| Advanced SQL Injection in Oracle Databases |
Esteban Martinez Fayo |
Presentation |
- |
| Phishing with Super Bait |
Jeremiah Grossman |
Presentation |
- |
| Circumvent Oracle’s Database Encryption and Reverse Engineering of Oracle Key Management Algorithms |
Alexander Kornbrust |
Presentation |
- |
| CaPerl: Running Hostile Code Safely |
Ben Laurie |
- |
- |
| NX: How Well Does It Say NO to Attacker’s eXecution Attempts? |
David Maynor |
Presentation |
- |
| The Art of SIP fuzzing and Vulnerabilities Found in VoIP |
Ejovi Nuwere, Mikko Varpiola |
Presentation |
- |
| "Shadow Walker": Raising The Bar For Rootkit Detection |
Sherri Sparks, Jamie Butler |
Presentation |
- |
| Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps |
Alex Stamos, Scott Stender |
Presentation |
- |
| The Art of File Format Fuzzing |
Michael Sutton, Adam Greene |
Presentation |
- |
| Owning Anti-Virus: Weaknesses in a Critical Security Component |
Alex Wheeler, Neel Mehta |
Presentation |
- |
| World Exclusive - Announcing the OWASP Guide To Securing Web Applications and Services 2.0 |
Andrew van der Stock |
Presentation |
- |
| The Defense Cyber Crime Center |
Jim Christy |
- |
- |
| Beyond Ethereal: Crafting A Tivo for Security Datastreams |
Greg Conti |
Presentation |
- |
| Catch Me If You Can: Exploiting Encase, Microsoft, Computer Associates, and the rest of the bunch… |
James C. Foster, Vincent T. Liu |
Presentation |
- |
| The Art of Defiling: Defeating Forensic Analysis |
Grugq |
Presentation |
- |
| GEN III Honeynets: The birth of roo |
Allen Harper, Edward Balas |
Presentation |
- |
| Performing Effective Incident Response |
Kevin Mandia |
Presentation |
- |
| iSCSI Security (Insecure SCSI) |
Himanshu Dwivedi |
Presentation |
- |
| Black Ops 2005 |
Dan Kaminsky |
- |
- |
| All new Ø Day |
David Litchfield |
- |
- |
| Economics, Physics, Psychology and How They Relate to Technical Aspects of Counter Intelligence / Counter Espionage Within Information Security |
Mudge |
Presentation |
- |
| Automation - Deus ex Machina or Rube Goldberg Machine? |
Sensepost |
Presentation |
- |
| Plug and Root, the USB Key to the Kingdom |
Darrin Barrall, David Dewey |
Presentation |
- |
| Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices |
Joe Grand |
Presentation |
- |
| The Social Engineering Engagement Methodology |
Joseph Klein |
Presentation |
- |
| Long Range RFID and its Security Implications |
Kevin Mahaffey, Mark McGovern, Paul Simmonds, Jon Callas |
Presentation |
- |
| The Non-Cryptographic Ways of Losing Information |
Robert Morris |
- |
- |
| Legal Aspects of Computer Network Defense |
Robert W. Clark |
Presentation |
Paper |
| U.S National Security, Individual and Corporate Information Security, and Information Security Providers |
Bryan Cunningham, C. Forrest Morgan |
Presentation |
- |
| Hacking in a Foreign Language |
Kenneth Geers |
Presentation |
- |
| Top Ten Issues in Computer Security |
Jennifer Stisa Granick |
Presentation |
- |
| Routing in the Dark: Scalable Searches in Dark P2P Networks |
Ian Clarke, Oskar Sandberg |
Presentation |
- |
| Google Hacking for Penetration Testers |
Johnny Long |
Presentation |
- |
| Building Robust Backdoors In Secret Symmetric Ciphers |
Adam L. Young |
Presentation |
- |
| The Unveiling of My Next Big Project |
Philip R. Zimmermann |
- |
- |
| Akshay Aggarwal |
Rapid Threat Modeling |
Presentation |
- |
| Shakespearean Shellcode |
Darrin Barrall |
Presentation |
- |
| A Dirty BlackMail DoS Story |
Renaud Bidou |
Presentation |
- |
| BlackHat Standup: “Yea I’m a Hacker…” |
James C. Foster |
- |
- |
| Toolkits: All-in-One Approach to Security |
Kevin Cardwell |
Presentation |
- |
| Demystifying MS SQL Server & Oracle Database Server Security |
Cesar Cerrudo |
Presentation |
- |
| Shatter-proofing Windows |
Tyler Close |
Presentation |
Paper |
| Advance SQL Injection Detection by Join Force of Database Auditing and Anomaly Intrusion Detection |
Yuan Fan |
Presentation |
- |
| Using Causal Analysis to Establish Meaningful Connections between Anomalous Behaviors in a Networking Environment |
Ken Hines |
Presentation |
- |
| SPA: Single Packet Authorization |
MadHat Unspecific & Simple Nomad |
Presentation |
- |
| Owning the C-suite: Corporate Warfare as a Social Engineering Problem |
Shawn Moyer |
Presentation |
- |
| Injection Flaws: Stop Validating Your Input |
Mike Pomraning |
Presentation |
- |
| Trust Transience: Post Intrusion SSH Hijacking |
Adam Boileau |
Presentation |
- |
| Remote Windows Kernel Exploitation - Step In To the Ring 0 |
Barnaby Jack |
Presentation |
Paper |
| Cisco IOS Security Architecture |
Michael Lynn |
- |
- |
| eEye BootRoot |
Derek Soeder, Ryan Permeh |
Presentation |
- |
| Beyond EIP |
spoonm, skape |
Presentation |
- |
| A New Hybrid Approach For Infrastructure Discovery, Monitoring and Control |
Ofir Arkin |
Presentation |
- |
| Rogue Squadron: Evil Twins, 802.11intel, Radical RADIUS, and Wireless Weaponry for Windows |
Beetle and Bruce Potter |
Presentation |
- |
| Checking Array Bound Violation Using Segmentation Hardware |
Tzi-cker Chiueh |
Presentation |
- |
| Stopping Injection Attacks with Computational Theory |
Robert J. Hansen, Meredith L. Patterson |
Presentation |
Paper |
| Ozone HIPS: Unbreakable Windows |
Eugene Tsyrklevich |
Presentation |
- |
| Preventing Child Neglect in DNSSEC-bis using Lookaside Validation |
Paul Vixie |
- |
- |