Auditing

Title Speakers Conference Tags
Ruby On Rails From A Code Auditor'S Perspective Joernchen ( joernchen ) Berlinsides-2010 - Berlin, Germany Auditing
Hunting Bugs In Vector Spaces Fabs ( Fabs ) Berlinsides-2010 - Berlin, Germany Security Auditing
Breaking Virtualization By Any Means Jonathan ( Endrazine ) Brossard HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Security Fuzzing Risk Auditing
Hacking And Protecting Oracle Database Vault Esteban Martínez Fayó Blackhat USA-2010 - Las Vegas, USA Security Access Auditing
Promon Testsuite: Client-Based Penetration Testing Tool Tom Lysemose Hansen , Folker Den braber OWASP Appsec-2010 - Stocholm, Sweden Security Application Security Network Penetration Auditing Testing
Windows Nt Kernel Security Stephen Ridley SyScan-2009 - Singapore Security Exploitation Auditing
Moocherhunting: Real-Time Geo-Location Of Moochers, Hackers And Unauthorized Wifi Users Julian Ho HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Infrastructure Wireless Access Auditing Testing
Telephone Defenses Against The Dark Arts James Atkinson SOURCE Boston-2008 - Boston, USA Security Exploitation Auditing
Auditing Cached Credentials With Cachedump Eoin Miller , Adair Collins ShmooCon-2007 - Washington DC, USA Security Auditing
Visualising Source Code For Auditing Lisa Thalheim HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Wireless Auditing Development
Trust, But Verify: Auditing Proprietary Dre Systems Robert ( Rsnake ) Hansen DEF CON-14 - Las Vegas, USA Security Auditing
The Science Of Code Auditing Neel Mehta Blackhat Europe-2006 - Amsterdam, The Netherlands Security Auditing
Auditing Unix Kernel Code Ilja van Sprundel SyScan-2005 - Singapore Security Auditing Unix
Bacon: A Framework For Auditing And Pentesting Hernan Gips DEF CON-13 - Las Vegas, USA Security Auditing
Passive Host Auditing John Ives DEF CON-13 - Las Vegas, USA Security Auditing
Code Integration-Based Vulnerability Auditing William B Kimball Blackhat USA-2005 - Las Vegas, USA Security Auditing
Auditing Data Access Without Bringing Your Database To Its Knees&Nbsp; Kimber Spradin , Dale Brocklehurst Blackhat USA-2005 - Las Vegas, USA Security Access Auditing
Advance Sql Injection Detection By Join Force Of Database Auditing And Anomaly Intrusion Detection Yuan Fan Blackhat USA-2005 - Las Vegas, USA Security Auditing SQL
Owning Anti-Virus: Weaknesses In A Critical Security Component Neel Mehta Blackhat Europe-2005 - Amsterdam, The Netherlands Security Auditing
Exploits Mitigation Techniques Theo de Raadt SyScan-2004 - Singapore Security Auditing
Exploit Mitigation Techniques HITBSecConf Malaysia-2004 - Kuala Lampur, Malaysia Security Auditing
Detecting Malicious Java Code Using Virtual Machine Auditing Giovanni Vigna , Sunil Soman , Chandra Krintz 12th USENIX Security Symposium-2003 - Washington DC, USA Security Auditing
Opensource Kernel Auditing And Exploitation Silvio Cesare DEF CON-11 - Las Vegas, USA Security Exploitation Auditing
Auditing The Security Of Applications David Litchfield Blackhat Europe-2000 - Amsterdam, The Netherlands Security Auditing
Security Auditing With Nessus Jordan Hrycaj Chaos Communication Congress-16 - Berlin, Germany Security Auditing
Nt Network Security Specialist, Nt Objectives. Jd Glaser Blackhat USA-1999 - Las Vegas, USA Security Auditing
Security Auditing + Panel Of Oscar Meyer, Mel, Bin High? Peter Shipley DEF CON-03 - Las Vegas, USA Security Panel Auditing
Wan-Hacking With Autohack: Auditing Security Behind The Firewall Alec Muffet 5th USENIX UNIX Security Symposium-1995 - Salt Lake City, USA Security Firewall Auditing