| WiFi in Windows Vista: A Peek Inside the Kimono |
Noel Anderson, Taroon Mandhana |
- |
- |
| Bypassing Network Access Control (NAC) Systems |
Ofir Arkin |
Presentation |
- |
| Investigating Evil Websites with Monkeyspaw |
Tod Beardsley |
Presentation |
- |
| Finding Gold in the Browser Cache |
Corey Benninger |
Presentation |
- |
| IPS Shortcomings |
Renaud Bidou |
Presentation |
- |
| Automated Malware Classification-Analysis Though Network Theory and Statistics |
Daniel Bilar |
Presentation |
- |
| Taming Bugs - The Art and Science of Writing Secure Code |
Paul Bohm |
Presentation |
- |
| Physical Memory Forensics |
|
Presentation |
- |
| Fuzzing Selected Win32 Interprocess Communication Mechanisms |
Jesse Burns |
Presentation |
- |
| R^2 - The Exponential Growth of Rootkit Techniques |
Jamie Butler, Nick Petroni, William Arbaugh |
Presentation |
- |
| Device Drivers |
johnny cache & David Maynor |
Presentation |
- |
| Thermoptic Camoflauge - Total IDS Evasion |
Brian Caswell, HD Moore |
Presentation |
- |
| Microsoft Security Fundamentals - Engineering, Response and Outreach |
Andrew Cushman |
Presentation |
- |
| I’m going to shoot the next person who says VLANs |
Himanshu Dwivedi |
Presentation |
- |
| Attacking Apple’s Xsan |
Charles Edge |
Presentation |
- |
| Hardware Virtualization Based Rootkits |
Dino Dai Zovi |
Presentation |
- |
| Sidewinder - An Evolutionary Guidance System for Malicious Input Crafting |
Shawn Embleton, Sherri Sparks, Ryan Cunningham |
Presentation |
- |
| Hacking VoIP Exposed |
David Endler, Mark Collier |
Presentation |
- |
| Breaking Crypto Without Keys - Analyzing Data in Web Applications |
Chris Eng |
Presentation |
- |
| Analysing Complex Systems - the BlackBerry Case |
FX |
Presentation |
- |
| MatriXay - When WebApp&Database Security Pen-Test/Audit Is a Joy |
Yuan Fan, Xiao Rong |
Presentation |
- |
| How to Unwrap Oracle PL/SQL.pdf |
Pete Finnigan |
Presentation |
- |
| Carrier VoIP Security |
Nicolas Fischbach |
Presentation |
- |
| RE 2006: New Challenges Need Changing Tools |
Halvar Flake |
- |
- |
| Case Study: The Secure Development Lifecycle and Internet Explorer 7 |
Rob Franco |
- |
- |
| The Speed of (In)security |
Stefan Frei, Dr. Martin May |
Presentation |
- |
| Finding and Preventing Cross-site request Forgery |
Tom Gallagher |
Presentation |
- |
| The NetIO Stack - Reinventing TCP-IP in Windows Vista |
Abolade Gbadegesin |
Presentation |
- |
| Hacking Intranet Websites from the Outside |
Jeremiah Grossman, TC Niedzialkowski |
Presentation |
- |
| New Attack RFID-systems and Their Middleware and Backends |
Lukas Grunwald |
Presentation |
- |
| Open to Attack - Vulnerabilities of the Linux Random Number Generator |
Zvi Gutterman |
Presentation |
- |
| AJAX (in)security |
Billy Hoffman |
Presentation |
- |
| Analysis of Web Application Worms and Viruses |
Billy Hoffman |
Presentation |
- |
| Hacking World of Warcraft®: An Exercise in Advanced Rootkit Design |
Greg Hoglund |
- |
- |
| Faster Pwning Assured - Hardware Hacks and Cracks with FPGAs |
David Hulton, Dan Moniz |
Presentation |
- |
| Black Ops 2006 |
Dan Kaminsky |
- |
- |
| Code Integration-Based Vulnerability Auditing |
William Kimball |
Presentation |
- |
| Oracle Rootkits 2.0 - The Next Generation |
Alexander Kornbrust |
Presentation |
- |
| You Are What You Type - Non-Classical Computer Forensics |
