• 0
  • 0box Analyzer: AfterDark Runtime Forensics for Automated Malware Analysis and Clustering

    Jeremy Chiu, Wayne Huang
    Sun, 17:00 - 17:50
    Royale 5 - Track 3
  • A
  • Advanced Format String Attacks

    Paul Haas
    Sat, 18:00 - 18:50
    Royale 5 - Track 3
  • Air Traffic Control Insecurity 2.0

    Righter Kunkel
    Fri, 15:00 - 15:20
    Grande E-F - Track 5
  • Android Security -- Overview and Potential Issues

    Jon Oberheide, Chris Shutters
    Sat, 12:00 - 13:00
    Skybox 206 - Skytalks
  • A New Approach to Forensic Methodology - !!BUSTED!! Case Studies

    Samuel Petreski, David C. Smith
    Sun, 14:00 - 14:50
    Royale 5 - Track 3
  • An Examination of the Adequacy of the Laws Related to Cyber Warfare

    Dondi West
    Sat, 19:00 - 19:50
    Royale 1 - Track 2
  • An Observatory for the SSLiverse

    Jesse Burns, Peter Eckersley
    Fri, 17:00 - 17:50
    Royale 5 - Track 3
  • Antique Exploitation (aka Terminator 3.1.1 for Workgroups

    Jon Oberheide
    Fri, 19:00 - 19:20
    Grande E-F - Track 5
  • App Attack: Surviving the Mobile Application Explosion

    John Hering, Kevin Mahaffey
    Sat, 11:00 - 11:50
    Royale 2-3-4 - Track 1
  • Attack the Key, Own the Lock

    datagram, Schuyler Towne
    Sun, 11:00 - 11:50
    Royale 2-3-4 - Track 1
  • Awards Ceremonies hosted by Dark Tangent

    Jeff Moss
    Sun, 18:00 - 19:00
     
  • B
  • Bad Memories

    Elie Bursztein, Baptiste Gourdin, Gustav Rydstedt
    Fri, 18:00 - 18:50
    Royale 5 - Track 3
  • Balancing the Pwn Trade Deficit

    Colin Ames, Anthony Lai, Val Smith
    Sun, 11:00 - 11:50
    Royale 1 - Track 2
  • Be A Mentor!

    Marisa Fagan
    Fri, 18:00 - 18:20
    Grande E-F - Track 5
  • Big Brother on the Big Screen: Fact/Fiction?

    Kevin Bankston, Nicole Ozer
    Fri, 20:00 - 20:50
    Royale 5 - Track 3
  • Black Ops Of Fundamental Defense: Web Edition

    Dan Kaminsky
    Fri, 19:00 - 19:50
    Royale 2-3-4 - Track 1
  • Blitzableiter - the Release

    Felix "FX" Lindner
    Sat, 18:00 - 18:50
    Grande E-F - Track 5
  • Breaking Bluetooth By Being Bored

    JP Dunning
    Sun, 14:00 - 14:50
    Royale 6-7-8 - Track 4
  • Browser Based Defenses

    James Shewmaker
    Sun, 10:00 - 10:50
    Royale 5 - Track 3
  • Browser Extension Malware

    Timmay
    Sat, 16:00 - 17:00
    Skybox 206 - Skytalks
  • Build a Lie Detector/Beat a Lie Detector

    Rain
    Fri, 12:00 - 12:50
    Royale 6-7-8 - Track 4
  • Build Your Own Security Operations Center for Little or No Money

    Josh Pyorre
    Sun, 13:00 - 13:50
    Royale 1 - Track 2
  • Build your own UAV 2.0 - Wireless Mayhem from the Heavens!

    Brad Haines, Mike Kershaw, Michael Weigand
    Fri, 14:00 - 14:50
    Royale 6-7-8 - Track 4
  • Bypassing Smart-card Authentication and Blocking Debiting: Vulnerabilities in Atmel Cryptomemory-based Stored-value Systems

    Jonathan Lee, Neil Pahl
    Sat, 13:00 - 13:50
    Royale 6-7-8 - Track 4
  • C
  • Changing Threats To Privacy: From TIA To Google

    Moxie Marlinspike
    Sat, 10:00 - 10:50
    Royale 5 - Track 3
  • ChaosVPN for Playing CTFs

    mc.fly, no_maam, ryd, Vyrus
    Sun, 13:00 - 13:50
    Grande E-F - Track 5
  • Cloud Computing, a Weapon of Mass Destruction?

