Thurgood Marshall N & W
Opening Remarks
GPU vs. CPU Supercomputing Security Shootout
Information disclosure via P2P networks: Why stealing an identity via Gnutella is like clubbing baby seals
Economics of Cyber Crime
Windows File Pseudonyms
Learning by Breaking: A New Project for Insecure Web Applications
Guest Stealing...The VMware Way
Keynote - Closing the TLS Authentication Gap
Jsunpack-network Edition Release: JavaScript Decoding and Intrusion Detection
WLCCP - Analysis of a Potentially Flawed Protocol
WiFi Bombs shaken not stirred
Build your own Predator UAV @ 99.95% Discount
Ring -1 vs. Ring -2: Containerizing Malicious SMM Interupt Handlers on AMD-V
honeyM: A Framework For Virtual Mobile Device Honeyclients
DIY Hard Drive Diagnostics: Understanding a Broken Drive
Blackberry Mobile Spyware - The Monkey Steals the Berries
PCI: An Existential Threat To Security As We Know It
0wn the Con
Better Approaches to Physical Tamper Detection
Closing Remarks