Dr. Neal Krawetz |
Presentation |
- |
| Security Engineering in Windows Vista |
John Lambert |
Presentation |
- |
| Death by 1000 Cuts |
Johnny Long |
- |
- |
| Hacking, Hollywood Style |
Johnny Long |
- |
- |
| The State of Incidence Response |
Kevin Mandia |
Presentation |
- |
| Windows Vista Heap Management Enhancements– Security, Reliability and Performance |
Adrian Marinescu |
Presentation |
- |
| The BlueBag - A Mobile, Covert Bluetooth Attack and Infection Device |
Claudio Merloni, Luca Carettoni |
Presentation |
- |
| Defending Against Social Engineering with Voice Analytics |
Doug Mohney |
Presentation |
- |
| Six Degrees of XSSploitation |
Dan Moniz, HD Moore |
- |
- |
| Metasploit Reloaded |
HD Moore |
Presentation |
- |
| Building Security into the Software LifeCycle, A Business Case |
Marco Morana |
Presentation |
- |
| Runtime Packers - The Hidden Problem |
Maik Morgenstern, Tom Brosch |
Presentation |
- |
| Defending Black Box Web Applications - Building an Open Source Web Security Gateway |
Shawn Moyer |
Presentation |
- |
| SQL Injections by Truncation |
Bala Neerumalla |
Presentation |
- |
| Vulnerabilities in Not-So Embedded Systems |
Brendan O'Connor |
Presentation |
- |
| Bluetooth Defense Kit |
Bruce Potter |
Presentation |
- |
| The Trusted Computing Revolution |
Bruce Potter |
Presentation |
- |
| Do Enterprise Management Applications Dream of Electric Sheep |
Tom Ptacek, Dave Goldsmith |
Presentation |
- |
| PDB - The Protocol DeBugger |
Jeremy Rauch |
Presentation |
- |
| RFID Malware Demystified |
Melanie Rieback |
Presentation |
- |
| Subverting Vista Kernel For Fun And Profit |
Joanna Rutkowska |
Presentation |
- |
| SIP Stack Fingerprinting and Stack Difference Attacks |
Hendrik Scholz |
Presentation |
- |
| A Tale of Two Proxies |
SensePost |
- |
- |
| Writing Metasploit Plugins - From Vulnerability to Exploit |
Saumil Shah |
- |
- |
| Phishing with Asterisk PBX |
Jay Schulman |
Presentation |
- |
| RAIDE - Rootkit Analysis Identification Elimination v1.0 |
Peter Silberman, Jamie Butler |
Presentation |
- |
| Hotpatching and the Rise of Third-Party Patches |
Alexander Sotirov |
Presentation |
- |
| Auditing Data Access Without Bringing Your Database To Its Knees |
Kimber Spradlin, Dale Brocklehurst |
Presentation |
- |
| $30, 30 minutes, 30 networks (Project Cowbird) |
Jonathan Squire |
Presentation |
- |
| Breaking AJAX Web Applications: Vulns 2.0 in Web 2.0 |
Alex Stamos, Zane Lackey |
- |
- |
| Attacking Internationalized Software |
Scott Stender |
Presentation |
- |
| Punk Ode - Hiding Shellcode In Plain Sight |
Michael Sutton, Greg MacManus |
Presentation |
- |
| Rootkits - Attacking Personal Firewalls |
Alexander Tereshkin |
Presentation |
- |
| The Statue of Liberty - Utilizing Active Honeypots for Hosting Potentially Malicious Events |
Philip Trainor |
Presentation |
- |
| Wi-Fi Advanced Stealth |
Franck Veysset, Laurent Butti |
Presentation |
- |
| VOIP Security Essentials |
Jeff Waldron |
Presentation |
- |
| Web Application Incident Response & Forensics - A Whole New Ball Game! |
Chuck Willis, Rohyt Belani |
Presentation |
- |
| NIDS - False Positive Reduction Through Anomaly Detection |
Emmanuelle Zambon, Damiano Bolzoni |
Presentation |
- |
| Host Based Anomaly Detection on System Call Arguments |
Stefano Zanero |
Presentation |
- |