| Attacking the IPv6 protocol suite |
van Hauser |
- |
- |
| Protecting the Infrastructure |
Jim DeLeskie, Danny McPherson |
- |
- |
| An hour of Rap and Comedy about SAP - Mo' Budget, Mo' Problems |
Steve Lord |
Presentation |
- |
| Magstripe Madness |
Major Malfunction |
Presentation |
- |
| Metasploitation |
HD Moore |
Presentation |
- |
| Carrier VoIP Security |
Nico Fischbach |
Presentation |
- |
| Attacking VoIP Networks |
Hendrik Scholz |
Presentation |
- |
| Security Issues related to Pentium System Management Mode |
Duflot |
Presentation |
- |
| Real Time Threat Mitigation Techniques |
Josh Ryder |
Presentation |
- |
| Stunt Profiling: Securing a System While You Wait |
Crispin Cowan |
- |
- |
| Visualizing source code for auditing |
Lisa Thalheim |
- |
- |
| Attacking Web Services |
Alex Stamos, Scott Stender |
Presentation |
- |
| Reverse Engineering Microsoft Binaries |
Alexander Sotirov |
Presentation |
- |
| Zen and the art of collecting and analyzing Malware |
Fred Arbogast, Sascha Rommelfangen |
Presentation |
- |
| How to test an IPS |
Renaud Bidou |
Presentation |
- |
| Insiders View: Network Security Devices |
Dennis Cox |
Presentation |
- |
| More on Uninitialized Variables |
Halvar Flake |
- |
- |
| Security Testing SCADA and Control Systems |
Eric Byres |
Presentation |
- |
| Windows HIPS evaluation with Slipfest |
Julien Tinnes, Yoann Guillot |
Presentation |
- |
| Next Generation Kernel Activity Monitoring |
Edward Balas, Mike Davis |
Presentation |
- |
| RF Technical Security Counter Measures |
Tim Johnson |
- |
- |
| Advancements in Anonymous eAnnoyance |
Christopher Abad |
|
|