• Royale Ballroom, 1st on left

  • Thursday, July 29
  • DEF CON 101

    Panel
    Thu, 13:00 - 15:00
    Royale 2-3-4 - Track 1
  • Friday, July 30
  • Keynote

    Top Secret
    Fri, 10:00 - 10:50
    Royale 2-3-4 - Track 1
  • Meet the Feds - CSI:TCP/IP

    Panel
    Fri, 11:00 - 11:50
    Royale 2-3-4 - Track 1
  • DNS Systemic Vulnerabilities and Risk Management: A Discussion

    Rod Beckstrom, Dan Kaminsky, Paul Mockapetris, Ken Silva, Mark Weatherford
    Fri, 12:00 - 12:50
    Royale 2-3-4 - Track 1
  • Meet the Feds - Policy, Privacy, Deterrence and Cyber War

    Fed Policy, Privacy Panel
    Fri, 13:00 - 13:50
    Royale 2-3-4 - Track 1
  • Enough Cyber Talk Already! Help get this Collaboration Engine Running!

    Riley Repko
    Fri, 14:00 - 14:50
    Royale 2-3-4 - Track 1
  • Open Letter - Call to Action

     
    Fri, 15:00 - 15:50
    Royale 2-3-4 - Track 1
  • Of Bytes and Bullets

    Panel
    Fri, 16:00 - 16:50
    Royale 2-3-4 - Track 1
  • Mastering the Nmap Scripting Engine

    David Fifield, Fyodor
    Fri, 17:00 - 17:50
    Royale 2-3-4 - Track 1
  • Meet the EFF

    Kevin Bankston, Eva Galperin, Jennifer Granick, Marcia Hofmann, Kurt Opsahl
    Fri, 18:00 - 18:50
    Royale 2-3-4 - Track 1
  • Black Ops Of Fundamental Defense: Web Edition

    Dan Kaminsky
    Fri, 19:00 - 19:50
    Royale 2-3-4 - Track 1
  • Saturday, July 31
  • Legal Developments in Hardware Hacking

    Jennifer Granick
    Sat, 10:00 - 10:50
    Royale 2-3-4 - Track 1
  • App Attack: Surviving the Mobile Application Explosion

    John Hering, Kevin Mahaffey
    Sat, 11:00 - 11:50
    Royale 2-3-4 - Track 1
  • This is not the droid you're looking for...

    Christian Papathanasiou, Nicholas J. Percoco
    Sat, 12:00 - 12:50
    Royale 2-3-4 - Track 1
  • Practical Cellphone Spying

    Kristin Paget
    Sat, 13:00 - 13:50
    Royale 2-3-4 - Track 1
  • HD Voice - The Overdue Revolution

    Doug Mohney
    Sat, 14:00 - 14:50
    Royale 2-3-4 - Track 1
  • These Aren't the Permissions You're Looking For

    Anthony Lineberry, David Richardson, Sr., Timothy Wyatt
    Sat, 15:00 - 15:50
    Royale 2-3-4 - Track 1
  • Mobile Privacy: Tor on the iPhone and Other Unusual Devices

    Marco Bonetti
    Sat, 16:00 - 16:50
    Royale 2-3-4 - Track 1
  • Resilient Botnet Command and Control with Tor

    Dennis Brown
    Sat, 17:00 - 17:50
    Royale 2-3-4 - Track 1
  • Ripping Media Off Of the Wire

    HONEY
    Sat, 18:00 - 18:50
    Royale 2-3-4 - Track 1
  • You're Stealing It Wrong! 30 Years of Inter-Pirate Battles

    Jason Scott
    Sat, 19:00 - 19:50
    Royale 2-3-4 - Track 1
  • Hacker Jeopardy

     
    Sat, 22:00 - 23:59
    Royale 2-3-4 - Track 1
  • Sunday, August 1
  • The Search for Perfect Handcuffs... and the Perfect Handcuff Key

    Deviant Ollam
    Sun, 10:00 - 10:50
    Royale 2-3-4 - Track 1
  • Attack the Key, Own the Lock

    datagram, Schuyler Towne
    Sun, 11:00 - 11:50
    Royale 2-3-4 - Track 1
  • PCI, Compromising Controls and Compromising Security

    Jack Daniel
    Sun, 12:00 - 12:50
    Royale 2-3-4 - Track 1
  • How I Met Your Girlfriend

    Samy Kamkar
    Sun, 13:00 - 13:50
    Royale 2-3-4 - Track 1
  • Decoding reCAPTCHA

    Chad Houck
    Sun, 14:00 - 14:50
    Royale 2-3-4 - Track 1
  • So Many Ways to Slap A Yo-Ho:: Xploiting Yoville and Facebook for Fun and Profit

    strace
    Sun, 15:00 - 15:50
    Royale 2-3-4 - Track 1
  • Social Networking Special Ops: Extending Data Visualization Tools for Faster Pwnage

    The Suggmeister
    Sun, 16:00 - 16:50
    Royale 2-3-4 - Track 1
  • Getting Social with the Smart Grid

    Tony Flick, Justin Morehouse
    Sun, 17:00 - 17:50
    Royale 2-3-4 - Track 1