| Smashing Heap by Free Simulation |
Sandip Chaudhari |
Presentation |
Paper |
| Methods of increasing source code security automatically |
Ben Chelf, Coverity |
Presentation |
- |
| IPTV: Triple Play Triple Threats |
YM Chen, McAfee |
Presentation |
- |
| Mobile IPV6 Security |
Arnaud Ebalard, Guillaume Valadon |
Presentation |
- |
| Threats against and protection of Microsoft's internal network |
Greg Galford |
- |
- |
| How to secure a networking stack: IPv6 and NetIO |
Abolade Gbadegesin |
Presentation |
- |
| On XSRF(Cross Site Request Forgery) and why you should care |
Martin Johns |
Presentation |
- |
| Linux Kernel == Security Nightmare |
Marcel Holtmann |
Presentation |
- |
| Hacking fingerprint recognition systems |
Jan Krissler |
Presentation |
- |
| OpenOffice/OpenDocument and MS OpenXML security |
Philippe Lagadec |
Presentation |
- |
| The Malware Landscape |
Adam Overton, Jeff Williams |
- |
- |
| Strong cryptographic payload obfuscation and encryption |
Ariel Waissbein |
Presentation |
- |
| Undermining Security in Vista WCF |
Marc Schoenefeld |
Presentation |
- |
| Evolving Windows Shellcode |
Masaki Suenaga |
Presentation |
- |
| IPV6 Mapping |
Yuji Ukai |
Presentation |
- |
| MSKK Security Fundamentals |
Yuji Okuten |
- |
- |