Development

Title Speakers Conference Tags
Project Ubertooth: Building A Better Bluetooth Adapter Michael Ossmann ShmooCon-2011 - Washington DC, USA Security Wireless Development
Developing Secure Applications With Owasp Martin Knobloch OWASP IBWAS-2010 - Portugal Development
Owasp O2 Platform Dinis Cruz OWASP IBWAS-2010 - Portugal Community Development
Developing Compliant Applications Martin Knobloch OWASP IBWAS-2010 - Portugal Compliance Development
Botnet Resistant Coding: Protecting Your Users From Script Kiddies From Owasp Jump To: Navigation, Search 468X60-Banner-2010.Gif Registration | Hotel | Walter E. Washington Convention Center The Pr Peter Greko , Fabian Rothschild OWASP Appsec-2010 - Washington DC, USA Security Development Botnets
Microsoft'S Security Development Lifecycle For Agile Development Anonymous Speaker OWASP Appsec-2010 - Washington DC, USA Security Development
Implementing A Secure Software Development Program Anonymous Speaker OWASP Appsec-2010 - Washington DC, USA Security Development
Everything Useful I Learned About Software Security, I Learned At Microsoft! Michael Howard LASCON-2010 - Austin, USA Security Others Deep Knowledge Development
Automating Web Testing Beyond Owasp Webscarab Using Python Brad Causey LASCON-2010 - Austin, USA Development Others
Some Things That Every Vulnerability Developer Should Know Halvar Flake t2-2010 - Helsinki, Finland Security Exploitation Development
Real World Code Signing Abuse Today Jarno Niemelä t2-2010 - Helsinki, Finland Security Development
Development On Linux And Freebsd Shellcodes José Carlos Nieto BugCon-2010 - Mexico Development Unix
Linux Distro On Videoram Rolando Cedillo Knight BugCon-2010 - Mexico Security Unix Development
Tlalok Framework. Desarrollando En Php5 De Forma Rápida Y Segura. Developed In Php5 Quickly And Safely. Basil Briseño BugCon-2010 - Mexico Security Infrastructure Development
Building An Effective Ssa Program In Measurable Iterations Pravir Chandra OWASP China-2010 - China Security Compliance Development
Developing Secure Applications With Owasp Martin Knobloch OWASP Appsec-2010 - Germany Security Development
Watobo - Web Application Toolbox Andreas Schmidt OWASP Appsec-2010 - Germany Security Web Application Security Development
Defensive Cloud Application Development Grant Bugher BlueHat-2010 - Redmond, USA Security Cloud Development
Building An Architecture Of Trust: The Network’S Role In Securing Cyberspace Don Proctor CyberSec -2010 - Brussels, Belgium Security Network Penetration Cyberwar Development
Global Cybersecurity Agenda (Gca) With A Focus On The Deployment Of Solutions Through Impact (Global Response Centre) Alexander Ntoko CyberSec -2010 - Brussels, Belgium Security Infrastructure Incident Response Cyberwar Development
Hardening Government Cyber Defence Erik Larsson CyberSec -2010 - Brussels, Belgium Security Web Cyberwar Development
Microsoft'S Security Development Lifecycle For Agile Development Nick Coblentz OWASP Dublin-2010 - Ireland Mobile Security Development
Physical Computing, Virtual Security: Adding The Arduino Microcontroller Development Environment To Your Security Toolbox Leigh ( Hypatiadotca ) Honeywell DEF CON-18 - Las Vegas, USA Security Development
Sniffing And Injecting The Sub-Ghz Band Travis Goodspeed SyScan-2010 - Singapore Security Development Automation
More Bugs In More Places: Secure Development On Moble Platforms David Kane-parry Blackhat USA-2010 - Las Vegas, USA Security Development
Hacking Java Clients Stephen de Vries Blackhat USA-2010 - Las Vegas, USA Security Analysis Development Testing
Everybody Be Cool This Is A Roppery! Tim Weinmann , Vincenzo Iozzo Blackhat USA-2010 - Las Vegas, USA Security Exploitation Development
Deconstructing Coldfusion Brandon Creighton , Chris Eng Blackhat USA-2010 - Las Vegas, USA Security Web Development
Hadoop Security Design? Just Add Kerberos? Really? Andrew Becherer Blackhat USA-2010 - Las Vegas, USA Security Media Development
