Hackito Ergo Sum 2011 April 7, 2011 to April 9, 2011, Paris, France
Tell us about missing data
Title Speakers Summary Topic Types
Kernel Fun Tba Jon Oberheide , Dan Rosenberg None Security
Ruby On Rails From A Code Auditorís Perspective Joernchen ( joernchen ) Ruby on Rails (RoR) is an open source web application framework based on the Ruby ... Security
Recent Advanced In Ipv6 Insecurities Marc Heuse Five years have past since my initial talk on IPv6 insecurities 2005 and 2006. New ... Security
Concentrated Fire: Black Box Auditing Adobe Shockwave Aaron Portnoy , Logan Brown Attempting to familiarize oneself with anotherís codebase is a daunting task, even with well-documented source ... Security
A Castle Made Of Sand: Adobe Reader X Sandbox Richard Johnson Adobe Reader is one of the most widely installed software applications on the planet. The ... Security
Exploiting The Hard-Working Dwarf James Oakley , Sergey Bratus All binaries compiled by recent versions of GCC from C++ programs include complex data and ... Security
Let Me Stuxnet You Itzik Kotler Einstein said ìI know not with what weapons World War III will be fought, but ... Security
Kernel Pool Exploitation On Windows 7 Tarjei Mandt In Windows 7, Microsoft introduced safe unlinking to the kernel pool to address the growing ... Security
Hackito Ergo Sum Crackme Eloi Vanderbèken HES crackme uses several techniques to slow down analysis and to bypass automatic analysis tools. ... Security
Behind The Scenes: Security Research Rodrigo Rubira Branco It is well known that Security Research became a trend worldwide. Terms like cyberwar and ... Security
Man-In-Remote: Pkcs11 For Fun And Non-Profit Gabriel Gonzalez During the talk the deployment of the Spanish National Electronic ID will be analyzed showing ... Security
Autorun Attacks Against Linux Jon Larimer Linux is not immune to the type of removable storage Autorun attacks that have plagued ... Security
Hacking Investigations In Practice Eric Freyssinet Investigating hacking activities is both a legal and a technical challenge. This talk aims at ... Security
Money Is In The Eye Of The Beholder: New And Exciting Ways To Steal Your Cash Yuval Vadim Polevoy ìThe presentation will give the audience a brief overview of the evolution of computer viruses, ... Security
Craking Industry Ciphers At A Whim Mate Soos Industryís standard ciphers tend to be weaker than ìopenî ciphers such as AES. This presentation ... Security
Tba Raoul "Nobody" Chiesa Since 2003 he started its cooperation with the UN agency ìîUNICRIî" (United Nations Interregional Crime ... Security