0-day, gh0stnet and the inside story of the Adobe JBIG2 vulnerability
30k Feet Look at WiFi
AAPL- Automated Analog Telephone Logging
Abusing Firefox Addons
Advanced MySQL Exploitation
Advanced SQL Injection
Advancing Video Application Attacks with Video Interception, Recording, and Replay
Air Traffic Control: Insecurity and ADS-B
A Low Cost Spying Quadrotor for Global security Applications Using Hacked Commercial Digital Camera
An Open JTAG Debugger
App Assessment the Metasploit Way
Ask EFF: The Year in Digital Civil Liberties
Asymmetric Defense: How to Fight Off the NSA Red Team with Five People or Less
Attacking SMS. It's No Longer Your BFF
Attacking Tor at the Application Layer
Attacks Against 2wire Residential Gateways
Automated Malware Similarity Analysis
Beckstrom's Law - A Model for Valuing Networks and Security
Binary Obfuscation from the Top-Down: Obfuscating Executables Without Writing Assembly
BitTorrent Hacks
Bluetooth, Smells Like Chicken
Breaking the "Unbreakable" Oracle with Metasploit
Catching DNS Tunnels with AI - A Talk About Artificial Intelligence, Geometry and Malicious Traffic
Clobbering the Cloud
Closing Ceremonies hosted by The Dark Tangent
Cloud Security in Map/Reduce
Computer and Internet Security Law - A Year in Review 2008 - 2009
Confidence Game Theater
Con Kung-Fu: Defending Yourself @ DEF CON
Cracking 400,000 Passwords, or How to Explain to Your Roommate why the Power Bill is a Little High…
Cracking the Poor and the Rich: Discovering the Relationship Between Physical and Network Security
Criminal Charges are not pursued: Hacking PKI
Cross Site Scripting Anonymous Browser 2.0
CSRF: Yeah, It Still Works
Dangerous Minds: The Art of Guerrilla Data Mining
DCFluX in: The Man with the Soldering Gun
DC Network Session
Death of Anonymous Travel
Deblaze - A Remote Method Enumeration Tool for Flex Servers
DEF CON 101
DEF CON 1 - A Personal Account
Defcon Security Jam 2: The Fails Keep on Coming
De Gustibus, or Hacking your Tastebuds
Design and Implementation of a Quantum True Random Number Generator
Doppelganger: The Web's Evil Twin
Down the Rabbit Hole: Uncovering a Criminal Server
Dradis Framework - Sharing Information will get you Root
Effective Information Security Career Planning
eXercise in Messaging and Presence Pwnage
Failure
FOE -- Feeding Controversial News to Censored Countries (Without Using Proxy Servers)
Fragging Game Servers
Good Vibrations: Hacking Motion Sickness on the Cheap
Hackerspaces: The Legal Bases
Hacker vs. Disasters Large and Small: Hacker Skills for Wilderness and Disaster Survival
Hacking, Biohacking, and the Future of Humanity
Hacking Sleep: How to Build Your Very Own Sleep Lab
Hacking the Apple TV and Where your Forensic Data Lives
Hacking the Smart Grid
Hacking the Wiimote and Wii Fit to Help the Disabled
Hacking UFOlogy 102: The Implications of UFOs for Life, the Universe, and Everything
Hacking with GNURadio
Hacking WITH the iPod Touch
Hack like the Movie Stars: A Big-Screen Multi-Touch Network Monitor
Hack The Textbook
Hadoop: Apache's Open Source Implementation of Google's MapReduce Framework
Hardware Black Magic - Building devices with FPGAs
Hardware Trojans: Infiltrating the Faraday Cage
Hello, My Name is /hostname/
Hijacking Web 2.0 Sites with SSLstrip--Hands-on Training
"I Am Walking Through a City Made of Glass and I Have a Bag Full of Rocks"
Identifying, Exploring, and Predicting Threats in the Russian Hacker Community
Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers
Injecting Electromagnetic Pulses into Digital Devices
Introduction to WiMAX Hacking
Invisible Access: Electronic Access Control, Audit Trails and "High Security"
Is That You, Baby, or Just a Bridge in the Sky?
Is your Iphone Pwned? Auditing, Attacking and Defending Mobile Devices
Jailbreaking and the Law of Reversing
Locally Exploiting Wireless Sensors
Lockpicking Forensics
Macsploitation with Metasploit
Making Fun of Your Malware
Malware Freak Show
Managed Code Rootkits - Hooking into Runtime Environments
Manipulation and Abuse of the Consumer Credit Reporting Agencies
Maximum CTF: Getting the Most Out of Capture the Flag
Meet the Feds 2009
MetaPhish
Metasploit Autopsy: Recontructing the Crime Scene
Metasploit Evolved
Metasploit Goes Web
Meterpreter Advances
More Tricks For Defeating SSL
MSF Telephony
MSF Wifi
Old Skool Brought Back: A 1964 Modem Demo
Packing and the Friendly Skies
Personal Survival Preparedness
Perspective of the DoD Chief Security Officer
Picking Electronic Locks Using TCP Sequence Prediction
PLA Information Warfare Development Timeline and Nodal Analysis
Pre-Con Introduction to Lock Picking
Preparing for Cyber War: Strategy and Force Posture in the Information-Centric World
Protecting Against and Investigating Insider Threats (A methodical, multi-pronged approach to protecting your organization)
Proxy Prank-o-Matic
Q & A with Bruce Schneier
RAID Recovery: Recover your PORN by Sight and Sound
Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis and Visualization
RFID MythBusting
Robot Shark Laser! What Hackerspaces Do
Router Exploitation
Runtime Kernel Patching on Mac OS X
Screen Scraper Tricks: Extracting Data from Difficult Websites
Search And Seizure Explained - They Took My Laptop!
Session Donation
Sharepoint 2007 Knowledge Network Exposed
Skytalks
Slight of Mind: Magic and Social Engineering
"Smart" Parking Meter Implementations, Globalism, and You(aka Meter Maids Eat Their Young)
Smashing the Stack with Hydra: The Many Heads of Advanced Polymorphic Shellcode
Sniff Keystrokes With Lasers/Voltmeters
Socially Owned in the Cloud
Social Zombies: Your Friends Want to Eat Your Brains
Something about Network Security
So You Got Arrested in Vegas...
Stealing Profits from Stock Market Spammers or: How I learned to Stop Worrying and Love the Spam
Subverting the World Of Warcraft API
Tactical Fingerprinting Using Metadata, Hidden Info and Lost Data
TBA
That Awesome Time I Was Sued For Two Billion Dollars
The Day of the Updates
The Making of the second SQL injection Worm
The Middler 2.0: It's Not Just for Web Apps Anymore
The Projects of "Prototype This!"
The Psychology of Security Unusability
The security risks of Web 2.0
The Year In Computer Crime Cases
three point Oh.
Unfair Use - Speculations on the Future of Piracy
Unmasking You
USB Attacks: Fun with Plug & 0wn
Using Guided Missiles in Drive-Bys: Automatic browser fingerprinting and exploitation with Metasploit
Weaponizing the Web: New Attacks on User-generated Content
Welcome to Defcon 17 with Dark Tangent and the Making of & Hacking the DC17 Badge
Who Invented the Proximity Card?
Why Tor is Slow, and What We're Doing About It
Wi-Fish Finder: Who Will Bite the Bait
Win at Reversing: Tracing and Sandboxing through Inline Hooking
World of Warcraft Subversion
Your Mind: Legal Status, Rights and Securing Yourself