BlackHat Federal 2006
 
Nematodes David Aitel Presentation -
Finding Digital Evidence in Physical Memory Mariusz Burdach Presentation -
Client Side Penetration Testing Max Caceres Presentation -
How to Automatically Sandbox IIS With Zero False Positive and Negative Tzi-cker Chiueh Presentation -
Angel Recon System (ARS) Prototype: Heuristic Vulnerability Analysis and Attack Drew Copley Presentation -
Attacks on Uninitialized Local Variables Halvar Flake Presentation -
New Directions in Disk Forensics Simson L. Garfinkel Presentation -
Implementing and Detecting An ACPI BIOS Rootkit John Heasman Presentation -
Analysis of Web Application Worms and Viruses Billy Hoffman Presentation -
Network Black Ops: Extracting Unexpected Functionality from Existing Networks Dan Kaminsky Presentation -
Analysis of Adversarial Code: Problem, Challenges, Results Arun Lakhotia Presentation -
Breakable David Litchfield - -
Foreign Attacks on Corporate America Kevin Mandia Presentation -
SCADA Security and Terrorism: We're Not Crying Wolf! David Maynor, Robert Graham Presentation -
Combatting Symbian Malware Jarno Niemela Presentation Paper
The Era of a Zero-Day Nation-State: Characterising the real threats to our nation’s critical information systems Tom Parker, Matthew G. Devost Presentation -
Rootkit Hunting vs. Compromise Detection Joanna Rutkowska Presentation -
Pentesting J2EE Marc Schoenefeld Presentation -
Beyond EIP spoonm, skape Presentation -
Playing Server Hide and Seek on the Tor Anonymity Network Paul Syverson, Lasse Øverlier Presentation -
FragFS: An Advanced NTFS Data Hiding Technique Irby Thompson, Mathew Monroe Presentation -
My IDS is better than yours. Or is it? Stefano Zanero Presentation -