![Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference podcast](https://is5-ssl.mzstatic.com/image/thumb/Podcasts4/v4/c6/b3/87/c6b387c2-23a9-af95-bd0c-bb5a4661df54/mza_4522962146836497570.jpg/200x200bb.png)
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference Podcast
1) Marco M. Morana: Building Security into the Software Life Cycle, a Business Case
The times of designing security software as a matter of functional design are over. Positive security functional requirements do not make secure software. Think risk driven design, think like an attac...Show More
Marco M. Morana: Building Security into the Software Life Cycle, a Business Case
24:33 | Jun 4th, 2006
2) Rob Franco: Case Study: The Secure Development Lifecycle and Internet Explorer 7
Voice analytics-once the stuff of science fiction and Echelon speculation-is now commercially available and is being used by call centers processing hundreds of thousands of calls per day to authentic...Show More
Rob Franco: Case Study: The Secure Development Lifecycle and Internet Explorer 7
45:18 | Jun 4th, 2006
3) Philip Trainor: The statue of liberty: Utilizing Active Honeypots for hosting potentially malicious Events.
"The premise of the demonstration is there are no secure systems. Traffic that may have malicious intent, but has not yet caused problems in any published occurrences, may reach protected services and...Show More
4) Joanna Rutkowska: Rootkits vs Stealth by design Malware
"The presentation will first present how to generically (i.e. not relaying on any implementation bug) insert arbitrary code into the latest Vista Beta 2 kernel (x64 edition), thus effectively bypassin...Show More
5) David Hulton & Dan Moniz: Faster Pwning Assured: Hardware Hacks and Cracks with FPGA's
"This talk will go in-depth into methods for breaking crypto faster using FPGAs. FPGA's are chips that have millions of gates that can be programmed and connected arbitrarily to perform any sort of ta...Show More
David Hulton & Dan Moniz: Faster Pwning Assured: Hardware Hacks and Cracks with FPGA's
1:06:14 | Jun 4th, 2006
6) Billy Hoffman: Analysis od Web application worms and Viruses
"Worms traditionally propagate by exploiting a vulnerability in an OS or an underlying service. 2005 saw the release in the wild of the first worms that propagate by exploiting vulnerabilities in web ...Show More
7) Shawn Moyer: Defending Black Box Web Applications: Building an Open Source Web Security Gateway
"Web apps continue to be the soft, white underbelly of most corporate IT environments. While the optimal path is to fix your code, it's not always an option, especially for closed-source, black-box we...Show More
8) Daniel Bilar: Automated Malware Classification/Analysis Through Network Theory and Statistics
"Automated identification of malicious code and subsequent classification into known malware families can help cut down laborious manual malware analysis time. Call sequence, assembly instruction stat...Show More
9) Corey Benninger: Finding Gold in the Browser Cache
"Looking for instant gratification from the latest client side attack? Your search may be over when you see the data that can be harvested from popular web browser caches. This discussion will focus o...Show More
10) Tom Brosch and Maik Morgenstern: Runtime Packers: The Hidden Problem?
"Runtime packers are a widely-used technique in malware today. Virtually every Win32 malware added to the WildList as well as ad- and spyware is packed with one or another runtime packer. Not only can...Show More