| Building a modern LDAP based security framework | Andrea Barisani | Presentation | - | 
   | WiFi traffic injection based attacks | Cédric "Sid" Blancher | Presentation | - | 
   | Using Neural Networks for remote OS identification | Javier Burroni | Presentation | - | 
   | Watching hackers hack - attack visualization | Maximillian Dornseif | - |  | 
   | Commercial Software and How Can We Fix It | Adam Jacobs | Presentation | - | 
   | Writing Better Intrusion Prevention Signatures | Chris Jordan | Presentation | - | 
   | Advances in trojan threats | Hiroshi Shinotsuka | Presentation | - | 
   | Unix Kernel Auditing | Ilja van Sprundel | Presentation | - | 
   | Fault Redundant IPV6 Wireless Firewalls | Mark Uemura | Presentation | - | 
   | Exploiting Real-Time OS Based Embedded Systems Using the JTAG Emulator | Yuji Ukai | Presentation | - | 
   | VoIP - SIP robustness and RTP security | Christian Wieser | Presentation | - | 
   | Attacking the IPv6 protocol suite | van Hauser | Presentation | - |