Smashing Heap by Free Simulation |
Sandip Chaudhari |
Presentation |
Paper |
Methods of increasing source code security automatically |
Ben Chelf, Coverity |
Presentation |
- |
IPTV: Triple Play Triple Threats |
YM Chen, McAfee |
Presentation |
- |
Mobile IPV6 Security |
Arnaud Ebalard, Guillaume Valadon |
Presentation |
- |
Threats against and protection of Microsoft's internal network |
Greg Galford |
- |
- |
How to secure a networking stack: IPv6 and NetIO |
Abolade Gbadegesin |
Presentation |
- |
On XSRF(Cross Site Request Forgery) and why you should care |
Martin Johns |
Presentation |
- |
Linux Kernel == Security Nightmare |
Marcel Holtmann |
Presentation |
- |
Hacking fingerprint recognition systems |
Jan Krissler |
Presentation |
- |
OpenOffice/OpenDocument and MS OpenXML security |
Philippe Lagadec |
Presentation |
- |
The Malware Landscape |
Adam Overton, Jeff Williams |
- |
- |
Strong cryptographic payload obfuscation and encryption |
Ariel Waissbein |
Presentation |
- |
Undermining Security in Vista WCF |
Marc Schoenefeld |
Presentation |
- |
Evolving Windows Shellcode |
Masaki Suenaga |
Presentation |
- |
IPV6 Mapping |
Yuji Ukai |
Presentation |
- |
MSKK Security Fundamentals |
Yuji Okuten |
- |
- |