Towards Building Secure Web Mashups Lieven Desmet , Philippe De ryck , M Decat , Frank Piessens , Wouter Joosen OWASP Appsec-2010 - Stocholm, Sweden Security Web Development
Security Toolbox For .Net Development And Testing Dag König , Johan Lindfors OWASP Appsec-2010 - Stocholm, Sweden Security Development Testing
A Taint Mode For Python Via A Library Juan José Conti , Alejandro Russo OWASP Appsec-2010 - Stocholm, Sweden Development Security
Microsoft'S Security Development Lifecycle For Agile Development Nick Coblentz OWASP Appsec-2010 - Stocholm, Sweden Security Application Security Development
Secure Application Development For The Enterprise: Practical, Real-World Tips Michael Craigue OWASP Appsec-2010 - Stocholm, Sweden Development
Product Security Management In Agile Product Management Antti Vähä Sipilä OWASP Appsec-2010 - Stocholm, Sweden Mobile Security Security Development
Safe Wrappers And Sane Policies For Self Protecting Javascript David Sands , Phu H. Phung , Jonas Magazinius OWASP Appsec-2010 - Stocholm, Sweden Security Compliance Development
Building A Cyber Force Structure Stuart Starr CCDCOE-2010 - Estonia Cyberwar Development
Developments In The Eu In The Field Of Cno Chris Stace CCDCOE-2010 - Estonia Development
Building A Secure, Compliant Cloud For The Enterprise Matt Ferrari OWASP FROC-2010 - Denver, USA Security Cloud Development
Fundamental Practices And Tools To Implement A Security Development Lifecycle Cassio Goldschmidt OWASP FROC-2010 - Denver, USA Security Development
Surviving Your Phone: Protecting Mobile Communications With Tor Marco Bonetti Blackhat Europe-2010 - Barcelona, Spain Security Privacy Business Development Browser
State Of Malware: Family Ties Peter Carrera Blackhat Europe-2010 - Barcelona, Spain Security Rootkits Malware Development
Ghost In The Shell(Code) Matthew De carteret Ruxcon-2010 - Melbourne, Austrailia Security Development
Code Analysis Carpentry (Or, How To Avoid Braining Yourself When Handed A Smt Solving Hammer) Sean Heelan Ruxcon-2010 - Melbourne, Austrailia Security Development
Here Be Electric Dragons Lorenz Chaos Communication Congress-26 - Berlin, Germany Security Community Development
Java Ee Secure Code Review Sahba Kazerooni OWASP Appsec-2009 - Washington DC, USA Development Security
Leader And Manager Training - Leading The Development Of Secure Applications John Pavone OWASP Appsec-2009 - Washington DC, USA Security Development
Owasp Esapi Jeff Williams Video | Slides Jeff Williams OWASP Appsec-2009 - Washington DC, USA Security Development
Software Assurance Maturity Model (Samm) Pravir Chandra OWASP Appsec-2009 - Washington DC, USA Security Application Security Development
Software Development The Next Security Frontier Jim Molini OWASP Appsec-2009 - Washington DC, USA Compliance Development
Disa'S Application Security And Development Stig: How Owasp Can Help You Jason Li OWASP Appsec-2009 - Washington DC, USA Security Application Security Development
Cloudy With A Chance Of 0-Day Jon Rose , Tom Leavey OWASP Appsec-2009 - Washington DC, USA Security Cloud Development
The Essential Role Of Infosec In Secure Software Development Kenneth R. Van wyk OWASP Appsec-2009 - Washington DC, USA Security Development
Scalable Application Assessments In The Enterprise Tom Parker OWASP Appsec-2009 - Washington DC, USA Security Business Development
Malicious Developers And Enterprise Java Rootkits Jeff Williams OWASP Appsec-2009 - Washington DC, USA Security Rootkits Development
Secure Sdlc: The Good, The Bad, And The Ugly Joey Peloquin OWASP Appsec-2009 - Washington DC, USA Security Compliance Development
Deploying Secure Web Applications With Owasp Resources Sebastien Deleersnyder , Fabio E Cerullo OWASP Appsec-2009 - Washington DC, USA Security Community Development
Appsecdc Owasp O2 Platform Dinis Cruz OWASP Appsec-2009 - Washington DC, USA Security Web Development
Practical Experience With The Secure Software Lifecycle Bruce Sams OWASP Appsec-2009 - Germany Security Deep Knowledge Application Security Development
