• Royale Ballroom, 1st on right

  • Thursday, July 29
  • Hacking The Future: Weaponizing The Next Generation

    James Arlen, James Costello, Leigh Honeywell, Tim Krabec, Tiffany Rad
    Thu, 13:00 - 15:00
    Royale 6-7-8 - Track 4
  • Friday, July 30
  • Welcome and Making the DEF CON 18 Badge

    Joe Grand, Jeff Moss
    Fri, 10:00 - 11:50
    Royale 6-7-8 - Track 4
  • Build a Lie Detector/Beat a Lie Detector

    Rain
    Fri, 12:00 - 12:50
    Royale 6-7-8 - Track 4
  • How Hackers Won the Zombie Apocalypse

    Dennis Brown
    Fri, 13:00 - 13:50
    Royale 6-7-8 - Track 4
  • Build your own UAV 2.0 - Wireless Mayhem from the Heavens!

    Brad Haines, Mike Kershaw, Michael Weigand
    Fri, 14:00 - 14:50
    Royale 6-7-8 - Track 4
  • Exploiting Digital Cameras

    Oren Isacson, Alfredo Ortega
    Fri, 15:00 - 15:50
    Royale 6-7-8 - Track 4
  • VirGraff101: An Introduction to Virtual Graffiti

    Magen Hughes
    Fri, 16:00 - 16:50
    Royale 6-7-8 - Track 4
  • DCFluX in: Moon-bouncer

    Matt Krick
    Fri, 17:00 - 17:50
    Royale 6-7-8 - Track 4
  • Weaponizing Lady GaGa, Psychosonic Attacks

    Brad Smith
    Fri, 18:00 - 18:50
    Royale 6-7-8 - Track 4
  • Getting Root: Remote Viewing, Non-local Consciousness, Big Picture Hacking, and Knowing Who You Are

    Richard Thieme
    Fri, 19:00 - 19:50
    Royale 6-7-8 - Track 4
  • Live Fire Exercise: Baltic Cyber Shield 2010

    Kenneth Geers
    Fri, 20:00 - 20:50
    Royale 6-7-8 - Track 4
  • Panel: Internet Wars

    John Bumgarner, Daniel Uriah Clemens, Andy Fried, Kenneth Geers, John Ives, Dan Kaminsky, Marcus Sachs, Paul Vixie
    Fri, 21:00 - 21:50
    Royale 6-7-8 - Track 4
  • Saturday, July 31
  • Extreme-range RFID Tracking

    Kristin Paget
    Sat, 10:00 - 10:50
    Royale 6-7-8 - Track 4
  • Jackpotting Automated Teller Machines Redux

    Barnaby Jack
    Sat, 11:00 - 11:50
    Royale 6-7-8 - Track 4
  • Insecurity Engineering of Physical Security Systems: Locks, Lies, and Videotape

    Tobias Bluzmanis, Matt Fiddler, Marc Weber Tobias
    Sat, 12:00 - 12:50
    Royale 6-7-8 - Track 4
  • Bypassing Smart-card Authentication and Blocking Debiting: Vulnerabilities in Atmel Cryptomemory-based Stored-value Systems

    Jonathan Lee, Neil Pahl
    Sat, 13:00 - 13:50
    Royale 6-7-8 - Track 4
  • We Don't Need No Stinkin' Badges: Hacking Electronic Door Access Controllers

    Shawn Merdinger
    Sat, 14:00 - 14:50
    Royale 6-7-8 - Track 4
  • Physical Security : You're Doing It Wrong!

    A.P. Delchi
    Sat, 15:00 - 15:50
    Royale 6-7-8 - Track 4
  • Deceiving the Heavens to Cross the Sea: Using the the 36 stratagems for Social Engineering

    Jayson E. Street
    Sat, 16:00 - 16:50
    Royale 6-7-8 - Track 4
  • Physical Computing, Virtual Security: Adding the Arduino Devel Environment to Your Security Toolbox

    Follower, Leigh Honeywell
    Sat, 17:00 - 17:50
    Royale 6-7-8 - Track 4
  • Hacking with Hardware: Introducing the Universal RF Usb Keboard Emulation Device - URFUKED

    Monta Elkins
    Sat, 18:00 - 18:50
    Royale 6-7-8 - Track 4
  • Programmable HID USB Keystroke Dongle: Using the Teensy as a Pen Testing Device

    Adrian Crenshaw
    Sat, 19:00 - 19:50
    Royale 6-7-8 - Track 4
  • 10,000 Cent Pyramid

     
    Sat, 22:00 - 23:59
    Royale 6-7-8 - Track 4
  • Sunday, August 1
  • Web Services We Just Don't Need

    Mike Bailey
    Sun, 10:00 - 10:50
    Royale 6-7-8 - Track 4
  • IPv6: No Longer Optional

    John Curran
    Sun, 11:00 - 11:50
    Royale 6-7-8 - Track 4
  • Exploitation on ARM - Technique and Bypassing Defense Mechanisms

    Itzhak Avraham
    Sun, 12:00 - 12:50
    Royale 6-7-8 - Track 4
  • Implementing IPv6 at ARIN

    Matt Ryanczak
    Sun, 13:00 - 13:50
    Royale 6-7-8 - Track 4
  • Breaking Bluetooth By Being Bored

    JP Dunning
    Sun, 14:00 - 14:50
    Royale 6-7-8 - Track 4
  • SMART Project: Applying Reliability Metrics to Security Vulnerabilities

    Blake Self, Dolores Zage, Wayne Zage
    Sun, 15:00 - 15:50
    Royale 6-7-8 - Track 4
  • ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically

    Jeongwook Oh
    Sun, 16:00 - 16:50
    Royale 6-7-8 - Track 4
  • Function Hooking for Mac OSX and Linux

    Joe Damato
    Sun, 17:00 - 17:50
    Royale 6-7-8 - Track 4