Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference Podcast
1) Marco M. Morana: Building Security into the Software Life Cycle, a Business Case
The times of designing security software as a matter of functional design are over. Positive security functional requirements do not make secure software. Think risk driven design, think like an attac...Show More
Marco M. Morana: Building Security into the Software Life Cycle, a Business Case
24:33 | Jun 4th, 2006
2) Rob Franco: Case Study: The Secure Development Lifecycle and Internet Explorer 7
Voice analytics-once the stuff of science fiction and Echelon speculation-is now commercially available and is being used by call centers processing hundreds of thousands of calls per day to authentic...Show More
Rob Franco: Case Study: The Secure Development Lifecycle and Internet Explorer 7
45:18 | Jun 4th, 2006
3) Philip Trainor: The statue of liberty: Utilizing Active Honeypots for hosting potentially malicious Events.
"The premise of the demonstration is there are no secure systems. Traffic that may have malicious intent, but has not yet caused problems in any published occurrences, may reach protected services and...Show More
4) Joanna Rutkowska: Rootkits vs Stealth by design Malware
"The presentation will first present how to generically (i.e. not relaying on any implementation bug) insert arbitrary code into the latest Vista Beta 2 kernel (x64 edition), thus effectively bypassin...Show More
5) Shawn Moyer: Defending Black Box Web Applications: Building an Open Source Web Security Gateway
"Web apps continue to be the soft, white underbelly of most corporate IT environments. While the optimal path is to fix your code, it's not always an option, especially for closed-source, black-box we...Show More
6) Daniel Bilar: Automated Malware Classification/Analysis Through Network Theory and Statistics
"Automated identification of malicious code and subsequent classification into known malware families can help cut down laborious manual malware analysis time. Call sequence, assembly instruction stat...Show More
7) Corey Benninger: Finding Gold in the Browser Cache
"Looking for instant gratification from the latest client side attack? Your search may be over when you see the data that can be harvested from popular web browser caches. This discussion will focus o...Show More
8) Adrian Marinescu: Windows Vista Heap Management Enhancements - Security, Reliability and Performance
"All applications and operating systems have coding errors and we have seen technical advances both in attack and mitigation sophistication as more security vulnerabilities are exploiting defects rela...Show More
9) Renaud BIDOU: IPS Short comings
"Technologies emerge on a regular basis with new promises of better security. This is more or less true. However we know there are still weaknesses and that 100% security is not realistic. Therefore t...Show More
10) Tom Brosch and Maik Morgenstern: Runtime Packers: The Hidden Problem?
"Runtime packers are a widely-used technique in malware today. Virtually every Win32 malware added to the WildList as well as ad- and spyware is packed with one or another runtime packer. Not only can...Show More