• Royale Ballroom, 2nd on right

  • Thursday, July 29
  • The Keys To Running A Successful DEF CON Group By DC612

    Jared Bird, David Bryan
    Thu, 14:00 - 15:00
    Royale 5 - Track 3
  • Friday, July 30
  • How To Get Your FBI File (and Other Information You Want From the Federal Government)

    Marcia Hofmann
    Fri, 10:00 - 10:50
    Royale 5 - Track 3
  • Our Instrumented Lives: Sensors, Sensors, Everywhere...

    Greg Conti
    Fri, 11:00 - 11:50
    Royale 5 - Track 3
  • Your ISP and the Government: Best Friends Forever.

    Christopher Soghoian
    Fri, 12:00 - 12:50
    Royale 5 - Track 3
  • The Law of Laptop Search and Seizure

    Kevin Bankston, Jennifer Granick, Marcia Hofmann, Kurt Opsahl
    Fri, 13:00 - 13:50
    Royale 5 - Track 3
  • Search & Seizure & Golfballs

    Eric Rachner, Jim Rennie
    Fri, 14:00 - 14:50
    Royale 5 - Track 3
  • Exploiting Internet Surveillance Systems

    Decius
    Fri, 15:00 - 15:50
    Royale 5 - Track 3
  • Hacking Facebook Privacy

    Chris Conley
    Fri, 16:00 - 16:50
    Royale 5 - Track 3
  • An Observatory for the SSLiverse

    Jesse Burns, Peter Eckersley
    Fri, 17:00 - 17:50
    Royale 5 - Track 3
  • Bad Memories

    Elie Bursztein, Baptiste Gourdin, Gustav Rydstedt
    Fri, 18:00 - 18:50
    Royale 5 - Track 3
  • FOCA2: The FOCA

    Chema Alonso, Jose Palazon
    Fri, 19:00 - 19:50
    Royale 5 - Track 3
  • Big Brother on the Big Screen: Fact/Fiction?

    Kevin Bankston, Nicole Ozer
    Fri, 20:00 - 20:50
    Royale 5 - Track 3
  • Movie Night - Robogeisha

     
    Fri, 21:00 - 23:00
    Royale 5
  • Saturday, July 31
  • Changing Threats To Privacy: From TIA To Google

    Moxie Marlinspike
    Sat, 10:00 - 10:50
    Royale 5 - Track 3
  • masSEXploitation

    Michael Brooks
    Sat, 11:00 - 11:50
    Royale 5 - Track 3
  • This Needs to be Fixed, and Other Jokes in Commit Statements

    Logan Lodge, Bruce Potter
    Sat, 12:00 - 12:50
    Royale 5 - Track 3
  • Trolling Reverse-Engineers with Math: Ness... It hurts...

    Frank^2
    Sat, 13:00 - 13:50
    Royale 5 - Track 3
  • pyREtic - In-memory Reverse Engineering for Obfuscated Python Bytecode

    Rich Smith
    Sat, 14:00 - 14:50
    Royale 5 - Track 3
  • WPA Too!

    MD Sohail Ahmad
    Sat, 15:00 - 15:50
    Royale 5 - Track 3
  • How to Hack Millions of Routers

    Craig Heffner
    Sat, 16:00 - 16:50
    Royale 5 - Track 3
  • SHacking DOCSIS For Fun and Profit

    bitemytaco, Blake Self
    Sat, 17:00 - 17:50
    Royale 5 - Track 3
  • Advanced Format String Attacks

    Paul Haas
    Sat, 18:00 - 18:50
    Royale 5 - Track 3
  • Connection String Parameter Attacks

    Chema Alonso, Jose Palazon
    Sat, 19:00 - 19:50
    Royale 5 - Track 3
  • Movie Night - REPO: The Genetic Opera

     
    Sat, 21:00 - 23:00
    Royale 5
  • Sunday, August 1
  • Browser Based Defenses

    James Shewmaker
    Sun, 10:00 - 10:50
    Royale 5 - Track 3
  • Constricting the Web: Offensive Python for Web Hackers

    Nathan Hamiel, Marcin Wielgoszewski
    Sun, 11:00 - 11:50
    Royale 5 - Track 3
  • Repelling the Wily Insider

    Matias Madou, Jacob West
    Sun, 12:00 - 12:50
    Royale 5 - Track 3
  • The Anatomy of Drug Testing

    Jimi Fiekert
    Sun, 13:00 - 13:50
    Royale 5 - Track 3
  • A New Approach to Forensic Methodology - !!BUSTED!! Case Studies

    Samuel Petreski, David C. Smith
    Sun, 14:00 - 14:50
    Royale 5 - Track 3
  • Open Source Framework for Advanced Intrusion Detection Solutions

    Patrick Mullen, Ryan Pentney
    Sun, 15:00 - 15:50
    Royale 5 - Track 3
  • Sniper Forensics - One Shot, One Kill

    Christopher E. Pogue
    Sun, 16:00 - 16:50
    Royale 5 - Track 3
  • 0box Analyzer: AfterDark Runtime Forensics for Automated Malware Analysis and Clustering

    Jeremy Chiu, Wayne Huang
    Sun, 17:00 - 17:50
    Royale 5 - Track 3