Philip R. Zimmermann: The Unveiling of My Next Big Project ZPhone
Philip R. Zimmermann: The Unveiling of My Next Big Project ZPhone
Philip R. Zimmermann is the creator of Pretty Good Privacy. For that, he was the target of a three-year criminal investi... Read more
4 Jun 2006
•
50mins
Adam L. Young: Building Robust Backdoors In Secret Symmetric Ciphers
Adam L. Young: Building Robust Backdoors In Secret Symmetric Ciphers
This talk will present recent advances in the design of robust cryptographic backdoors in secret symmetric ciphers (i.e.... Read more
4 Jun 2006
•
48mins
Alex Wheeler and Neel Mehta: Owning Anti-Virus: Weaknesses in a Critical Security Component
Alex Wheeler and Neel Mehta: Owning Anti-Virus: Weaknesses in a Critical Security Component
AV software is becoming extremely popular because of the its percieved protection. Even the average person is aware they... Read more
4 Jun 2006
•
1hr 5mins
Paul Vixie: Preventing Child Neglect in DNSSEC-bis using Lookaside Validation
Paul Vixie: Preventing Child Neglect in DNSSEC-bis using Lookaside Validation
Paul Vixie has been contributing to Internet protocols and UNIX systems as a protocol designer and software architect si... Read more
4 Jun 2006
•
1hr 15mins
Andrew van der Stock: World Exclusive - Announcing the OWASP Guide To Securing Web Applications and Services 2.0
Andrew van der Stock: World Exclusive - Announcing the OWASP Guide To Securing Web Applications and Services 2.0
After three years of community development, the Open Web Application Security Project (OWASP) is proud to introduce the ... Read more
4 Jun 2006
•
53mins
Eugene Tsyrklevich: Ozone HIPS: Unbreakable Windows
Eugene Tsyrklevich: Ozone HIPS: Unbreakable Windows
Windows is the number one target on the Internet today. It takes less than 5 minutes for an unpatched Windows machine, c... Read more
4 Jun 2006
•
1hr 16mins
Michael Sutton and Adam Greene: The Art of File Format Fuzzing
Michael Sutton and Adam Greene: The Art of File Format Fuzzing
In September 2004, much hype was made of a buffer overflow vulnerability that existed in the Microsoft engine responsibl... Read more
4 Jun 2006
•
43mins
spoonm and skape: Beyond EIP
spoonm and skape: Beyond EIP
When we built Metasploit, our focus was on the exploit development process. We tried to design a system that helped crea... Read more
4 Jun 2006
•
30mins
Alex Stamos and Scott Stender: Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps
Alex Stamos and Scott Stender: Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps
Web Services represent a new and unexplored set of security-sensitive technologies that have been widely deployed by lar... Read more
4 Jun 2006
•
1hr 12mins
Sherri Sparks and Jamie Butler: "Shadow Walker" - Raising The Bar For Rootkit Detection
Sherri Sparks and Jamie Butler: "Shadow Walker" - Raising The Bar For Rootkit Detection
Last year at Black Hat, we introduced the rootkit FU. FU took an unprecented approach to hiding not previously seen befo... Read more
4 Jun 2006
•
1hr 14mins