Building a modern LDAP based security framework |
Andrea Barisani |
Presentation |
- |
WiFi traffic injection based attacks |
Cédric "Sid" Blancher |
Presentation |
- |
Using Neural Networks for remote OS identification |
Javier Burroni |
Presentation |
- |
Watching hackers hack - attack visualization |
Maximillian Dornseif |
- |
|
Commercial Software and How Can We Fix It |
Adam Jacobs |
Presentation |
- |
Writing Better Intrusion Prevention Signatures |
Chris Jordan |
Presentation |
- |
Advances in trojan threats |
Hiroshi Shinotsuka |
Presentation |
- |
Unix Kernel Auditing |
Ilja van Sprundel |
Presentation |
- |
Fault Redundant IPV6 Wireless Firewalls |
Mark Uemura |
Presentation |
- |
Exploiting Real-Time OS Based Embedded Systems Using the JTAG Emulator |
Yuji Ukai |
Presentation |
- |
VoIP - SIP robustness and RTP security |
Christian Wieser |
Presentation |
- |
Attacking the IPv6 protocol suite |
van Hauser |
Presentation |
- |