Forensics

Title Speakers Conference Tags
Half Baked: Hardware Hacking Mixed With Sweet Software Reverse Engineering Marc Eisenbarth ShmooCon-2011 - Washington DC, USA Security Analysis Forensics
Boire: All Your Evidence Is Belong To Us: Antiforensics And You Morgan Marquis-boire hashdays-2010 - Lucerne, Switzerland Security Forensics
Windows 7 Forensics Anonymous Speaker BugCon-2010 - Mexico Security Computer Forensics Forensics
Connecting The Prime Minister To Routers Hillar Aarelaid CyberSec -2010 - Brussels, Belgium Security Computer Forensics Routing Intrusion Detection Incident Response Forensics
0Box Analyzer: Afterdark Runtime Forensics For Automated Malware Analysis And Clustering Jeremy Chiu DEF CON-18 - Las Vegas, USA Security Analysis Malware Forensics
Sniper Forensics - One Shot, One Kill Christopher E Pogue DEF CON-18 - Las Vegas, USA Security Forensics
Security-Assessment.Com - Oh F#!K : What To Do When You Get Pwned Paul Craig OWASP New Zealand-2010 - New Zealand Security Incident Response Computer Forensics Analysis Forensics
Striking Back Web Attackers Striking Attackers SyScan-2010 - HangZhou, China Security Infrastructure Web Legal Forensics
Virtual Forensics Christiaan Beek Blackhat USA-2010 - Las Vegas, USA Security Forensics
Finger Pointing For Fun, Profit And War? Tom Parker Blackhat USA-2010 - Las Vegas, USA Security Analysis Business Forensics
Voyage Of The Reverser: A Visual Study Of Binary Species Greg Conti , Sergey Bratus Blackhat USA-2010 - Las Vegas, USA Security Others Forensics
Bitflip: Determine A Data'S Signature Coverage From Within The Application Henrich Christopher Poehls OWASP Appsec-2010 - Stocholm, Sweden Security Computer Forensics Application Security Forensics
Forensic Fail Chris Neckar , Greg Ose THOTCON-1 - Chicago, USA Forensics
Virtual Forensics Christiaan Beek Blackhat Europe-2010 - Barcelona, Spain Security Forensics
Hiding In The Familiar: Steganography And Vulnerabilities In Popular Archives Formats Mario Vuksan , Tomislav Karney Blackhat Europe-2010 - Barcelona, Spain Security Forensics
The Art Of Network Forensics Lee Chin Sheng HITBSecConf Malaysia-2009 - Kuala Lampur, Malaysia Security Forensics
Lockpicking Forensics Datagram & Vidiot DEF CON-17 - Las Vegas, USA Security Forensics
Lockpicking Forensics Datagram & Vidiot Blackhat USA-2009 - Las Vegas, USA Security Forensics
Ten Cool Things You Didn'T Know About Your Hard Drive! Scott Moulton ShmooCon-2009 - Washington DC, USA Security Forensics
Advanced Network Forensics Lab Lee [geek00l] HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Forensics
How To Build Your Own Password Cracker With A Disassembler And A Little Vm Magic Matthew Geiger HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Legal Forensics
Developments In Cisco Ios Forensics Felix ( FX ) Lindner DEF CON-16 - Las Vegas, USA Security Forensics
Forensics Is Only For Private Investigators Scott Moulton DEF CON-16 - Las Vegas, USA Security Forensics
Developments In Cisco Ios Forensics Felix ( FX ) Lindner Blackhat USA-2008 - Las Vegas, USA Security Forensics
Oracle Forensics David Litchfield Blackhat USA-2008 - Las Vegas, USA Security Forensics
Crimeware Forensics Analysis Using Toolmarks Birdman SyScan-2008 - Taipei, Taiwan Security Analysis Forensics
Developments In Cisco Ios Forensics Felix ( FX ) Lindner Blackhat Europe-2008 - Amsterdam, The Netherlands Security Forensics
Flash Drives & Solid State Drives Data Recovery Comparison To Hard Drives: Animated! Scott Moulton ShmooCon-2008 - Washington DC, USA Security Forensics
