Analyzing OS fingerprints using Neural Networks and Statistical Machinery |
Javier Burroni, Carlos Sarraute |
Presentation |
- |
Attacking the IPv6 protocol suite |
van Hauser |
- |
- |
XEBEK - A Next Generation Honeypot Monitoring System |
Nguyen Anh Quynh |
Presentation |
|
Malicious Crypto |
Fred Raynal |
Presentation |
- |
Windows Local Shellcode Injection |
Cesar Cerrudo |
Presentation |
Paper |
Microsoft Security Fundamentals |
Andrew Cushman |
Presentation |
- |
Exploiting Real-Time OS Based Embedded Systems Using the JTAG Emulator |
Barnaby Jack |
Presentation |
- |
Advanced Web Hacking - Attacks & Defense |
Shreeraj Shah |
Presentation |
- |
Practical Automated Web Application Attack Techniques |
Justin Clarke |
- |
- |
ColdFusion Security |
Andy Davis |
Presentation |
- |
ARMed Combat - The Fight For Personal Security |
Tim Hurman |
Presentation |
- |
A Visual Approach to Security Event Management |
Raffael Marty |
Presentation |
- |
Network Security Monitoring - Theory and Practice |
Michael Boman |
Presentation |
- |
Protecting the Infrastructure |
Jim DeLeskie, Danny McPherson |
Presentation |
- |
Lessons in Open Source Security - The Tale of a 0-Day Incident |
Andrea Barisani |
Presentation |
- |