Snort 3.0 |
Marty Roesch |
Presentation |
- |
Cross-Site Scripting Vulnerabilities in Flash Authoring Tools |
Rich Cannings |
Presentation |
- |
Proprietary RFID Systems |
Jan "starbug" Krissler, Karsten Nohl |
Presentation |
- |
Media Frenzy: Finding Bugs in Windows Media Software |
Mark Dowd, John McDonald |
Presentation |
- |
Targeted Attacks and Microsoft Office Malware |
Rob Hensing |
Presentation |
- |
Virtually Secure |
Oded Horovitz |
Presentation |
- |
Malicious Cryptography |
Frederic Raynal |
Presentation |
- |
The Death of AV Defense in Depth? Revisiting Anti-Virus Software |
Thierry Zoller, Sergio Alvarez |
Presentation |
- |
VMWare Issues |
Sun Bing |
Presentation |
- |
Intrusion Detection Systems Correlation: a Weapon of Mass Investigation |
Sebastien Tricaud, Pierre Chifflier |
Presentation |
- |
Web Wreck-utation |
Dan Hubbard and Stephan Chenette |
Presentation |
- |
Secure programming with gcc and glibc |
Marcel Holtmann |
Presentation |
- |
Mobitex network security |
olleB |
Presentation |
- |
Peach Fuzzing |
Michael Eddington |
Presentation |
- |
Fuzz by Number |
Charlie Miller |
Presentation |
- |
Fuzzing WTF? What Fuzzing Was, Is And Never Will Be. |
Frank Marcus, Mikko Varpiola |
Presentation |
- |
Vulnerabilities Die Hard |
Kowsik Guruswamy |
Presentation |
- |
Hacking Windows Vista |
Dan Grifin |
Presentation |
- |
ExeFilter: a new open-source framework for active content filtering |
Philippe Lagadec |
Presentation |
- |
VetNetSec: Security testing for Extremists |
Eric Hacker |
Presentation |
- |
w3af: A framework to own the web |
Andres Riancho |
Presentation |
- |
A Unique Behavioral Science Approach to Threats, Extortion and Internal Computer Investigations |
Scott K. Larson |
- |
- |