Xcon 2005精彩议题

发表于:2007-05-25来源:作者:点击数: 标签:Xcon议题Xcon2005精彩2005
Xcon2005精彩议题: 中文 1、Hacking Windows CE(关于PDA和手机操作系统的 安全 问题)bySan http://xcon.xfocus.net/archives/2005/Xcon2005_San.pdf 2、 网络 病毒监控系统的架构体系与研究方法bySeak http://xcon.xfocus.net/archives/2005/Xcon2005_Seak.

Xcon 2005精彩议题:

中文

1、 Hacking Windows CE (关于PDA和手机操作系统的安全问题) by San
http://xcon.xfocus.net/archives/2005/Xcon2005_San.pdf

2、 网络病毒监控系统的架构体系与研究方法 by Seak
http://xcon.xfocus.net/archives/2005/Xcon2005_Seak.pdf

3、 可编程信号同步技术 by Cawan
http://xcon.xfocus.net/archives/2005/Xcon2005_Cawan.pdf

4、 我想看的更远 by TombKeeper
http://xcon.xfocus.net/archives/2005/Xcon2005_Tombkeeper.pdf

5、 针对Grub的高级木马 by CoolQ
http://xcon.xfocus.net/archives/2005/Xcon2005_CoolQ.pdf

6、 结构化的签名和签名的结构化 by Funnywei
http://xcon.xfocus.net/archives/2005/Xcon2005_Funnywei.pdf

7、 Java 安全编程 by Marc Schoenefeld
http://xcon.xfocus.net/archives/2005/Xcon2005_Marc_Schoenefeld.pdf

8、 程序开发环境安全 by ICBM
http://xcon.xfocus.net/archives/2005/Xcon2005_ICBM.pdf

9、 0day漫谈 by Sowhat
http://xcon.xfocus.net/archives/2005/Xcon2005_Sowhat.pdf

10、Windows内核池溢出漏洞利用方法 by SoBeIt
http://xcon.xfocus.net/archives/2005/Xcon2005_SoBeIt.pdf
http://xcon.xfocus.net/archives/2005/TDIClient.rar

11、Anti-Virus Heuristics by Drew Copley
http://xcon.xfocus.net/archives/2005/Xcon2005_Drew_Copley.pdf

12、恶意代码剖析和Rootkit检测 by Shok
http://xcon.xfocus.net/archives/2005/Xcon2005_Shok.pdf

13、软件同源性度量技术研究 by Liuxin
http://xcon.xfocus.net/archives/2005/Xcon2005_Liuxin.pdf

14、Ring3 NT Rootkit新思路 by Baiyuanfan
http://xcon.xfocus.net/archives/2005/Xcon2005_Baiyuanfan.pdf
http://www.xfocus.net/tools/200508/1076.html

英文

1.  Hacking Windows CE by San
http://xcon.xfocus.org/archives/2005/Xcon2005_San.pdf

2.  New architecture and approach in Network Virus Detction by Seak
http://xcon.xfocus.org/archives/2005/Xcon2005_Seak.pdf

3.  Reconfigurable Synchronization Technique by Cawan
http://xcon.xfocus.org/archives/2005/Xcon2005_Cawan.pdf

4.  I want to see farther by Tombkeeper
http://xcon.xfocus.org/archives/2005/Xcon2005_Tombkeeper.pdf

5.  Advanced trojan in Grub by CoolQ
http://xcon.xfocus.org/archives/2005/Xcon2005_CoolQ.pdf

6.  Structural Signature and Signature's Structure by Funnywei
http://xcon.xfocus.org/archives/2005/Xcon2005_Funnywei.pdf

7.  Java & Secure Programming by Marc Schoenefeld
http://xcon.xfocus.org/archives/2005/Xcon2005_Marc_Schoenefeld.pdf

8.  Security in development environment by ICMB
http://xcon.xfocus.org/archives/2005/Xcon2005_ICBM.pdf

9.  Talking About 0day by Sowhat
http://xcon.xfocus.org/archives/2005/Xcon2005_Sowhat.pdf

10. Windows Kernel Pool Overflow Exploitation by SoBeIt
http://xcon.xfocus.org/archives/2005/Xcon2005_SoBeIt.pdf
http://xcon.xfocus.org/archives/2005/TDIClient.rar

11. Anti-Virus Heuristics by Drew Copley
http://xcon.xfocus.org/archives/2005/Xcon2005_Drew_Copley.pdf

12. Profiling Malware and Rootkits from Kernel-Mode by Shok
http://xcon.xfocus.org/archives/2005/Xcon2005_Shok.pdf

13. Research on Same Source Feature Measuring Technology of Software by Liuxin
http://xcon.xfocus.org/archives/2005/Xcon2005_Liuxin.pdf

14. New thoughts in ring3 nt rootkit by Baiyuanfan
http://xcon.xfocus.org/archives/2005/Xcon2005_Baiyuanfan.pdf
http://www.xfocus.net/tools/200508/1076.html

 vyouzhi 回复于:2005-08-29 15:39:59
good

 albcamus 回复于:2005-08-29 17:16:01
ring3 rootkit的那个白远方今年多大啊,听说才上大一,牛

 deargentle 回复于:2005-08-31 14:18:14
白远方,上海华东师范大学软件学院2004级学生,系统内核开发与安全开发爱好者

原文转自:http://www.ltesting.net