Royale Ballroom, 1st on right
Hacking The Future: Weaponizing The Next Generation
Welcome and Making the DEF CON 18 Badge
Build a Lie Detector/Beat a Lie Detector
How Hackers Won the Zombie Apocalypse
Build your own UAV 2.0 - Wireless Mayhem from the Heavens!
Exploiting Digital Cameras
VirGraff101: An Introduction to Virtual Graffiti
DCFluX in: Moon-bouncer
Weaponizing Lady GaGa, Psychosonic Attacks
Getting Root: Remote Viewing, Non-local Consciousness, Big Picture Hacking, and Knowing Who You Are
Live Fire Exercise: Baltic Cyber Shield 2010
Panel: Internet Wars
Extreme-range RFID Tracking
Jackpotting Automated Teller Machines Redux
Insecurity Engineering of Physical Security Systems: Locks, Lies, and Videotape
Bypassing Smart-card Authentication and Blocking Debiting: Vulnerabilities in Atmel Cryptomemory-based Stored-value Systems
We Don't Need No Stinkin' Badges: Hacking Electronic Door Access Controllers
Physical Security : You're Doing It Wrong!
Deceiving the Heavens to Cross the Sea: Using the the 36 stratagems for Social Engineering
Physical Computing, Virtual Security: Adding the Arduino Devel Environment to Your Security Toolbox
Hacking with Hardware: Introducing the Universal RF Usb Keboard Emulation Device - URFUKED
Programmable HID USB Keystroke Dongle: Using the Teensy as a Pen Testing Device
10,000 Cent Pyramid
Web Services We Just Don't Need
IPv6: No Longer Optional
Exploitation on ARM - Technique and Bypassing Defense Mechanisms
Implementing IPv6 at ARIN
Breaking Bluetooth By Being Bored
SMART Project: Applying Reliability Metrics to Security Vulnerabilities
ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically
Function Hooking for Mac OSX and Linux