[1ÀÏÂ÷]
"Breaking The Secure USB"
( ¼øõÇâ´ë Security First, Á¤ÀÇÁø ) 

"ÀÚ¿¬°úÇÐ, ±âÃÊ°øÇÐ War-Driving"
( µ¿¸í´ë THINK ) 

"The Way of Inject Code To Process"
( ÀÎÇÏ´ë IGRUS, ±è°æ¼ö )

"A Practice of Remote Code Execution Using CPU Bugs"
( Ãæ³²´ë ARGOS, passket ) 

"Online Game Security"
( Ahnlab, ¹Ú¼ºÈÆ )

[2ÀÏÂ÷]
"Web-Worm"
( °Ç¾ç´ë SIMPLE, ÀÌÀºÃÑ ) 

"Celluar Phone DDOS Attack"
( °æºÏ´ë KERT ) 

Voice Over IP Hacking"
( µ¿¾ç´ë NGI, ¼Û¼öÇö )

"ETC."
( drwx ) 

---

?The Way of Inject Code to Process
, ±è°æ¼ö ( ÀÎÇÏ´ë IGRUS )
- º» ¹ßÇ¥¿¡¼­´Â Ÿ°Ù ÇÁ·Î¼¼½º¿¡ ÀÚ½ÅÀÇ ·çƾÀ» ÁÖÀÔÇÏ´Â ±â¼ú¿¡ ´ëÇÑ ±âº»ÀûÀÎ ¿ø¸®¿Í ÀÀ¿ë¿¡ ´ëÇÑ ½Ã¿¬À» »ìÆ캸°í À̸¦ ¹æ¾îÇϱâ À§ÇÑ ¹æ¹ýÀ» ¼Ò°³ÇÑ´Ù. 

?A Practice of Remote Code Execution Using CPU bugs
, passket ( Ãæ³²´ë ARGOS )
- HITB 2008 Äí¾Ë¶ó·ëǪ¸£¿¡¼­ Kris Kaspersky°¡ ¹ßÇ¥ÇÑ CPU ÀÚü ¹ö±×¸¦ ÅëÇØ ¿ø°Ý¿¡¼­ ÀÓÀÇÀÇ Äڵ带 ½ÇÇàÇÒ ¼ö ÀÖ´Ù´Â °¡´É¼ºÀÌ ¹ßÇ¥µÇ¾î ¸¹Àº »ç¶÷µéÀÌ ¿ì·ÁÇß¾ú´Ù. ÇÏÁö¸¸, ±× ½ÇÁ¦ PoC(Proof of Concept)¿¡ °ü·ÃµÈ ÄÚµå´Â °ø°³ÇÏÁö ¾ÊÀ½À¸·Î ±× °¡´É¼ºÀ» ÀÌ·ÐÀ¸·Î¸¸ Áõ¸íÇßÀ¸¸ç ±× ½ÇÁ¦ Àû¿ë¹üÀ§³ª ¹æ¾î±â¹ý¿¡ ´ëÇÑ À̾߱â´Â »ý·«µÇ¾î¼­, À̹ø ¹ßÇ¥¸¦ ÅëÇØ ½ÇÁ¦ °ø°ÝÇÒ ¼ö ÀÖ°í º¸¾ÈÀû À§ÇèÀº ½ÇÁ¦·Î ¾ó¸¶³ª µÇ´ÂÁö ¿¬±¸ÇÑ °á°ú¸¦ ¹ßÇ¥ÇÑ´Ù. exploitÀº ¹ßÇ¥µÇÁö ¾ÊÀ¸¸ç, °£´ÜÇÑ °³³äÁõ¸í ÄÚµå(PoC)´Â ¹ßÇ¥µÈ´Ù. 

?Web-Worm
, ÀÌÀºÃÑ ( °Ç¾ç´ë SIMPLE )
- µ¿ÀÏÇÑ ±¸Á¶ÀÇ À¥»çÀÌÆ®¿¡ XSS Ãë¾àÁ¡ÀÌ Á¸ÀçÇÏ´Â ÆäÀÌÁö°¡ ÀÖÀ»°æ¿ì ¹ß»ýÇÒ ¼ö ÀÖ´Â Web Worm ±â¼ú¿¡ ´ëÇØ ´Ù·é´Ù. Web WormÀ̶õ , À¥¿¡¼­ À¥À¸·Î °¨¿°µÇ¾î ³ª°¡´Â ¾Ç¼ºÄÚµåÀε¥, ÁÖ·Î ÀθƱâ¹ÝÀÇ À¥»çÀÌÆ®¿¡¼­ ¹ß»ýµÉ¼ö ÀÖÀ¸¸ç, ¾öû³­ Æ®·¡ÇÈÀ» ¹ß»ý½Ãų¼ö ÀÖ´Ù. ±×¸®°í °æ¿ì¿¡ µû¶ó ¼ö¸¹Àº Á»ºñPC±îÁö °Å´À¸± ¼ö ÀÖ´Â ±â¼úÀÌ´Ù. 

?Voice Over IP hacking
, ¼Û¼öÇö ( µ¿¾ç´ë NGI )
- VoIPÀÇ °³³ä°ú ±¸Á¶ ¿ø¸®¸¦ °£´ÜÈ÷ ¾ð±ÞÇÏ°í Áö±Ý±îÁö ¹®Á¦°¡ µÇ°í ÀÖ´Â VoIP ÇÁ·ÎÅäÄÝÀÇ Ãë¾àÁ¡À» ÀÌ¿ëÇÏ¿© µµÃ», ¸Þ½ÃÁö°ø°ÝÀ» ½Ã¿¬ÇÑ´Ù. ¶ÇÇÑ ÇÁ·ÎÅäÄÝÀÇ Ãë¾àÁ¡ÀÌ ÀÍÈ÷ ¾Ë·ÁÁ® ¿ÔÀ¸³ª ¾ÆÁ÷±îÁö ÇØ°áµÇÁö ¸øÇÑÁ¡À» µÇ¤°í ¾ÕÀ¸·Î Á¤ºÎ, ±â°ü»ç¾÷ÀÚµîÀÇ Ãë¾àÁ¡ º¸¿Ï»óȲ ¹× °èȹ¿¡ ´ëÇØ º¸°íÇÑ´Ù.