BlackHat USA 2005
 
Advanced SQL Injection in Oracle Databases Esteban Martinez Fayo Presentation -
Phishing with Super Bait Jeremiah Grossman Presentation -
Circumvent Oracle’s Database Encryption and Reverse Engineering of Oracle Key Management Algorithms Alexander Kornbrust Presentation -
CaPerl: Running Hostile Code Safely Ben Laurie - -
NX: How Well Does It Say NO to Attacker’s eXecution Attempts? David Maynor Presentation -
The Art of SIP fuzzing and Vulnerabilities Found in VoIP Ejovi Nuwere, Mikko Varpiola Presentation -
"Shadow Walker": Raising The Bar For Rootkit Detection Sherri Sparks, Jamie Butler Presentation -
Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps Alex Stamos, Scott Stender Presentation -
The Art of File Format Fuzzing Michael Sutton, Adam Greene Presentation -
Owning Anti-Virus: Weaknesses in a Critical Security Component Alex Wheeler, Neel Mehta Presentation -
World Exclusive - Announcing the OWASP Guide To Securing Web Applications and Services 2.0 Andrew van der Stock Presentation -
The Defense Cyber Crime Center Jim Christy - -
Beyond Ethereal: Crafting A Tivo for Security Datastreams Greg Conti Presentation -
Catch Me If You Can: Exploiting Encase, Microsoft, Computer Associates, and the rest of the bunch… James C. Foster, Vincent T. Liu Presentation -
The Art of Defiling: Defeating Forensic Analysis Grugq Presentation -
GEN III Honeynets: The birth of roo Allen Harper, Edward Balas Presentation -
Performing Effective Incident Response Kevin Mandia Presentation -
iSCSI Security (Insecure SCSI) Himanshu Dwivedi Presentation -
Black Ops 2005 Dan Kaminsky - -
All new Ø Day David Litchfield - -
Economics, Physics, Psychology and How They Relate to Technical Aspects of Counter Intelligence / Counter Espionage Within Information Security Mudge Presentation -
Automation - Deus ex Machina or Rube Goldberg Machine? Sensepost Presentation -
Plug and Root, the USB Key to the Kingdom Darrin Barrall, David Dewey Presentation -
Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices Joe Grand Presentation -
The Social Engineering Engagement Methodology Joseph Klein Presentation -
Long Range RFID and its Security Implications Kevin Mahaffey, Mark McGovern, Paul Simmonds, Jon Callas Presentation -
The Non-Cryptographic Ways of Losing Information Robert Morris - -
Legal Aspects of Computer Network Defense Robert W. Clark Presentation Paper
U.S National Security, Individual and Corporate Information Security, and Information Security Providers Bryan Cunningham, C. Forrest Morgan Presentation -
Hacking in a Foreign Language Kenneth Geers Presentation -
Top Ten Issues in Computer Security Jennifer Stisa Granick Presentation -
Routing in the Dark: Scalable Searches in Dark P2P Networks Ian Clarke, Oskar Sandberg Presentation -
Google Hacking for Penetration Testers Johnny Long Presentation -
Building Robust Backdoors In Secret Symmetric Ciphers Adam L. Young Presentation -
The Unveiling of My Next Big Project Philip R. Zimmermann - -
Akshay Aggarwal Rapid Threat Modeling Presentation -
Shakespearean Shellcode Darrin Barrall Presentation -
A Dirty BlackMail DoS Story Renaud Bidou Presentation -
BlackHat Standup: “Yea I’m a Hacker…” James C. Foster - -
Toolkits: All-in-One Approach to Security Kevin Cardwell Presentation -
Demystifying MS SQL Server & Oracle Database Server Security Cesar Cerrudo Presentation -
Shatter-proofing Windows Tyler Close Presentation Paper
Advance SQL Injection Detection by Join Force of Database Auditing and Anomaly Intrusion Detection Yuan Fan Presentation -
Using Causal Analysis to Establish Meaningful Connections between Anomalous Behaviors in a Networking Environment Ken Hines Presentation -
SPA: Single Packet Authorization MadHat Unspecific & Simple Nomad Presentation -
Owning the C-suite: Corporate Warfare as a Social Engineering Problem Shawn Moyer Presentation -
Injection Flaws: Stop Validating Your Input Mike Pomraning Presentation -
Trust Transience: Post Intrusion SSH Hijacking Adam Boileau Presentation -
Remote Windows Kernel Exploitation - Step In To the Ring 0 Barnaby Jack Presentation Paper
Cisco IOS Security Architecture Michael Lynn - -
eEye BootRoot Derek Soeder, Ryan Permeh Presentation -
Beyond EIP spoonm, skape Presentation -
A New Hybrid Approach For Infrastructure Discovery, Monitoring and Control Ofir Arkin Presentation -
Rogue Squadron: Evil Twins, 802.11intel, Radical RADIUS, and Wireless Weaponry for Windows Beetle and Bruce Potter Presentation -
Checking Array Bound Violation Using Segmentation Hardware Tzi-cker Chiueh Presentation -
Stopping Injection Attacks with Computational Theory Robert J. Hansen, Meredith L. Patterson Presentation Paper
Ozone HIPS: Unbreakable Windows Eugene Tsyrklevich Presentation -
Preventing Child Neglect in DNSSEC-bis using Lookaside Validation Paul Vixie - -