A Crushing Blow At The Heart of SAP J2EE Engine
Aerial Cyber Apocalypse: If we can do it... they can too.
Affiliate Programs: Legitimate Business or Fuelling Cybercrime?
Analyzing SPDY: Getting to know the new web protocol
Apple iOS Security Evaluation: Vulnerability Analysis and Data Encryption
ARM exploitation ROPmap
Attacking Clientside JIT Compilers
Automated Detection of HPP Vulnerabilities in Web Applications
Battery Firmware Hacking
Beyond files undeleting: OWADE
Bit-squatting: DNS Hijacking without exploitation
Black Ops of TCP/IP 2011
Chip & PIN is definitely broken
Constant Insecurity: Things you didn't know about (PE) Portable Executable file format
Corporate Espionage for Dummies: The Hidden Threat of Embedded Web Servers
Covert Post-Exploitation Forensics With Metasploit
Crypto for Pentesters
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Hate the Player, Hate the Game: Inside the Android Security Patch Lifecycle
Exploiting Siemens Simatic S7 PLCs
Exploiting the iOS Kernel
Exploiting USB Devices with Arduino
Faces Of Facebook - Or, How The Largest Real ID Database In The World Came To Be
Familiarity Breeds Contempt: The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulns
Femtocells: A poisonous needle in the operator's hay stack
From Redmond with Love!
Function Rerouting from Kernel Land "Hades"
Hacking and Forensicating an Oracle Database Server
Hacking Androids for Profit
Hacking Google Chrome OS
Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System
Hacking .Net Applications: The Black Arts
Heap spray detection with Heap Inspector
IEEE Software Taggant System
Inside Apple's MDM Black Box
Keynote
Keynote
Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS
Legal Aspects of Cybersecurity - (AKA) CYBERLAW: A Year in Review, Cases, issues, your questions my
Lives On The Line: Defending Crisis Maps in Libya, Sudan, and Pakistan
Macs in the Age of the APT
Microsoft Vista: NDA-less The Good, The Bad, and The Ugly
Mobile Malware Madness, and How To Cap the Mad Hatters
OAuth - Securing the Insecure
Overcoming IOS Data Protection to Re-enable iPhone Forensics
Owning the Routing Table - New OSPF Attacks
Owning Your Phone at Every Layer - A Mobile Security Panel
Physical Memory Forensics for Cache
Playing In The Reader X Sandbox
Post Memory Corruption Memory Analysis
PPI-Geolocation: The next generation of 802.11 visualization and geo-location
Pulp Google Hacking - The Next Generation Search Engine Hacking Arsenal
Reverse Engineering Browser Components - Dissecting and Hacking Silverlight, HTML 5 and Flex
Reviving smart card analysis
Security When Nano-seconds Count
Server-Side JavaScript Injection: Attacking NoSQL and Node.js
Smartfuzzing The Web: Carpe Vestra Foramina
Sophail: A Critical Analysis of Sophos Antivirus
Sour Pickles
Spy-Sense: Spyware Tool for executing Stealthy Exploits against Sensor Networks
SSH as the next back door. Are you giving hackers root access?
SSL And The Future Of Authenticity
Staring into the Abyss: The Dark Side of Secuirity and Professional Intelligence
Sticking to the Facts: Scientific Study of Static Analysis Tools
Tamper Evident Seals - Design and Security
The Law of Mobile Privacy and Security
The Rustock Botnet Takedown
The Troika of E-Discovery: Ethics, ESI, and Expertise in a Web 2.0 World
The Ultimate Study of Real-Life SSL Issues
Trillions of Lines of Code and Counting - Securing Applications At Scale
USB - Undermining Security Barriers
Virtualization under attack: Breaking out of KVM
Vulnerabilities of Wireless Water Meter Networks
Vulnerability Extrapolation or 'Give me more Bugs like that, please!'
War Texting: Identifying and Interacting with Devices on the Telephone Network
Weapons of Targeted Attack: Modern Document Exploit Techniques
welcome & introduction to black hat usa 2011
Windows Hooks of Death: Kernel Attacks Through User-Mode Callbacks