1、 Hacking Windows CE (关于PDA和手机操作系统的安全问题) by San
http://xcon.xfocus.net/archives/2005/Xcon2005_San.pdf
2、 网络病毒监控系统的架构体系与研究方法 by Seak
http://xcon.xfocus.net/archives/2005/Xcon2005_Seak.pdf
3、 可编程信号同步技术 by Cawan
http://xcon.xfocus.net/archives/2005/Xcon2005_Cawan.pdf
4、 我想看的更远 by TombKeeper
http://xcon.xfocus.net/archives/2005/Xcon2005_Tombkeeper.pdf
5、 针对Grub的高级木马 by CoolQ
http://xcon.xfocus.net/archives/2005/Xcon2005_CoolQ.pdf
6、 结构化的签名和签名的结构化 by Funnywei
http://xcon.xfocus.net/archives/2005/Xcon2005_Funnywei.pdf
7、 Java 安全编程 by Marc Schoenefeld
http://xcon.xfocus.net/archives/2005/Xcon2005_Marc_Schoenefeld.pdf
8、 程序开发环境安全 by ICBM
http://xcon.xfocus.net/archives/2005/Xcon2005_ICBM.pdf
9、 0day漫谈 by Sowhat
http://xcon.xfocus.net/archives/2005/Xcon2005_Sowhat.pdf
10、Windows内核池溢出漏洞利用方法 by SoBeIt
http://xcon.xfocus.net/archives/2005/Xcon2005_SoBeIt.pdf
http://xcon.xfocus.net/archives/2005/TDIClient.rar
11、Anti-Virus Heuristics by Drew Copley
http://xcon.xfocus.net/archives/2005/Xcon2005_Drew_Copley.pdf
12、恶意代码剖析和Rootkit检测 by Shok
http://xcon.xfocus.net/archives/2005/Xcon2005_Shok.pdf
13、软件同源性度量技术研究 by Liuxin
http://xcon.xfocus.net/archives/2005/Xcon2005_Liuxin.pdf
14、Ring3 NT Rootkit新思路 by Baiyuanfan
http://xcon.xfocus.net/archives/2005/Xcon2005_Baiyuanfan.pdf
http://www.xfocus.net/tools/200508/1076.html
英文
1. Hacking Windows CE by San
http://xcon.xfocus.org/archives/2005/Xcon2005_San.pdf
2. New architecture and approach in Network Virus Detction by Seak
http://xcon.xfocus.org/archives/2005/Xcon2005_Seak.pdf
3. Reconfigurable Synchronization Technique by Cawan
http://xcon.xfocus.org/archives/2005/Xcon2005_Cawan.pdf
4. I want to see farther by Tombkeeper
http://xcon.xfocus.org/archives/2005/Xcon2005_Tombkeeper.pdf
5. Advanced trojan in Grub by CoolQ
http://xcon.xfocus.org/archives/2005/Xcon2005_CoolQ.pdf
6. Structural Signature and Signature's Structure by Funnywei
http://xcon.xfocus.org/archives/2005/Xcon2005_Funnywei.pdf
7. Java & Secure Programming by Marc Schoenefeld
http://xcon.xfocus.org/archives/2005/Xcon2005_Marc_Schoenefeld.pdf
8. Security in development environment by ICMB
http://xcon.xfocus.org/archives/2005/Xcon2005_ICBM.pdf
9. Talking About 0day by Sowhat
http://xcon.xfocus.org/archives/2005/Xcon2005_Sowhat.pdf
10. Windows Kernel Pool Overflow Exploitation by SoBeIt
http://xcon.xfocus.org/archives/2005/Xcon2005_SoBeIt.pdf
http://xcon.xfocus.org/archives/2005/TDIClient.rar
11. Anti-Virus Heuristics by Drew Copley
http://xcon.xfocus.org/archives/2005/Xcon2005_Drew_Copley.pdf
12. Profiling Malware and Rootkits from Kernel-Mode by Shok
http://xcon.xfocus.org/archives/2005/Xcon2005_Shok.pdf
13. Research on Same Source Feature Measuring Technology of Software by Liuxin
http://xcon.xfocus.org/archives/2005/Xcon2005_Liuxin.pdf
14. New thoughts in ring3 nt rootkit by Baiyuanfan
http://xcon.xfocus.org/archives/2005/Xcon2005_Baiyuanfan.pdf
http://www.xfocus.net/tools/200508/1076.html