| Snort 3.0 |
Marty Roesch |
Presentation |
- |
| Cross-Site Scripting Vulnerabilities in Flash Authoring Tools |
Rich Cannings |
Presentation |
- |
| Proprietary RFID Systems |
Jan "starbug" Krissler, Karsten Nohl |
Presentation |
- |
| Media Frenzy: Finding Bugs in Windows Media Software |
Mark Dowd, John McDonald |
Presentation |
- |
| Targeted Attacks and Microsoft Office Malware |
Rob Hensing |
Presentation |
- |
| Virtually Secure |
Oded Horovitz |
Presentation |
- |
| Malicious Cryptography |
Frederic Raynal |
Presentation |
- |
| The Death of AV Defense in Depth? Revisiting Anti-Virus Software |
Thierry Zoller, Sergio Alvarez |
Presentation |
- |
| VMWare Issues |
Sun Bing |
Presentation |
- |
| Intrusion Detection Systems Correlation: a Weapon of Mass Investigation |
Sebastien Tricaud, Pierre Chifflier |
Presentation |
- |
| Web Wreck-utation |
Dan Hubbard and Stephan Chenette |
Presentation |
- |
| Secure programming with gcc and glibc |
Marcel Holtmann |
Presentation |
- |
| Mobitex network security |
olleB |
Presentation |
- |
| Peach Fuzzing |
Michael Eddington |
Presentation |
- |
| Fuzz by Number |
Charlie Miller |
Presentation |
- |
| Fuzzing WTF? What Fuzzing Was, Is And Never Will Be. |
Frank Marcus, Mikko Varpiola |
Presentation |
- |
| Vulnerabilities Die Hard |
Kowsik Guruswamy |
Presentation |
- |
| Hacking Windows Vista |
Dan Grifin |
Presentation |
- |
| ExeFilter: a new open-source framework for active content filtering |
Philippe Lagadec |
Presentation |
- |
| VetNetSec: Security testing for Extremists |
Eric Hacker |
Presentation |
- |
| w3af: A framework to own the web |
Andres Riancho |
Presentation |
- |
| A Unique Behavioral Science Approach to Threats, Extortion and Internal Computer Investigations |
Scott K. Larson |
- |
- |