BlackHat DC 2007
 
NAC Ofir Arkin Presentation Paper
Attack Patterns: Knowing Your Enemies in Order to Defeat Them Sean Barnum Presentation Paper
Secure Processors for Embedded Applications James D. Broesch Presentation Paper
Practical 10 Minute Security Audit: The Oracle Case Cesar Cerrudo Presentation Paper
Firmware Rootkits and the Threat to the Enterprise John Heasman - Paper
Practical Malware Analysis: Fundamental Techniques and a New Method for Malware Discovery Kris Kendall, Chad McMillan Presentation Paper
Advanced Oracle Attack Techniques David Litchfield Presentation -
Agile Incident Response: Operating through Ongoing Confrontation Kevin Mandia Presentation -
Being Explicit about Software Weaknesses Robert A. Martin, Steve Christey, Sean Barnum Presentation Paper
Device Drivers 2.0 David Maynor - -
Data Seepage: How to Give Attackers a Roadmap to Your Network David Maynor, Robert Graham Presentation -
Botnet Tracking: Tools, Techniques, and Lessons Learned Jose Nazario Presentation Paper
Beyond The CPU: Defeating Hardware Based RAM Acquisition Tools (Part I: AMD case) Joanna Rutkowska Presentation -
Reversing C++ Paul Vincent Sabanal & Mark Vincent Yason Presentation Paper
Danger From Below: The Untold Tale of Database Communication Protocol Vulnerabilities Amichai Shulman Presentation Paper
Smashing Web Apps: Applying Fuzzing to Web Applications and Web Services Michael Sutton Presentation -
Exploting Similarity Between Variants to Defeat Malware Andrew Walenstein Presentation Paper
Volatools: Integrating Volatile Memory Forensics into the Digital Investigation Process Aaron Walters, Nick Petroni, Jr Presentation Paper
GS and ASLR in Windows Vista Ollie Whitehouse Presentation Paper
Web Application Incident Response and Forensics - A Whole New Ball Game! Chuck Willis, Rohyt Belani Presentation Paper
360° Anomaly Based Unsupervised Intrusion Detection Stefano Zanero Presentation Paper