21St Century Shellcode For Solaris Tim Vidas ShmooCon-2008 - Washington DC, USA Security Forensics
Smarter Password Cracking Matt Glodek ShmooCon-2008 - Washington DC, USA Security Wireless Forensics
Breaking Forensics Software: Weaknesses In Critical Evidence Collection Alex Stamos , Chris Palmer DEF CON-15 - Las Vegas, USA Security Forensics
Windows Vista Log Forensics Rich Murphey DEF CON-15 - Las Vegas, USA Security Forensics
Breaking Forensics Software: Weaknesses In Critical Evidence Collection Chris Ridder Blackhat USA-2007 - Las Vegas, USA Security Forensics
Database Forensics David Litchfield Blackhat USA-2007 - Las Vegas, USA Security Forensics
Sql Server Database Forensics Kevvie Fowler Blackhat USA-2007 - Las Vegas, USA Security Forensics SQL
Panel:Hacker Court2007: The Case Of A Thousand Truths Carole Arduini Blackhat USA-2007 - Las Vegas, USA Security Forensics
Panel:Meet The Fed Special Christy Blackhat USA-2007 - Las Vegas, USA Security Forensics
Blackout: What Really Happened... Kris Kendall Blackhat USA-2007 - Las Vegas, USA Security Forensics
Filesystem Forensics : Your Hard Drive Has Been Siezed As Evidence. Quietriot CarolinaCon-3 - Raleigh, USA Security Forensics
The Pain Of Network Intrusion Detection/Prevention Richard Bejtlich ShmooCon-2007 - Washington DC, USA Security Firewall Forensics
Tracksploits Lance James , Josh ( savant ) Brashars HOPE Number 6-2006 - USA Security Malware Forensics
Death Of A Thousand Cuts- Finding Evidence Everywhere! Johnny Long Blackhat Europe-2006 - Amsterdam, The Netherlands Security Forensics
The Church Of Wi-Fi Presents: An Evil Bastard, A Rainbow And A Great Dane! (Break It!) Renderman , Thorn & H1kari , Dutch , Joshua Wright ShmooCon-2006 - Washington DC, USA Security Wireless Community Analysis Forensics
Death Of A Thousand Cuts – Forensics Johnny Long DEF CON-13 - Las Vegas, USA Security Forensics
Physical Memory Forensics Mariusz Burdach Blackhat USA-2005 - Las Vegas, USA Security Forensics
Network Flows And Security Nicolas Fischbach Blackhat Europe-2005 - Amsterdam, The Netherlands Security Forensics
Evidence-Based Security Assessment Bof Crispin Cowan , Adam Shostack , Al Potter , Ed Reed ShmooCon-2005 - Washington DC, USA Forensics
Honeypot Forensics Krisztian Piller Chaos Communication Congress-21 - Berlin, Germany Security Forensics
Forensics And Response Niels Provos 13th USENIX Security Symposium-2004 - San Diego, USA Security Forensics
The Value Of Computer Forensics Wong Chun Meng HITBSecConf Malaysia-2003 - Kuala Lampur, Malaysia Security Forensics
Digital Information, User Tokens, Privacy And Forensics Investigations: The Case Of Windows Xp Platform Larry Leibrock Blackhat Europe-2003 - Amsterdam, The Netherlands Security Privacy Forensics
Next Generation Data Forensics &Amp; Linux Thomas Farmerdude DEF CON-10 - Las Vegas, USA Security Forensics
Layer 2, Routing Protocols, Router Security &Amp; Forensics Nicholas Lacoste-seris DEF CON-10 - Las Vegas, USA Security Routing Forensics
The Usafa Cadet Hacking Case:&Nbsp;What Both Sides Should Learn About Computer Forensics Gregory B. White Blackhat Asia-2002 - Tokyo, Japan Security Forensics
Data Remanence In Semiconductor Devices Peter Gutmann 10th USENIX Security Symposium-2001 - Washington DC, USA Security Hardware General Forensics
Computer Forensics: A Critical Process In Your Incident Response Plan Gregory S. Miles Blackhat USA-2001 - Las Vegas, USA Security Forensics
The Usafa Cadet Hacking Case:&Nbsp;What Both Sides Should Learn About Computer Forensics Gregory B. White DEF CON-08 - Las Vegas, USA Security Forensics