Safe Development And Common Vulnerabilities In Proprietary Sap Web Applications Sebastian Schinzel OWASP Appsec-2009 - Germany Security Others Development
Design Bugs Alexios Fakos OWASP Appsec-2009 - Germany Development Security
Configuring The Safety Testing Of Web Applications Tobias Glemser OWASP Appsec-2009 - Germany Security Web Application Security Development
Making Software Dumber Tavis Ormandy HITBSecConf Malaysia-2009 - Kuala Lampur, Malaysia Security Fuzzing Development Testing
Windows Secure Kernel Development Fermin Serna SOURCE Barcelona-2009 - Barcelona, Spain Security Unix Development
Pla Information Warfare Development Timeline And Nodal Analysis Tk234 DEF CON-17 - Las Vegas, USA Security Analysis Development
Cloudburst Dave Aitel SyScan-2009 - Taipei, Taiwan Security Development
Cloudburst Dave Aitel SyScan-2009 - Singapore Security Development
Microsoft Products' Vulnerabilities - Then, Now And The Future Kostya Kortchinsky SyScan-2009 - Hong Kong, China Security Analysis Development
Writing Shellcode On Windows Kostya Kortchinsky SyScan-2009 - Hong Kong, China Security Development
Microsoft Products' Vulnerabilities - Then, Now And The Future Microsoft Then , Now Future SyScan-2009 - Shanghai, China Security Analysis Development
What'S New In New Xprobe - Case Studiesxprobe Fyodor Yarochkin SyScan-2009 - Shanghai, China Security Development
Writing Shellcode On Windows Kostya Kortchinsky SyScan-2009 - Shanghai, China Security Development
Usa Immigration For Hackers 实做如果写出对移民有利的履历表 SyScan-2009 - Shanghai, China Security Development
Anti-Debugging - A Developers Perspective Txs CarolinaCon-5 - Raleigh, USA Security Access Analysis Malware Development
Anti-Debugging - A Developer'S Viewpoint Tyler ( Txs ) Shields SOURCE Boston-2009 - Boston, USA Security Access Analysis Malware Development
Blinded By Flash: Widespread Security Risks Flash Developers Dont See Prajakta Jagdale ShmooCon-2009 - Washington DC, USA Security Web Analysis Development
Building The 2008 And 2009 Shmooball Launchers Larry Lauer ShmooCon-2009 - Washington DC, USA Security Development
Security Vs Usability - False Paradigms Of Lazyness Dead Addict ShmooCon-2009 - Washington DC, USA Security Development
Life Is A Holodeck! Claus "HoloClaus" Cohnen Chaos Communication Congress-25 - Berlin, Germany Security Development
La Quadrature Du Net - Campaigning On Telecoms Package Jérémie Zimmermann Chaos Communication Congress-25 - Berlin, Germany Security Infrastructure Development
Pass-The-Hash Toolkit For Windows Hernan Ochoa HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Access Development
Hacking A Bird In The Sky 2.0 Jim Geovedi HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Wireless Development Testing
An Effective Methodology To Enable Security Evaluation At Rtl Level And Automate Vulnerability Detection In Future Hardware Mary Yeoh HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Analysis Development Testing
Malware Rce: Debuggers And Decryptor Development Michael Ligh , Greg Sinclair DEF CON-16 - Las Vegas, USA Security Malware Development
Hackernomics Hugh Thompson 17th USENIX Security Symposium-2008 - San Jose, USA Security Exploitation Development Automation
The Attendee Meta-Data Project Lexicon , Matt Joyce , Daravinne , Neo Amsterdam , Aestetix , Echo , Dementia , Christopher Petro The Last HOPE-2008 - USA Security Web Others Development
Death Star Threat Modeling Kevin Williams The Last HOPE-2008 - USA Security Risk Development
Kitchen Hack Lab: Interactive Food Disassembly Gweeds The Last HOPE-2008 - USA Security Development
Undoing Complexity - From Paper Clips To Ball Point Pens Marc Weber Tobias , Matt Fiddler The Last HOPE-2008 - USA Security Development
Banking On Education: A Case Study On Security Training Programs Rob Cheyne , Jeff Richard SOURCE Boston-2008 - Boston, USA Security Development
