You can find them here.
Don’t forget to download several presentations that have made news lately :
– Practical 10 Minute Security Audit: The Oracle Case
– Data Seepage: How to Give Attackers a Roadmap to Your Network
– Beyond The CPU: Defeating Hardware Based RAM Acquisition Tools (Part I: AMD case)
– Danger From Below: The Untold Tale of Database Communication Protocol Vulnerabilities