(The final program will published later) - Xavier Carcelle - Security overview and vulnerabilities of PLC technologies - Philippe Langlois & Eugene Parkinson - Fully-Automated Wireless Security Audit Platform on Embedded Hardware - Leonardo Nve Egea - Playing in a Satellite environment 1.2 - Erwan Abgrall - Oracle: A new hop - Mahmoud Maqableh & Stefan Dantchev - Cryptanalysis of Chaos-Based Hash Function (CBHF) - Robert Erra & Eric Filiol - Processor-dependent malware - Benjamin Caillat - WiShMaster - Windows Shellcode MASTERy... reloaded (tutorial with technical practice) - Robert Erra & Christophe Grenier - How to chose RSA keys? (Past, Present and Future) - Anthony Desnos - Organizer of the PWN2RM Challenge
http://esiea-recherche.eu/iawacs_2009.html _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
