• Thursday, July 30
  • Hardware Black Magic - Building devices with FPGAs

    David Bryan, Rodney McGee
    Thu, 13:00 - 16:00
    Track 3 - Track 3
  • DEF CON 1 - A Personal Account

    Lockheed
    Thu, 16:00 - 17:00
    Track 3 - Track 3
  • Friday, July 31
  • Is your Iphone Pwned? Auditing, Attacking and Defending Mobile Devices

    Rod Beckstrom, jhind, Anthony Lineberry
    Fri, 10:00 - 10:50
    Track 3 - Track 3
  • Jailbreaking and the Law of Reversing

    Grant Jordan, Josh Marks
    Fri, 11:00 - 11:50
    Track 3 - Track 3
  • 0-day, gh0stnet and the inside story of the Adobe JBIG2 vulnerability

    Matt Flick, Jeff Yestrumskas
    Fri, 12:00 - 12:50
    Track 3 - Track 3
  • Hacking WITH the iPod Touch

    Christopher Mooney
    Fri, 13:00 - 13:50
    Track 3 - Track 3
  • Advancing Video Application Attacks with Video Interception, Recording, and Replay

    Rich Mogull
    Fri, 14:00 - 14:50
    Track 3 - Track 3
  • Computer and Internet Security Law - A Year in Review 2008 - 2009

    Danny Quist
    Fri, 15:00 - 15:50
    Track 3 - Track 3
  • Why Tor is Slow, and What We're Doing About It

    Fred von Lohmann
    Fri, 16:00 - 16:50
    Track 3 - Track 3
  • BitTorrent Hacks

    Bruce Potter, Mike Zusman
    Fri, 17:00 - 17:50
    Track 3 - Track 3
  • Attacking Tor at the Application Layer

    Jerry Dixon
    Fri, 18:00 - 18:50
    Track 3 - Track 3
  • 10,000¢ Hacker Pyramid

     
    Fri, 20:00 - 21:00
    Track 3 - Track 3
  • Saturday, August 1
  • Hacker vs. Disasters Large and Small: Hacker Skills for Wilderness and Disaster Survival

    Corentin Chéron, Antoine Gademer
    Sat, 10:00 - 11:50
    Track 3 - Track 3
  • Personal Survival Preparedness

    Justin Searle
    Sat, 12:00 - 12:50
    Track 3 - Track 3
  • Identifying, Exploring, and Predicting Threats in the Russian Hacker Community

    Val Smith
    Sat, 13:00 - 13:50
    Track 3 - Track 3
  • FOE -- Feeding Controversial News to Censored Countries (Without Using Proxy Servers)

    Nick Waite
    Sat, 14:00 - 14:50
    Track 3 - Track 3
  • PLA Information Warfare Development Timeline and Nodal Analysis

    Ryan Anguiano
    Sat, 15:00 - 16:50
    Track 3 - Track 3
  • MSF Telephony

    Michael Ossmann
    Sat, 15:30 - 16:00
    Track 3 - Track 3
  • "I Am Walking Through a City Made of Glass and I Have a Bag Full of Rocks"

    Dmitri Alperovitch
    Sat, 17:00 - 17:50
    Track 3 - Track 3
  • Preparing for Cyber War: Strategy and Force Posture in the Information-Centric World

    Tomer Bitton, Steve Davis, Itzik Kotler, Peter Silberman
    Sat, 18:00 - 20:00
    Track 3 - Track 3
  • Sunday, August 2
  • Managed Code Rootkits - Hooking into Runtime Environments

    Marc Weber Tobias
    Sun, 10:00 - 10:50
    Track 3 - Track 3
  • Win at Reversing: Tracing and Sandboxing through Inline Hooking

    Mike Cooper
    Sun, 11:00 - 11:50
    Track 3 - Track 3
  • Dradis Framework - Sharing Information will get you Root

     
    Sun, 12:00 - 12:50
    Track 3 - Track 3
  • Tactical Fingerprinting Using Metadata, Hidden Info and Lost Data

    Scott Moulton, Marsh Ray
    Sun, 13:00 - 13:50
    Track 3 - Track 3
  • Screen Scraper Tricks: Extracting Data from Difficult Websites

    Antonio Rucci
    Sun, 14:00 - 14:50
    Track 3 - Track 3
  • Dangerous Minds: The Art of Guerrilla Data Mining

    Sandy Clark
    Sun, 15:00 - 15:50
    Track 3 - Track 3
  • Cracking 400,000 Passwords, or How to Explain to Your Roommate why the Power Bill is a Little High…

    Daniel
    Sun, 16:00 - 16:50
    Track 3 - Track 3