2011 Data Breach Investigations Report - Verizon, US Secret Service, Dutch High Tech Crime Unit |
Mark Goudie |
An Embarrassingly Simple Solution to the Problem of Protecting Browser Users |
Peter Gutmann |
APCO P25 Security Revisited - The Practical Attacks! |
Steve Glass and Matt Robert |
Automated Detection of Software Bugs and Vulnerabilities in Linux |
Silvio Cesare |
Digital Forensic Evidence: From Certainty to Shades of Grey |
Dr. Bradley Schatz |
Encyclopaedia Of Windows Privilege Escalation |
Brett Moore |
Forensic Timeline Splunking |
Nick Klein |
Fun And Profit With Hypervisors |
Nishad Herath |
GCC Plugins: Die by the Sword |
Matt Davis |
Harder, Better, Faster, Stronger... |
Louis Nyffenegger & Luke Jahnke |
Malware Mythbusters |
Alex Kirk |
Operation Carpo, The Hack of an Australian Registrar |
Alex Tilley |
Post Memory Corruption Memory Analysis |
Jonathon Brossard |
Unusual and Hilarious Vulnerabilities |
R00t Dude |
Hacking Hollywood |
Nick Freeman / vt |
All your RFz Belong to Me: Hacking the Wireless World with GNU Radio |
Balint Seeber |
Windows Kernel Vulnerability Research and Exploitation |
Gilad Bakas |
4 Years and 4 Thousand Websites Worth of Vulnerability Assessments: What Have We Learned? |
Jeremiah Grossman |
JBoss security: penetration, protection and patching |
David Jorm |
Dynamic Program Analysis and Software Exploitation: From the Crash to the Exploit Code |
Rodrigo Rubira Branco |
Big Bang Theory: The Evolution of Pentesting High Security Environments |
Joseph McCray |
Browser GFX Security |
Ben Hawkes |
SSL Traffic Analysis Attacks |
Vincent Berg |
Mobile and Contactless Payment Security (There’s an App for that!) |
Peter Fillmore |
The Security Of 3D Web Extensions |
James Forshaw |
Bypassing and Strengthening Linux Security Controls |
Andrew Griffiths |