Xcon 2005: Research on Same Source Feature Measuring Technology of Software
ecc8660c93c2e4c28023a871eed92a3fcae596c38b1fdc637a4405a90417300f
Xcon 2005: Security in development environment
ada975a45131d41540dbee4e5a081c01c8e6f6a5bc963b2035b134a6ac3b7f82
Xcon 2005: Profiling Malware and Rootkits from Kernel-Mode
f35044fbda6b53c3159c28d612cabdbcf4ab5bf98de1368f2d90bf6256db271e
Xcon 2005: New thoughts in ring3 nt rootkit
d0dc6ba9e5e2a145d29838a6a02926fda4ac8adb83af61bd3c4f840f4af2a2f0
Xcon 2005: New architecture and approach in Network Virus Detection
cdd1681d944eb8cec64eb1adac29df6247f521b7c6d350d79d1fe380205c85f0
Xcon 2005: I want to see farther
b915fe90362db76cec184c3a1d6e71e00a87d32076bff84f7c84c37374aff602
Xcon 2005: Windows Kernel Pool Overflow Exploitation
c7ba43a585d9880a05a3ab27f0be73b6725629e574a219b07e112b67dc36bfad
Xcon 2005: Hacking Windows CE
590f520dff1623d1a11b0e8d49ad52cb7733604cf0dae833442b8908ea8a6183
Xcon 2005: Java & Secure Programming
d6b3ac72fd172c204d6d57072918910fec85af743030e6cc24440b1c52cf37dd
Xcon 2005: Structural Signature and Signature's Structure
9ec4308f69278371a19a8fd3ad829146dc1f6e9bc11d2c805f3853f54a516609
Xcon 2005: Talking About 0day
e4d859a8ae5ae21d8225ae5961d59c20dbcc3a791da1b98ee61f8c0a40955b69
Xcon 2005: Advanced trojans in Grub
9d66bf700c197ee8747ecbb8dfaa34a5442d6818524958c82f1113b916ec28ba
Xcon 2005: Reconfigurable Synchronization Technique
d37c98176daf5cff75d8b5aca1d5000624f20a50609b605b80e35356b1932238
Xcon 2005: Anti-Virus Heuristics
2ecef563b1af1bdb7220834ff9434253e41dce6fe29512d70e68840d9ba22576