2nd USENIX Workshop on Offensive Technologies 2008 July 28, 2008 to Aug. 1, 2008, San Jose, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Engineering Heap Overflow Exploits With Javascript Charlie Miller , Mark Daniel , Jacob Honoroff None Security
Experiences With Model Inference Assisted Fuzzing Joachim Viide , Aki Helin , Marko Laakso , Pekka Pietik‰inen , Mika Sepponen , Kimmo Halunen , Rauli Puuper‰ , Juha Rˆning None Security Fuzzing
Insecure Context Switching: Inoculating Regular Expressions For Survivability Will Ormandy None Security
There Is No Free Phish: An Analysis Of Free And Live Phishing Kits Christopher Kruegel , Giovanni Vigna , Marco Cova None Security Analysis Phishing
Towards Systematic Evaluation Of The Evadability Of Bot/Botnet Detection Methods John C. Mitchell , Elizabeth Stinson None Security
Reverse Engineering Python Applications Aaron Portnoy , Ali-rizvi Santiago None Security
Exploitable Redirects On The Web: Identification, Prevalence, And Defense Craig A. Shue , Andrew J. Kalafut , Minaxi Gupta None Security
Modeling The Trust Boundaries Created By Securable Objects Matt Miller None Security