applied security conferences and training: CanSecWest | PacSec | EUSecWest |

History

The EUSecWest conference was established in 2005. Archives of presented material may be found below.

Material Archives - List, 2008, 2007, 2006, 2005

2010

Meder Kydryraliev - Google
Milking a horse or executing remote code in modern Java web frameworks
Stephen Ridley - Matasano
Escaping the Sandbox
Philipe Lagadec - NATO/NC3A
Fighting PDF Malware with ExeFilter
Sebastian "naxxatoe" Graf
Rainbow Tables Reimplemented
Karsten Nohl & Hendryk Plotz - Security Research Labs
Legic Prime: Obscurity in Dept
Andrei Constin
Hacking Printers for fun and profit
Sumit Siddharth - 7Safe
Hacking Oracle from Web Apps
Joern Bratzkei - Recurity Labs
Defending the Poor, Flash Defense
Keith Myers & Jose Avila - ONZRA
Location Aware DoS Attacks (how proposed IETF drafts can change the future of DoS)
Vincent Berg - IOActive
Auditing C#
Jeongwook (Matt) Oh
DarunGrim - A Tool for Binary Diffing and Automatic Vulnerabilities Pattern Matching
Ravishankar Borgaonkar & Kevin Redon - Technical University of Berlin
Immature Femtocels
Ilja Van Sprundel - IOActive
Having fun with Apple's IOKit

2009

Ralf-Philipp Weinmann - University of Luxembourg
Efficient UAK Recovery attacks against DECT
Peleus Uhley - Adobe
A year in the life of an Adobe Flash security researcher
Charlie Miller - Independent Security Evaluators
Pwning your grandmother's iPhone
Vincent Iozzo - Zynamics
Post exploitation techniques on OSX and Iphone and other TBA matters.
nemo
STOP!! Objective-C Run-TIME.
Ilja Van Sprundel - IOActive
Exploiting Delphi/Pascal
Christophe Devine & Guillaume Vissian - Thales
PCI bus based operating system attack and protections
Joanna Rutkowska - Invisible Things Lab
Thoughts about Trusted Computing
Tim Burrell & Peter Beck - Microsoft
Evolving Microsoft Exploit Mitigations
Vicente Diaz - S21Sec
Malware Case Study: the ZeuS evolution
Alex Kouzemtchenko - SIFT
Writing better XSS payloads
Roberto Suggi Liverani & Nick Freeman - Security-Assessment.com
Exploiting Firefox Extensions
Adrian Pastor - Gnucitizen, Corsaire
Stored Value Gift Cards, Magstripes Revisited
Bernardo Damele Assumpcao Guimaraes - Portcullis
Advanced SQL Injection to operating system control
Nicolas Courtois - University College London
Faster Card-Only Attacks on MiFare Classic
Petr Matousek - Coseinc
Rootkits on Windows Mobile/Embedded

2008

Saumil Shah - Net Square
Browser Exploits - Attacks and Defense
Rich Smith - HP Labs
PhlashDance, discovering permanent denial of service attacks against embedded systems
Adam Laurie - RFIDIOt.org
Satellite Systems
Tim Burrell - Microsoft
Phoenix, and automated vulnerability finding
Alberto Revelli - Portcullis
Building the bridge between the Web Application and the OS: GUI access through SQL Injection
Martyn Ruks - MWR InfoSecurity
WebSphere MQ Security
Sebastian Muñiz - Core
Cisco IOS Rootkits
Collin Mulliner - trifinite
Attacking Near Field Communications (NFC) Mobile Phones
Alexander Klink - Cynops GmbH
Abusing X.509 certificate features
Luke Jennings - MWR InfoSecurity
One Token to Rule Them All: Post-Exploitation Fun in Windows Environments
Justin Ferguson
Advances in attacking interpreted languages
Aditya K Sood - SecNiche Security
Synthesizing PDF Attacks