Detailed Thread Modeling Threat Modeling Is Quickly Becoming A Popular Technique Used To Assess The Security Posture Of An Application'S Architectural Components. But Is There A Way To Perform Such An Krishna Raja , Nish Bhalla SOURCE Boston-2008 - Boston, USA Security Risk Development
Detailed Thread Modeling Threat Modeling Krishna Raja , Nish Bhalla SOURCE Boston-2008 - Boston, USA Security Risk Development Botnets
A Security Metric For Software Developers Steve Lipner SOURCE Boston-2008 - Boston, USA Security Development
Got Citrix? Hack It! Shanit Gupta ShmooCon-2008 - Washington DC, USA Security Development
Hacking Windows Vista Dan Griffin ShmooCon-2008 - Washington DC, USA Security Development Testing
Current Events In Tor Development Roger Dingledine Chaos Communication Congress-24 - Berlin, Germany Security Development
Enterprise Hacking: Who Needs Exploit Codes? Fetri Miftach HITBSecConf Malaysia-2007 - Kuala Lampur, Malaysia Security Access Risk Analysis Business Development
The Human Factor In Online Fraud Markus Jakobsson 16th USENIX Security Symposium-2007 - Boston, USA Security Privacy Development
Premature Ajax-Ulation Billy Hoffman Blackhat USA-2007 - Las Vegas, USA Security Development
Pyemu: A Multi-Purpose Scriptable X86 Emulator Cody Pierce Blackhat USA-2007 - Las Vegas, USA Security Analysis Malware Development
Hacking Leopard: Tools And Techniques For Attacking The Newest Mac Os X Charlie Miller Blackhat USA-2007 - Las Vegas, USA Security Development
Unforgivable Vulnerabilities Steven M. Christey Blackhat USA-2007 - Las Vegas, USA Security Development
Keynote: Roger Cumming Blackhat Europe-2007 - Amsterdam, The Netherlands Security Community Development
Standard Bodies... What Are These Guys (Drinking)? Renderman , Al Potter , Russ Housley ShmooCon-2007 - Washington DC, USA Security Panel Development
Visualising Source Code For Auditing Lisa Thalheim HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Wireless Auditing Development
Subverting Vista Kernel For Fun And Profit Joanna Rutkowska HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Malware Development Testing
Hacking A Bird In The Sky: Hijacking Vsat Connections Jim Geovedi HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Wireless Access Development Testing
Security Vulnerabilities, Exploits, And Attack Patterns: 15 Years Of Art, Pseudo-Science, Fun, And Profit Iván Arce 15th USENIX Security Symposium-2006 - Vancouver, Canada Security Development
Major Security Blunders Of The Past 30 Years Matt Blaze , Peter G. Neumann , Virgil Gligor 15th USENIX Security Symposium-2006 - Vancouver, Canada Security Panel Development
Pseudonymous Software Development And Strong Distribution V. Alex Brennen HOPE Number 6-2006 - USA Security Development
The New Engineers Of Graffiti James Powderly , Evan Roth , Theodore Watson , Evan Harper HOPE Number 6-2006 - USA Security Panel Development
Implementing And Detecting An Acpi Bios Rootkit John Heasman Blackhat Europe-2006 - Amsterdam, The Netherlands Security Development
Beyond Eip Spoonmskape Blackhat Europe-2006 - Amsterdam, The Netherlands Security Development
Reverse Engineering For Fun And Bof It! - 2006 (Bof It!) Pedram Amini , Chris Eagle ShmooCon-2006 - Washington DC, USA Security Development
Windows Vista Heap (Build It!) Adrian Marinescu ShmooCon-2006 - Washington DC, USA Security Development
Anonym.Os: Security And Privacy, Everywhere You Go (Build It!) Taylor Banks , Gavin Mead , Kevin Miller , Beth Milliken ShmooCon-2006 - Washington DC, USA Security Anonymity Access Privacy Monitoring Risk Legal Development
Seaside: Agile Web Application Development With Squeak Marcus Denker Chaos Communication Congress-22 - Berlin, Germany Security Web Development
Free Software And Anarchism Sandro Gaycken Chaos Communication Congress-22 - Berlin, Germany Security Development
Fair Code Meike Richter Chaos Communication Congress-22 - Berlin, Germany Security Development
Cybercrime Convention Marco Gercke Chaos Communication Congress-22 - Berlin, Germany Security Development Testing
