| Silver Needle in the Skype |
Philippe Biondi, Fabrice Desclaux |
Presentation |
- |
| IBM iSeries For Penetration Testers: Bypass Restrictions and Take Over Server |
Shalom Carmel |
Presentation |
- |
| WLSI - Windows Local Shellcode Injection |
Cesar Cerrudo |
Presentation |
- |
| How to Automatically Sandbox IIS With Zero False Positive and Negative |
Tzi-cker Chiueh |
Presentation |
Paper |
| Malware Cinema: A Picture is Worth a Thousand Packets |
Gregory Conti |
Presentation |
- |
| Separated By A Common Goal—Emerging EU and US Information Security and Privacy Law: Allies or Adversaries? |
Bryan Cunningham, Amanda Hubbard |
Presentation |
- |
| Project Paraegis Round 2: Using Razorwire HTTP proxy to strengthen webapp session handling and reduce attack surface |
Arian J. Evans, Daniel Thompson, Mark Belles |
Presentation |
- |
| Analysing Complex Systems: The BlackBerry Case |
FX |
Presentation |
- |
| Attacks on Uninitialized Local Variables |
Halvar Flake |
Presentation |
- |
| Implementing and Detecting An ACPI BIOS Rootkit |
John Heasman |
Presentation |
- |
| Exploiting Embedded Systems |
Barnaby Jack |
Presentation |
- |
| Hacking fingerprint Scanners - Why Microsoft's Fingerprint Reader Is Not a Security Feature |
Mikko Kiviharju |
Presentation |
- |
| Bluetooth Hacking - The State of The Art |
Adam Laurie, Martin Herfurt, Marcel Holtmann |
- |
- |
| Death of a Thousand Cuts- Finding Evidence Everywhere! |
Johnny Long |
- |
- |
| Hacking, Hollywood Style |
Johnny Long |
- |
- |
| Skeletons in Microsoft's Closet - Silently Fixed Vulnerabilities |
Steve Manzuik and Andre Protas |
Presentation |
- |
| Combatting Symbian Malware |
Jarno Niemela |
Presentation |
Paper |
| Stopping Automated Application Attack Tools |
Gunter Ollmann |
Presentation |
- |
| MPLS and VPLS Security |
Enno Rey |
Presentation |
- |
| Rootkit Hunting vs. Compromise Detection |
Joanna Rutkowska |
Presentation |
- |
| RAIDE: Rootkit Analysis Identification Elimination |
Peter Silberman, Jamie Butler |
Presentation |
- |
| Beyond EIP |
spoonm & skape |
Presentation |
- |
| The Science of Code Auditing |
Alex Wheeler, Mark Dowd, Neel Mehta |
Presentation |
- |
| Anomaly Detection Through System Call Argument Analysis |
Stefano Zanero |
Presentation |
- |