| Building a modern LDAP based security framework |
Andrea Barisani |
Presentation |
- |
| WiFi traffic injection based attacks |
Cédric "Sid" Blancher |
Presentation |
- |
| Using Neural Networks for remote OS identification |
Javier Burroni |
Presentation |
- |
| Watching hackers hack - attack visualization |
Maximillian Dornseif |
- |
|
| Commercial Software and How Can We Fix It |
Adam Jacobs |
Presentation |
- |
| Writing Better Intrusion Prevention Signatures |
Chris Jordan |
Presentation |
- |
| Advances in trojan threats |
Hiroshi Shinotsuka |
Presentation |
- |
| Unix Kernel Auditing |
Ilja van Sprundel |
Presentation |
- |
| Fault Redundant IPV6 Wireless Firewalls |
Mark Uemura |
Presentation |
- |
| Exploiting Real-Time OS Based Embedded Systems Using the JTAG Emulator |
Yuji Ukai |
Presentation |
- |
| VoIP - SIP robustness and RTP security |
Christian Wieser |
Presentation |
- |
| Attacking the IPv6 protocol suite |
van Hauser |
Presentation |
- |