F Security and Hacking Documents Collection
BlackHat DC 2008
 
Dynamic Taint Propagation: Finding Vulnerabilities Without Attacking Brian Chess, Chief Scientist, Jacob West, Manager, Security Research Group Presentation -
Botnet Population and Intelligence Gathering Techniques David Dagon, Christopher Davis Presentation -
Side Channel Analysis on Embedded Systems. Impact and Countermeasures Job De Haas Presentation -
Bad Sushi - Beating Phishers at Their Own Game Nitesh Dhanjani, Billy Rios Presentation -
Entertainment Talk - Social Engineering Peter Earnest - -
IO in the Cyber Domain, Immunity Style Sinan Eren Presentation -
Biometric and Token-Based Access Control Systems Zac Franken Presentation -
Threats to the 2008 Presidential Election Oliver Friedrichs Presentation Paper
Developments in Cisco IOS Forensics FX - Paper
Cracking GSM David Hulton Presentation Paper
Hacking VoIP through IPSec Tunnels Sachin Jogkelar - -
A Picture's Worth: Digital Image Analysis Dr. Neal Krawetz Presentation Paper
SCADA Security Jason Larsen Presentation -
RFIDIOts!!! -Practical RFID hacking (without soldering irons) Adam Laurie Presentation -
Oracle Security David Litchfield - -
URI Use and Abuse Nathan McFeters Presentation Paper
Analyzing an Unknown RF-Based Data Transmission Max Moser - Paper
(un)Smashing the Stack: Overflows, Countermeasures, and the Real World Shawn Moyer Presentation Paper
Exploiting Live Virtual Machine Migration Jon Oberheide Presentation Paper
Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools Sheeraj Shah Presentation -
Security Failures in Secure Devices Christopher Tarnovsky Presentation -
Preparing for the Cross Site Request Forgery Defense Chuck Willis Presentation Paper
DTRACE: The Reverse Engineer's Unexpected Swiss Army Knife David Weston, Tiller Beauchamp Presentation Paper
Classification and Detection of Application Backdoors Chris Wysopal - -