CanSecWest 2007
 
Exploiting Embedded Systems - The Sequel! Barnaby Jack Presentation Paper
Unusual Car Navigation Tricks Andrea Barisani, Daniele Bianco Presentation -
Vista's Network Attack Surface Jim Hoagland - -
Vista Internals: User Account Control, Protected-Mode IE, and Bitlocker Mark Russinovich - -
RFID Adam Laurie Presentation -
Reverse Engineering Malicious Javascript Jose Nazario Presentation -
Other Wireless: New ways to get Pwned Luis Miras Presentation -
NGN - Next Generation Networks Nicolas Fischbach Presentation -
Wii Control You Marcel Holtmann - -
Playing with ActiveX controls Su Yong Kim, Do Hoon Lee - -
Good and Bad Uses of Vulnerability Data Ron Gula Presentation -
A Network Analysis Manifold Michael Geide Presentation -
Fun with IPv6 routing headers Philippe Biondi, Arnaud Ebalard Presentation -
Live Free or Hack Hard - Metasploit 2007 HD Moore Presentation -
Post-Mortem RAM Forensics Tim Vidas Presentation -
I know what you (and your company) did last summer... Roelof Temmingh Presentation -
Black Box Analysis and Attacks of Nortel VoIP Implementations Richard Gowman, Eldon Sprickerhoff Presentation Source
Smashing Web Apps: Applying Fuzzing to Web Applications and Web Services Michael Sutton - -
Low-Rate Denial-of-Service attacks V. Anil Kumar - -
Unusual bugs Ilja van Sprundel - -
An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments Tavis Ormandy - -
ScarabMon: Automating Web Application Pentests Jonathan Wilkins - -