2007

Greg Galford - Microsoft
Threats against and protection of Microsoft's internal network
Marcel Holtmann - Red Hat
Linux Kernel == Security Nightmare
Ollie Whitehouse - Symantec
/GS and ASLR in Windows Vista
Christian Wieser - Oulu University
Fuzzing: history, perspectives and limits
Matteo Meucci & Alberto Revelli - OWASP-Italy
The new OWASP Web Application Penetration Testing Methodology
Jose Nazario, Ph.D. - Arbor
Reverse Engineering Malicious Javascript
Ofir Arkin - Insightix
Bypassing NAC Systems
Adam Laurie - Trifinite
RFID
Jim Deleskie - Teleglobe
Protecting Next-Gen Networks @ Nx10G link sizes
Navid Jam - Sandia National Laboratories
Video Conferencing Security
Sun Bing
Software Virtualization Based Rootkits
Dustin D. Trammell - TippingPoint
VoIP Attacks!
Richard Johnston - Microsoft
Windows Vista Exploitation Countermeasures
Daniel Cuthbert - Corsaire
OSX Security
Emmanuel H
Distributed drone-based malware propagation and deployment automation

2006

Javier Burroni & Carlos Sarraute - Core Security Technologies
Analyzing OS fingerprints using Neural Networks and Statistical Machinery
van Hauser - thc
Attacking the IPv6 protocol suite
Yuji Ukai - eeye
Exploiting Real-Time OS Based Embedded Systems Using the JTAG Emulator
Nguyen Anh Quynh - Keio University
XEBEK: A Next Generation Honeypot Monitoring System
Fred Raynal - EADS
Malicious Crypto
Cesar Cerrudo - Argeniss
Windows Local Shellcode Injection
Andrew Cushman - Microsoft
Microsoft Security Fundamentals
Shreeraj Shahi - Net Square
Advanced Web Hacking - Attacks & Defense
Justin Clarke - Ernst & Young LLP
Practical Automated Web Application Attack Techniques
Andy Davis - IRM PLC
ColdFusion Security
Tim Hurman - Pentest Ltd.
ARMed combat: the fight for personal security
Raffael Marty - ArcSight
A Visual Approach to Security Event Management
Michael Boman - KPMG Singapore
Network Security Monitoring: Theory and Practice
Jim DeLeskie & Danny McPherson - Teleglobe, Arbor Networks
Protecting the Infrastructure
Andrea Barisani - Inverse Path
Lessons in Open Source Security: The Tale of a 0-Day Incident

2005

Javier Burroni & Carlos Sarraute - Core Security Technologies
Analyzing OS fingerprints using Neural Networks and Statistical Machinery
van Hauser THC / n.runs GmbH
Attacking the IPv6 protocol suite
Nguyen Anh Quynh - Keio University
XEBEK: A Next Generation Honeypot Monitoring System
Fred Raynal - EADS
Malicious Crypto
Cesar Cerrudo - Argeniss
Windows Local Shellcode Injection
Andrew Cushman - Microsoft
Microsoft Security Fundamentals
Barnaby Jack - eeye
Exploiting Real-Time OS Based Embedded Systems Using the JTAG Emulator
Shreeraj Shah - Net Square
Advanced Web Hacking - Attacks & Defense
Justin Clarke - Ernst & Young LLP
Practical Automated Web Application Attack Techniques
Andy Davis - IRM PLC
ColdFusion Security
Tim Hurman - Pentest Ltd.
ARMed Combat: The Fight For Personal Security
Raffael Marty - ArcSight
A Visual Approach to Security Event Management
Michael Boman - KPMG Singapore
Network Security Monitoring: Theory and Practice
Jim DeLeskie & Danny McPherson - Teleglobe, Arbor Networks
Protecting the Infrastructure
Andrea Barisani - Inverse Path
Lessons in Open Source Security: The Tale of a 0-Day Incident