnes, Yoann Guillot |
Presentation |
- |
Next Generation Kernel Activity Monitoring |
Edward Balas, Mike Davis |
Presentation |
- |
RF Technical Security Counter Measures |
Tim Johnson |
- |
- |
Advancements in Anonymous eAnnoyance |
Christopher Abad |
|
|