Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference Podcast
1) Yuji Hoshizawa: Increasingly-sophisticated Online Swindler (English)
"To know various fraud schemes is important when implementing counter measures against it. During this session, the presenter will show the latest online fraud schemes. Vulnerable Internet users could...Show More
2) Jeff Moss: Welcome Speech (English)
Jeff Moss Welcomes Attendess of the Black Hat Conference, October 5-6 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Mitsugu Okatani, Joint Staff Office, J6, Japan Defense Agency w...Show More
3) Jeff Moss: Welcome Speech (Japanese)
Jeff Moss Welcomes Attendess of the Black Hat Conference, October 5-6 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Mitsugu Okatani, Joint Staff Office, J6, Japan Defense Agency w...Show More
4) Thorsten Holz: Catching Malware to Detect, Track and Mitigate Botnets (Japanese)
"Botnets pose a severe threat to the today?s Internet community. We show a solution to automatically, find, observe and shut down botnets with existing opensource tools, partially developed by us. We...Show More
Thorsten Holz: Catching Malware to Detect, Track and Mitigate Botnets (Japanese)
1:29:27 | Jun 4th, 2006
5) Takayuki Sugiura: Winny P2P Security (Japanese)
"There have been a series of information leak incidents being happening in Japan regarding to the use of P2P file sharing softwares. But those incidents are just a tip of iceberg. There were exp...Show More
6) Scott Stender: Attacking Internationalized Software (English)
"Every application, from a small blog written in PHP to an enterprise-class database, receives raw bytes, interprets these bytes as data, and uses the information to drive the behavior of the system. ...Show More
7) Mitsugu Okatani: Keynote: Change in the Meaning of Threat and Technology...What are the Current Trends in Japan? (Japanese)
"As the Internet becomes a social framework, attacks and incidents with various intents have been actualized. As a result, previously unrelated organizations and groups have become actively engaged in...Show More
8) Paul Bohm: Taming Bugs: The art and science of writing secure code (English)
If you give a thousand programmers the same task and the same tools, chances are a lot of the resulting programs will break on the same input. Writing secure code isn't just about avoiding bugs. Progr...Show More
Paul Bohm: Taming Bugs: The art and science of writing secure code (English)
1:14:14 | Jun 4th, 2006
9) Joanna Rutkowska: Subverting Vista Kernel For Fun And Profit (English)
"The presentation will first present how to generically (i.e. not relaying on any implementation bug) insert arbitrary code into the latest Vista Beta 2 kernel (x64 edition), thus effectively bypassin...Show More
10) Kenneth Geers & Alexander Eisen: IPv6 World Update:Strategy & Tactics (Japanese)
"The U.S. Government has mandated that its organizations be IPv6-compliant by June 30, 2008. The Japanese government has already missed more than one IPv6 deadline. But while we can argue about spe...Show More
Kenneth Geers & Alexander Eisen: IPv6 World Update:Strategy & Tactics (Japanese)
1:26:00 | Jun 4th, 2006