TROOPERS 2010 March 8, 2010 to March 12, 2010, Heidelberg, Germany

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Security For Superheroes Pete Herzog The Official Training Guide for New Superheroes: Even superheroes need tactics. Showing how to get ...
Netscreen Of The Dead: Developing A Trojaned Screenos For Juniper Netscreen Appliances Greg Hoglund , Graeme Neilson Core network security appliances are often considered to be more secure than traditional systems because ...
Return Oriented Rootkits Huagang Xie , Ralf Hund Ever since the large-scale exploitation of software vulnerabilities became a massive nuisance in this decade, ...
History Of The Tls Authentication Gap Bug Marsh Ray , Steve Dispensa A serious security flaw was recently found in TLS, dating back to the mid-90's. How ...
Parameter Pollution In Connection Strings Attack Chema Alonso This session is about Parameter Pollution in Connection Strings Attack. Today, a lot of tools ...
Don'T Do This At Home: 0Wning Botnets Tillmann Werner Most botnets suck. They are based on crappy software maintained by clueless people - completely ...
Bugs & Kisses - Spying On Blackberry Users For Fun Sheran ( Chopstick ) Gunasekera Regarded by many as a platform that remains very secure and difficult to compromise, the ...
Federated Identity - Opportunities And Dangers Dominick Baier The world is moving towards a federated identity model. Public facing websites like Google or ...
True In Depth Security Through Next Gen Siem Ray Menard
Rapid Risk Assessment Enno Rey To streamline the process of well-informed decision taking in a highly dynamic, complex and emotionally ...
The Truth About Outsourcing Security Bryan Fite It happens everyday, more critical infrastructure is being handed over to large service providers in ...
Vulnerabilities In Custom Sap Abap Code Markus Schumacher When code is written things go wrong. Wrong code can lead to vulnerabilities. And custom ...
Clobbering The Cloud Marco Slaviero Cloud Computing dominates the headlines these days but like most paradigm changes this introduces new ...
The Good, The Bad And The Virtual Claudio Criscione Virtualization, from an assessor perspective, is often a pure black box. Most of the time ...
Letting Your Fuzzer Knows About Target'S Internals Rodrigo Rubira Branco If you just want to use fuzzers for QA purposes, this talk is not for ...
A Security Assessment Of Cisco Enterprise Wlan Components Oliver Roeschke The world of "Enterprise WLAN solutions" is full of obscure and "non-standard" elements and technologies. ...
How To Fail An Audit Martin Freiss An anecdotal tale of how and why (ISO27001) audits go wrong. The speaker is an ...
Some Notes On Sap Security Alexander mikhailovich Polyakov Enterprise application security is one of the most important topics in computer security as nowadays ...
How To Rate The Security Of Closed Source Software Michael Thumann Security evaluation of software is getting more and more common in large enterprises to ensure ...
Tools Of The Trade For A Modern (C)Iso Enno Rey Enno will discuss some of the challenges that ISOs face on a daily basis and ...
Can You Still Trust Your Network Card? Loic Duflot , Yves-alexis Perez The final presentation of the day was presented by a French security research organization. They ...