• Thursday, July 30
  • Hacking with GNURadio

    David Bryan
    Thu, 13:00 - 15:00
    Track 4 - Track 4
  • Hacking the Apple TV and Where your Forensic Data Lives

    Rob DeGulielmo, Randy Robbins
    Thu, 15:00 - 17:00
    Track 4 - Track 4
  • Friday, July 31
  • Beckstrom's Law - A Model for Valuing Networks and Security

    Efstratios L. Gavas
    Fri, 10:00 - 10:50
    Track 4 - Track 4
  • Is That You, Baby, or Just a Bridge in the Sky?

    Rob Rehrig
    Fri, 11:00 - 23:59
    Track 4 - Track 4
  • Death of Anonymous Travel

    Moxie Marlinspike
    Fri, 12:00 - 13:50
    Track 4 - Track 4
  • Defcon Security Jam 2: The Fails Keep on Coming

    Brandon Dixon, Robert Hansen, Michael Ligh, David Maynor, Larry Pesce, Matthew Richard
    Fri, 14:00 - 15:50
    Track 4 - Track 4
  • Ask EFF: The Year in Digital Civil Liberties

    Peter Eckersley, Marcia Hofmann, Jibran Ilyas, Grant Jordan, Josh Marks, Nicholas J. Percoco
    Fri, 16:00 - 17:50
    Track 4 - Track 4
  • Meet the Feds 2009

    Jake Appelbaum, Andy Fried, Greg Garcia, John Garris, Efstratios L. Gavas, Travis Goodspeed, Barry Grundy, John Hering, Bob Hopper, Jon Idonisi, Dan Kaminsky, Mischel Kwon, Kevin Manson, Rich Marshall, Ken Privette, Richard Thieme, Stephane Turgeon, Jamie Turner, Dr. Linton Wells II
    Fri, 18:00 - 19:50
    Track 4 - Track 4
  • Saturday, August 1
  • Weaponizing the Web: New Attacks on User-generated Content

    Mike Bailey, Russ McRee
    Sat, 10:00 - 10:50
    Track 4 - Track 4
  • CSRF: Yeah, It Still Works

    Sean Boyce, David Rook
    Sat, 11:00 - 11:50
    Track 4 - Track 4
  • The security risks of Web 2.0

    Frank DiMaggio
    Sat, 12:00 - 12:50
    Track 4 - Track 4
  • Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers

    Colin Ames, Sho Ho, David Kerb
    Sat, 13:00 - 13:50
    Track 4 - Track 4
  • Abusing Firefox Addons

    Sam Bowne, TK234
    Sat, 14:00 - 14:50
    Track 4 - Track 4
  • Hijacking Web 2.0 Sites with SSLstrip--Hands-on Training

    Anonymous Speaker
    Sat, 15:00 - 15:50
    Track 4 - Track 4
  • Hadoop: Apache's Open Source Implementation of Google's MapReduce Framework

    Haroon Meer, Jayson E. Street
    Sat, 16:00 - 16:50
    Track 4 - Track 4
  • Clobbering the Cloud

    Marcus Sachs, Phyllis Schneck, Ed Skoudis
    Sat, 17:00 - 17:50
    Track 4 - Track 4
  • The Middler 2.0: It's Not Just for Web Apps Anymore

    Endgrain, David Kerb
    Sat, 18:00 - 18:50
    Track 4 - Track 4
  • Sunday, August 2
  • Down the Rabbit Hole: Uncovering a Criminal Server

    Matt Fiddler
    Sun, 10:00 - 10:50
    Track 4 - Track 4
  • Invisible Access: Electronic Access Control, Audit Trails and "High Security"

    Michael L. Davis, etd, Magen Hughes
    Sun, 11:00 - 11:50
    Track 4 - Track 4
  • Who Invented the Proximity Card?

    Damian Finol
    Sun, 12:00 - 12:50
    Track 4 - Track 4
  • Lockpicking Forensics

    Beth
    Sun, 13:00 - 13:50
    Track 4 - Track 4
  • RAID Recovery: Recover your PORN by Sight and Sound

    Rafael Dominguez Vega
    Sun, 14:00 - 14:50
    Track 4 - Track 4
  • Protecting Against and Investigating Insider Threats (A methodical, multi-pronged approach to protecting your organization)

    Matt Blaze
    Sun, 15:00 - 15:50
    Track 4 - Track 4
  • The Psychology of Security Unusability

    Ben Sangster
    Sun, 16:00 - 16:50
    Track 4 - Track 4