| Nematodes |
David Aitel |
Presentation |
- |
| Finding Digital Evidence in Physical Memory |
Mariusz Burdach |
Presentation |
- |
| Client Side Penetration Testing |
Max Caceres |
Presentation |
- |
| How to Automatically Sandbox IIS With Zero False Positive and Negative |
Tzi-cker Chiueh |
Presentation |
- |
| Angel Recon System (ARS) Prototype: Heuristic Vulnerability Analysis and Attack |
Drew Copley |
Presentation |
- |
| Attacks on Uninitialized Local Variables |
Halvar Flake |
Presentation |
- |
| New Directions in Disk Forensics |
Simson L. Garfinkel |
Presentation |
- |
| Implementing and Detecting An ACPI BIOS Rootkit |
John Heasman |
Presentation |
- |
| Analysis of Web Application Worms and Viruses |
Billy Hoffman |
Presentation |
- |
| Network Black Ops: Extracting Unexpected Functionality from Existing Networks |
Dan Kaminsky |
Presentation |
- |
| Analysis of Adversarial Code: Problem, Challenges, Results |
Arun Lakhotia |
Presentation |
- |
| Breakable |
David Litchfield |
- |
- |
| Foreign Attacks on Corporate America |
Kevin Mandia |
Presentation |
- |
| SCADA Security and Terrorism: We're Not Crying Wolf! |
David Maynor, Robert Graham |
Presentation |
- |
| Combatting Symbian Malware |
Jarno Niemela |
Presentation |
Paper |
| The Era of a Zero-Day Nation-State: Characterising the real threats to our nation’s critical information systems |
Tom Parker, Matthew G. Devost |
Presentation |
- |
| Rootkit Hunting vs. Compromise Detection |
Joanna Rutkowska |
Presentation |
- |
| Pentesting J2EE |
Marc Schoenefeld |
Presentation |
- |
| Beyond EIP |
spoonm, skape |
Presentation |
- |
| Playing Server Hide and Seek on the Tor Anonymity Network |
Paul Syverson, Lasse Øverlier |
Presentation |
- |
| FragFS: An Advanced NTFS Data Hiding Technique |
Irby Thompson, Mathew Monroe |
Presentation |
- |
| My IDS is better than yours. Or is it? |
Stefano Zanero |
Presentation |
- |