Blackhat Europe 2003 July 1, 2003 to July 1, 2003, Amsterdam, The Netherlands

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Vivisection Of An Exploit Development Process: What To Do When It'S Not Easy David Aitel Dave will take you from beginning to end in the development of the Microsoft Content ... Security Development
Lawful Interception Of Ip: The European Context Jaya Baloo Lawful Interception (LI) is currently in development internationally and the area of IP interception poses ... Security Privacy Legal Development
Bsd Heap Smashing Bbp Many recently reported vulnerabilites involve heap corruption. Their exploitability under the BSD family of operating ... Security Exploitation
Generic Technical Defences Shaun Clowes It seems like the flow of new serious vulnerabilities in common software never stops. Administrators ... Security Testing
Security Issues In P2P File Distribution Bram Cohen There are three major types of security concerns in any file distribution system - denial ... Security Cryptography
Pocket Pc Phone Security Job de Haas The use of PDA's has seen a huge increase in corporate businesses over the last ... Security Testing
$Tea£Ing With Bgp Stephen Dugan This talk will illustrate the vast amount of harm that could be done IF the ... Security Routing
Ddos Mitigation And Analysis At The Infrastructure Level Nicolas Fischbach Denial of Service attacks are shifting from end systems towards the core devices of large ... Security Infrastructure Analysis
Data Flow Analysis Thomas ( Halvar Flake ) Dullien None Security Analysis
Design And Software Vulnerabilities In Embedded Systems Felix ( FX ) Lindner The speech covers design issues and software vulnerabilities in embedded systems. The exploitation of design ... Security Access Exploitation
Honeynet Technologies: The Latest Technologies Job de Haas , Lance Spitzner Focusing on Sebek and the latest advances in Honeynet Technologies. Includes a general overview of ... Security
Digital Information, User Tokens, Privacy And Forensics Investigations: The Case Of Windows Xp Platform Larry Leibrock Incident Response and IT Security practitioners are aware that normal user interactions with digital devices ... Security Privacy Forensics
All New Oracle Ø-Day: Attacking & Defending Oracle David Litchfield All new Ø-day. David Litchfield is a world-renowned security expert specializing in Windows NT and ... Security
Security Analysis Of Microsoft Encrypted File System (Efs) Serg Vasilenkov , Andrey Malyshev This speech covers security aspects of using Microsoft Encrypted File System (EFS). A complete security ... Security Analysis
Designing Useful Privacy Applications Len Sassaman During the past decade, the field of privacy enhancing technology has overcome many obstacles: from ... Security Privacy
Hunting Flaws In Jdk Marc Schöenefeld Abstract Java DK 1.4.1 JRE from Sun has been found to contain a locally exploitable ... Security Development
Will People Ever Pay For Privacy? Adam Shostack Throughout the internet bubble, privacy regularly topped polls of American's concerns. Despite that, many high ... Security Privacy Cryptography
Honeypots: Tracking Hackers Lance Spitzner Honeypots are an exciting, yet relatively unexplored, security technology. A security resource that is designed ... Security
The Role Of Non Obvious Relationships In The Foot Printing Process Charl van der Walt , Christoff Breytenbach During perimeter testing it is becoming more and more finding the one vulnerable server on ... Security Testing
Masters Of The Unseen: The Art Of Information Warfare Richard Thieme The technical details of information security can be described, checklists generated, policies approved ... but ... Security
Man In The Middle Attacks Marco Valleri , Alberto Ornaghi Many powerfull tools have focused the attention on MITM attacks that are no longer considered ... Security