Attacking Internet Banking Applications Fabrice Marie SyScan-2005 - Singapore Security Privacy Business Development
Human-Computer Interaction Opportunities For Improving Security Ben Shneiderman 14th USENIX Security Symposium-2005 - Baltimore, USA Security Monitoring Analysis Development
What Are We Trying To Prove? On The Relevance Of Certified Code To Computer Security Peter Lee 14th USENIX Security Symposium-2005 - Baltimore, USA Security Development
Development Of An Undergraduate Security Program Daniel Burroughs DEF CON-13 - Las Vegas, USA Security Development
A Linguistic Platform For Threat Development Ben Kurtz DEF CON-13 - Las Vegas, USA Security Development
Case Study: The Secure Development Lifecycle And Internet Explorer 7 Rob Franco Blackhat USA-2005 - Las Vegas, USA Security Development
Writing Metasploit Plugins - From Vulnerability To Exploit Saumil Udayan Shah Blackhat USA-2005 - Las Vegas, USA Security Development
Beyond Eip Skap Blackhat USA-2005 - Las Vegas, USA Security Development
Rapid Threat Modeling Akshay Aggarwal Blackhat USA-2005 - Las Vegas, USA Security Development
How To Herd Cats Druid Chaos Communication Congress-21 - Berlin, Germany Security Analysis Development
Cored Programming Klaus Schleisiek Chaos Communication Congress-21 - Berlin, Germany Security Development
The Kernel Accelerator Device Ludwig Jaffé Chaos Communication Congress-21 - Berlin, Germany Security Development
The Kismet Story Dragorn The Fifth HOPE -2004 - USA Security Wireless Development
Packet Purgatory - Twist Your Packets Before You Set Them Free Todd Macdermid The Fifth HOPE -2004 - USA Security Development
Introduction To Embedded Security Joe ( Kingpin ) Grand Blackhat USA-2004 - Las Vegas, USA Security Development
Metasploit: Hacking Like In The Movies Hd Moore Blackhat USA-2004 - Las Vegas, USA Security Development
Security Within A Development Lifecycle Eli O Blackhat Europe-2004 - Amsterdam, The Netherlands Security Development
Introduction To Embedded Security Grand Idea Studio Blackhat Europe-2004 - Amsterdam, The Netherlands Security Development
Packet Mastering Jose Nazario HITBSecConf Malaysia-2004 - Kuala Lampur, Malaysia Security Development
Advanced Exploit Development Hd Moore HITBSecConf Malaysia-2003 - Kuala Lampur, Malaysia Security Development
Vivisection Of An Exploit Development Process: What To Do When It'S Not Easy David Aitel Blackhat Europe-2003 - Amsterdam, The Netherlands Security Development
Lawful Interception Of Ip: The European Context Jaya Baloo Blackhat Europe-2003 - Amsterdam, The Netherlands Security Privacy Legal Development
Hunting Flaws In Jdk Marc Schöenefeld Blackhat Europe-2003 - Amsterdam, The Netherlands Security Development
Lawful Interception Of Ip Traffic: The European Context Jaya Baloo Chaos Communication Congress-19 - Berlin, Germany Security Legal Development
F-Cpu Development Status Report Cedric Bail , Nicolas Boulay Chaos Communication Congress-18 - Berlin, Germany Security Development
Third Generation Exploits On Nt/Win2K Platforms Thomas ( Halvar Flake ) Dullien Blackhat Europe-2001 - Amsterdam, The Netherlands Security Exploitation Development Testing
Unix Assembly Codes Development For Vulnerabilities Illustration Purposes Laststage of Delirium Blackhat USA-2001 - Las Vegas, USA Security Unix Development
Ethics In Military And Civilian Software Development Winn Schwartau , Robert Steele , Sam Nitzberg H2K-2000 - USA Security Development
Telephone Systems Of The World Billsf H2K-2000 - USA Security Development
Free Hardware Design / The F-Cpu Project Introduces Itself Sven Klose Chaos Communication Congress-16 - Berlin, Germany Security Development
Object-Oriented Dynamic Programming - Dylan Andreas Bogk Chaos Communication Congress-16 - Berlin, Germany Security Development
Building A Security Response Process Scott Culp Blackhat USA-1999 - Las Vegas, USA Security Development
Denial Of Service Attacks, And Defensive Strategies. Sluggo Blackhat USA-1997 - Las Vegas, USA Security Mail Development