| BlackHat Europe 2007 |
|   |
| Web Service Vulnerabilities | Nish Bhalla | - | Paper |
| Software Virtualization Based Rootkits | Sun Bing | Presentation | Paper |
| NIDS: False Positive Reduction Through Anomaly Detection | Damiano Bolzoni | Presentation | APHRODITE POSEIDON |
| Wi-Fi Advanced Fuzzing | Laurent Butti | Presentation | Paper |
| New Botnets Trends and Threats | Augusto Paes de Barros, André Fucs, Victor Pereira | Presentation | Paper |
| Hacking Databases for Owning Your Data | Cesar Cerrudo, Esteban Martinez Fayo | Presentation | Paper |
| Kernel Wars | Joel Eriksson | Presentation | Paper |
| Next Generation Debuggers for Reverse Engineering | ERESI Team | Presentation | Paper |
| Making Windows Exploits More Reliable | Kostya Kortchinsky | Presentation | Paper |
| Vboot Kit - Compromising Windows Vista Security | Nitin Kumar, Vipin Kumar | Presentation | Paper |
| Make My Day – Just Run a Web Scanner | Toshinari Kureha, Dr. Brian Chess | Presentation | Paper |
| SCTPscan | Philippe Langlois | Presentation | Paper |
| Advanced Oracle Attack Techniques | David Litchfield | - | - |
| Challenging Malicious Inputs with Fault Tolerance Techniques | Bruno Luiz | Presentation | Paper |
| SMTP Information Gathering | Lluis Mora | Presentation | Paper |
| Attacking the Giants - Exploiting SAP Internals | Presentation | Paper | |
| Kicking Down the Cross Domain Door | Billy K Rios, Raghav Dube | Presentation | Paper |
| NACATTACK | Dror-John Roecher, Michael Thumann | Presentation | Paper |
| Heap Feng Shui in JavaScript | Alexander Sotirov | Presentation | Paper |
| GS and ASLR in Windows Vista | Ollie Whitehouse | Presentation | Paper |
| ScarabMon - Automating Web Application Penetration Tests | Jonathan Wilkins | Presentation | - |
| 360° Anomaly Based Unsupervised Intrusion Detection | Stefano Zanero | Presentation | Paper |
|   |