|
Saturday, 20th November |
|
|
Meder Kydryraliev Milking a Horse or Executing Remote Code in Modern Java Web Frameworks |
Andrew Griffiths |
|
Endrazine Breaking Virtualization by switching the CPU to Virtual 8086 Mode |
Jarrod Loidl |
|
Matt J Killing the Elephant in the Room - Enterprise Vulnerability Management Tactics |
Nicolas Waisman |
|
Billy Rios |
Kuza55 |
|
Ben Nagy Prospecting for Rootite: More Code Coverage, More Bugs, Less Wasted Effort |
Louis Nyffenegger |
|
Brett Moore |
Michael Jordon |
|
Sean Heelan |
Edward Farrell |
|
Sunday, 21st November |
|
|
Ryan O'Neill Instrumenting the Linux Kernel with Kprobes for Anti-Security |
Jaco van Heerden |
|
Mark Goudie |
Silvio Cesare |
|
Mark Chaffe The Australian Internet Security Initiative - Fighting Botnets at the Source |
Stephen Glass & Matt Robert |
|
Tim Kornau (Zynamics) |
Peter Hanney |
|
Alex Tilley |
Matthew de Carteret |
|
Nick Klein How to do Real World Computer Forensics ... and not get Burned |
David Jorm |
|
Adam Daniel |
Daniel Grzelak |