Grande Balloom, 2nd on right
oCTF: 5 years in 50 minutes
Open Public Sensors and Trend Monitoring
FOE‚ The Release of Feed Over Email, a Solution to Feed Controversial News to Censored Countries
Google Toolbar: The NARC Within
Crawling BitTorrent DHTs for Fun
Who Cares About IPv6?
Operating System Fingerprinting for Virtual Machines
Web Application Fingerprinting with
WRT54-TM, Media Center and Network Sniffer
Air Traffic Control Insecurity 2.0
FPGA Bitstream Reverse Engineering
Like a Boss: Attacking JBoss
Letting the Air Out of Tire Pressure Monitoring Systems
Evilgrade, You Still Have Pending Upgrades?
Training the Next Generation of Hardware Hackers -- Teaching Computer Organization and Assembly Language Hands-on with Embedded Systems
Be A Mentor!
Your Boss is a Douchebag... How About You?
Antique Exploitation (aka Terminator 3.1.1 for Workgroups
Pwned By The Owner: What Happens When You Steal A Hacker's Computer
Improving Antivirus Scanner Accuracy with Hypervisor Based Analysis
Searching for Malware: A Review of Attackers’ Use of Search Engines to Lure Victims
Katana: Portable Multi-Boot Security Suite
From "No Way" to 0-day: Weaponizing the Unweaponizable
Malware Migrating To Gaming Consoles: Embedded Devices, An Antivirus-Free Safe Hideout For Malware
My Life As A Spyware Developer
Malware Freak Show 2: The Client-Side Boogaloo
Hacking .Net Applications: A Dynamic Attack
Blitzableiter - the Release
Defcon Security Jam III: Now in 3-D?
WiMAX Hacking 2010
Hardware Hacking for Software Guys
Electronic Weaponry or How To Rule the World While Shopping at Radio Shack
ChaosVPN for Playing CTFs
The Games We Play
Kartograph : Finding a Needle in a Haystack or How to Apply Reverse Engineering Techniques to Cheat at Video Games
Gaming in the Glass Safe - Games, DRM and Privacy
Securing MMOs: A Security Professional's View From the Inside