| Analyzing OS fingerprints using Neural Networks and Statistical Machinery |
Javier Burroni, Carlos Sarraute |
Presentation |
- |
| Attacking the IPv6 protocol suite |
van Hauser |
- |
- |
| XEBEK - A Next Generation Honeypot Monitoring System |
Nguyen Anh Quynh |
Presentation |
|
| Malicious Crypto |
Fred Raynal |
Presentation |
- |
| Windows Local Shellcode Injection |
Cesar Cerrudo |
Presentation |
Paper |
| Microsoft Security Fundamentals |
Andrew Cushman |
Presentation |
- |
| Exploiting Real-Time OS Based Embedded Systems Using the JTAG Emulator |
Barnaby Jack |
Presentation |
- |
| Advanced Web Hacking - Attacks & Defense |
Shreeraj Shah |
Presentation |
- |
| Practical Automated Web Application Attack Techniques |
Justin Clarke |
- |
- |
| ColdFusion Security |
Andy Davis |
Presentation |
- |
| ARMed Combat - The Fight For Personal Security |
Tim Hurman |
Presentation |
- |
| A Visual Approach to Security Event Management |
Raffael Marty |
Presentation |
- |
| Network Security Monitoring - Theory and Practice |
Michael Boman |
Presentation |
- |
| Protecting the Infrastructure |
Jim DeLeskie, Danny McPherson |
Presentation |
- |
| Lessons in Open Source Security - The Tale of a 0-Day Incident |
Andrea Barisani |
Presentation |
- |