| A Paranoid Perspective of an Interpreted Language |
Dominique Brezinski |
Presentation |
- |
| Hacking in a Foreign Language: A Network Security Guide to Russia (and Beyond) |
Kenneth Geers |
Presentation |
- |
| Phishing with Super Bait |
Jeremiah Grossman |
Presentation |
- |
| Identifying and Responding to Wireless Attacks |
Chris Hurley (Roamer) |
Presentation |
- |
| Forensics in Japan |
Hideaki Ihara |
Presentation |
- |
| Black Ops Of TCP/IP 2005 |
Dan Kaminsky |
Presentation |
- |
| Botnet survey result. "Our security depends on your security." |
Satoru Koyama |
Presentation |
- |
| Architecture Flaws in Common Security Tools |
David Maynor |
Presentation |
- |
| The Art of SIP fuzzing and Vulnerabilities Found in VoIP |
Ejovi Nuwere |
Presentation |
- |
| Adware/Spyware |
Saumil Shah, Dave Cole |
Presentation |
- |
| "Shadow Walker" - Raising The Bar For Rootkit Detection |
Sherri Sparks, Jamie Butler |
Presentation |
- |
| The Art of File Format Fuzzing |
Michael Sutton, Adam Greene |
Presentation |
- |