Exploiting Embedded Systems - The Sequel! |
Barnaby Jack |
Presentation |
Paper |
Unusual Car Navigation Tricks |
Andrea Barisani, Daniele Bianco |
Presentation |
- |
Vista's Network Attack Surface |
Jim Hoagland |
- |
- |
Vista Internals: User Account Control, Protected-Mode IE, and Bitlocker |
Mark Russinovich |
- |
- |
RFID |
Adam Laurie |
Presentation |
- |
Reverse Engineering Malicious Javascript |
Jose Nazario |
Presentation |
- |
Other Wireless: New ways to get Pwned |
Luis Miras |
Presentation |
- |
NGN - Next Generation Networks |
Nicolas Fischbach |
Presentation |
- |
Wii Control You |
Marcel Holtmann |
- |
- |
Playing with ActiveX controls |
Su Yong Kim, Do Hoon Lee |
- |
- |
Good and Bad Uses of Vulnerability Data |
Ron Gula |
Presentation |
- |
A Network Analysis Manifold |
Michael Geide |
Presentation |
- |
Fun with IPv6 routing headers |
Philippe Biondi, Arnaud Ebalard |
Presentation |
- |
Live Free or Hack Hard - Metasploit 2007 |
HD Moore |
Presentation |
- |
Post-Mortem RAM Forensics |
Tim Vidas |
Presentation |
- |
I know what you (and your company) did last summer... |
Roelof Temmingh |
Presentation |
- |
Black Box Analysis and Attacks of Nortel VoIP Implementations |
Richard Gowman, Eldon Sprickerhoff |
Presentation |
Source |
Smashing Web Apps: Applying Fuzzing to Web Applications and Web Services |
Michael Sutton |
- |
- |
Low-Rate Denial-of-Service attacks |
V. Anil Kumar |
- |
- |
Unusual bugs |
Ilja van Sprundel |
- |
- |
An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments |
Tavis Ormandy |
- |
- |
ScarabMon: Automating Web Application Pentests |
Jonathan Wilkins |
- |
- |