| Spam-Evolution |
Aseem "@" Jakhar |
Presentation |
- |
| LDAP Injection & Blind LDAP Injection |
Chema Alonso, Jose Parada Gimeno |
Presentation |
Paper |
| Malware on the Net - Behind the Scenes |
Iftach Ian Amit |
Presentation |
Paper |
| CrackStation |
Nick Breese |
Presentation |
- |
| Bad Sushi - Beating Phishers at Their Own Game |
Nitesh Dhanjani, Billy Rios |
- |
- |
| Side Channel Analysis on Embedded Systems. Impact and Countermeasures |
Job DeHaas |
Presentation |
- |
| New Viral Threats of PDF Language |
Eric Filiol |
Presentation |
Paper |
| 0-Day Patch -Exposing Vendors (In)Security Performance |
Stefan Frei, Bernard Tellenbach |
Presentation |
Paper |
| Intercepting Mobile Phone/GSM Traffic |
David Hulton, Steve |
Presentation |
Paper |
| Biologger - A Biometric Keylogger |
Matthew Lewis |
Presentation |
Paper |
| Developments in Cisco IOS Forensics |
Felix "FX" Lindner |
Presentation |
- |
| URI Use and Abuse |
Nathan McFeters, Rob Carter, Billy Rios |
Presentation |
Paper |
| Mobile Phone Spying Tools |
Jarno Niemela |
Presentation |
- |
| Attacking Anti-Virus |
Feng Xue |
Presentation |
Paper |
| The Fundamentals of Physical Security |
Deviant Ollam |
Presentation |
Paper |
| Client-side Security |
Petko D. Petkov |
Presentation |
Paper |
| Antiphishing Security Strategy |
Angelo P.E. Rosiello |
Presentation |
- |
| Security Failures in Secure Devices |
Christopher Tarnovsky |
Presentation |
- |
| Investigating Individuals and Organizations Using Open Source Intelligence |
Roelof Temmingh, Chris Bohme |
Presentation |
- |
| Exposing Vulnerabilities in Media Software |
David Thiel |
Presentation |
Paper |
| Hacking Second Life |
Michael Thumann |
Presentation |
Paper |
| Iron Chef Black Hat: John Henry Challenge |
Jacob West, Pravir Chandra, Brian Chess, Sean Fay |
Presentation |
- |
| DTRACE: The Reverse Engineer's Unexpected Swiss Army Knife |
David Weston, Tiller Beauchamp |
Presentation |
Paper |