| Low Down and Dirty: Anti-Forensic Rootkits |
Darren Bilby |
Presentation |
- |
| Taming Bugs: The Art and Science of Writing Secure Code |
Paul Bohm |
Presentation |
- |
| IPv6 World Update: Strategy & Tactics |
Kenneth Geers, Alexander Eisen |
Presentation |
- |
| Hacking Intranet Websites from the Outside "JavaScript malware just got a lot more dangerous" |
Jeremiah Grossman |
Presentation |
- |
| Increasingly-sophisticated Online Swindlers |
Yuji Hoshizawa |
Presentation |
- |
| Input Attack Trees: Death of a Thousand Leaves |
Heikki Kortti |
Presentation |
- |
| Six Degrees of XSSploitation |
Dan Moniz |
Presentation |
- |
| Subverting Vista Kernel For Fun And Profit |
Joanna Rutkowska |
Presentation |
- |
| Breaking AJAX Web Applications: Vulns 2.0 in Web 2.0 |
Alex Stamos, Zane Lackey |
Presentation |
- |
| Attacking Internationalized Software |
Scott Stender |
Presentation |
- |
| Winny P2P Security |
Takayuki Sugiura |
Presentation |
- |
| Catching Malware to Detect, Track and Mitigate Botnets |
Georg Wicherski, Thorsten Holz |
Presentation |
- |