| NAC |
Ofir Arkin |
Presentation |
Paper |
| Attack Patterns: Knowing Your Enemies in Order to Defeat Them |
Sean Barnum |
Presentation |
Paper |
| Secure Processors for Embedded Applications |
James D. Broesch |
Presentation |
Paper |
| Practical 10 Minute Security Audit: The Oracle Case |
Cesar Cerrudo |
Presentation |
Paper |
| Firmware Rootkits and the Threat to the Enterprise |
John Heasman |
- |
Paper |
| Practical Malware Analysis: Fundamental Techniques and a New Method for Malware Discovery |
Kris Kendall, Chad McMillan |
Presentation |
Paper |
| Advanced Oracle Attack Techniques |
David Litchfield |
Presentation |
- |
| Agile Incident Response: Operating through Ongoing Confrontation |
Kevin Mandia |
Presentation |
- |
| Being Explicit about Software Weaknesses |
Robert A. Martin, Steve Christey, Sean Barnum |
Presentation |
Paper |
| Device Drivers 2.0 |
David Maynor |
- |
- |
| Data Seepage: How to Give Attackers a Roadmap to Your Network |
David Maynor, Robert Graham |
Presentation |
- |
| Botnet Tracking: Tools, Techniques, and Lessons Learned |
Jose Nazario |
Presentation |
Paper |
| Beyond The CPU: Defeating Hardware Based RAM Acquisition Tools (Part I: AMD case) |
Joanna Rutkowska |
Presentation |
- |
| Reversing C++ |
Paul Vincent Sabanal & Mark Vincent Yason |
Presentation |
Paper |
| Danger From Below: The Untold Tale of Database Communication Protocol Vulnerabilities |
Amichai Shulman |
Presentation |
Paper |
| Smashing Web Apps: Applying Fuzzing to Web Applications and Web Services |
Michael Sutton |
Presentation |
- |
| Exploting Similarity Between Variants to Defeat Malware |
Andrew Walenstein |
Presentation |
Paper |
| Volatools: Integrating Volatile Memory Forensics into the Digital Investigation Process |
Aaron Walters, Nick Petroni, Jr |
Presentation |
Paper |
| GS and ASLR in Windows Vista |
Ollie Whitehouse |
Presentation |
Paper |
| Web Application Incident Response and Forensics - A Whole New Ball Game! |
Chuck Willis, Rohyt Belani |
Presentation |
Paper |
| 360° Anomaly Based Unsupervised Intrusion Detection |
Stefano Zanero |
Presentation |
Paper |