BlackHatAsia 2004 Oct. 14, 2004 to Oct. 15, 2004, Tokyo, Japan

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Raisuke Miyawaki N/A
Thinking Techie's Social Responsibility - Lessons From Winny Case Shunichi Arai N/A
Attacking Obfuscated Code with IDA Pro Chris Eagle Virtually every virus and worm that circulates the Internet today is "protected" by some form ...
Capture the Flag Games: Measuring Skill with Hacking Contests Riley "Caezar" Eller With the cost of security experts increasing each year, it is expensive to audit critical ...
The Laws of Vulnerabilities Gerhard Eschelbeck New vulnerabilities to networks are discovered and published on a daily base. With each such ...
Understanding Hardware Security Joe ( Kingpin ) Grand Hardware security is often overlooked during a product's development, which can leave it vulnerable to ...
TBA David Litchfield David Litchfield leads the world in the discovery and publication of computer security vulnerabilities. This ...
You got that with GOOGLE? Johnny Long This presentation explores the explosive growth of a technique known as "Google Hacking". When the ...
Cybercrime Treaty and Legal Environment of Japanese Computer Crime and Laws Hisamichi Okamura N/A
The Keys to the Kingdom: Understanding Covert Channels of Communication Russ Rogers Security professionals see the compromise of networked systems on a day to day basis. It's ...
Optimized Attack for NTLM2 Session Response Daiji Sanai , Hidenobu Seki Windows 2000 SP3 or later and Windows XP now use a new network logon authentication ...
When the Tables Turn Charl van der Walt , Jaco Van Graan Until now network security defences have largely been about building walls and fences around the ...