    Mike Anderson, David Bryan
    Fri, 11:00 - 11:50
    Royale 1 - Track 2
  • Connection String Parameter Attacks

    Chema Alonso, Jose Palazon
    Sat, 19:00 - 19:50
    Royale 5 - Track 3
  • Constricting the Web: Offensive Python for Web Hackers

    Nathan Hamiel, Marcin Wielgoszewski
    Sun, 11:00 - 11:50
    Royale 5 - Track 3
  • Crawling BitTorrent DHTs for Fun

    Scott Wolchok
    Fri, 12:30 - 12:50
    Grande E-F - Track 5
  • Cyber[Crime|War] Charting Dangerous Waters

     
    Sat, 12:00 - 12:50
    Royale 1 - Track 2
  • Cyberterrorism and the Security of the National Drinking Water Infrastructure

    John McNabb
    Sat, 17:00 - 17:50
    Royale 1 - Track 2
  • D
  • DC 18 Movie Night - GET LAMP

    Jason Scott
    Thu, 19:00 - 21:00
    Royale 1 - Track 2
  • DCFluX in: Moon-bouncer

    Matt Krick
    Fri, 17:00 - 17:50
    Royale 6-7-8 - Track 4
  • Deceiving the Heavens to Cross the Sea: Using the the 36 stratagems for Social Engineering

    Jayson E. Street
    Sat, 16:00 - 16:50
    Royale 6-7-8 - Track 4
  • Decoding reCAPTCHA

    Chad Houck
    Sun, 14:00 - 14:50
    Royale 2-3-4 - Track 1
  • DEF CON 101

    Panel
    Thu, 13:00 - 15:00
    Royale 2-3-4 - Track 1
  • Defcon Security Jam III: Now in 3-D?

    Panel
    Sat, 19:00 - 20:50
    Grande E-F - Track 5
  • Determining Fair Value For Your Skills, and Getting It

    Lee Kushner, Mike Murray
    Fri, 15:00 - 16:00
    Skybox 206 - Skytalks
  • DNS Systemic Vulnerabilities and Risk Management: A Discussion

    Rod Beckstrom, Dan Kaminsky, Paul Mockapetris, Ken Silva, Mark Weatherford
    Fri, 12:00 - 12:50
    Royale 2-3-4 - Track 1
  • Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection

    Wayne Huang
    Fri, 18:00 - 18:50
    Royale 1 - Track 2
  • E
  • Electronic Weaponry or How To Rule the World While Shopping at Radio Shack

    TW Otto
    Sun, 12:00 - 12:50
    Grande E-F - Track 5
  • Enough Cyber Talk Already! Help get this Collaboration Engine Running!

    Riley Repko
    Fri, 14:00 - 14:50
    Royale 2-3-4 - Track 1
  • Evilgrade, You Still Have Pending Upgrades?

    Francisco Amato
    Fri, 17:00 - 17:20
    Grande E-F - Track 5
  • Exploitable Assumptions Workshop

    Joe "Crazy" Foley, Eric "Unlocked" Schmiedl, Zoz
    Thu, 13:00 - 15:00
    Capri Room 112 - Capri 112
  • Exploitation on ARM - Technique and Bypassing Defense Mechanisms

    Itzhak Avraham
    Sun, 12:00 - 12:50
    Royale 6-7-8 - Track 4
  • Exploiting Digital Cameras

    Oren Isacson, Alfredo Ortega
    Fri, 15:00 - 15:50
    Royale 6-7-8 - Track 4
  • Exploiting Internet Surveillance Systems

    Decius
    Fri, 15:00 - 15:50
    Royale 5 - Track 3
  • Exploiting SCADA Systems

    Jeremy Brown
    Sat, 10:00 - 10:50
    Royale 1 - Track 2
  • Exploiting WebSphere Application Server's JSP Engine

    Ed Schaller
    Fri, 16:00 - 16:50
    Royale 1 - Track 2
  • ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically

    Jeongwook Oh
    Sun, 16:00 - 16:50
    Royale 6-7-8 - Track 4
  • Extreme-range RFID Tracking

    Kristin Paget
    Sat, 10:00 - 10:50
    Royale 6-7-8 - Track 4
  • F
  • Facial Recognition: Facts, Fiction, and Fsck-ups

    Joshua Marpet
    Sat, 11:00 - 12:00
    Skybox 206 - Skytalks
  • Flame WAR!

    Panel
    Sat, 17:00 - 18:00
    Skybox 206 - Skytalks
  • FOCA2: The FOCA

    Chema Alonso, Jose Palazon
    Fri, 19:00 - 19:50
    Royale 5 - Track 3
  • FOE‚ The Release of Feed Over Email, a Solution to Feed Controversial News to Censored Countries

    Sho Ho
    Fri, 11:30 - 11:50
    Grande E-F - Track 5
  • FPGA Bitstream Reverse Engineering

    Lang Nguyen
    Fri, 15:30 - 15:50
    Grande E-F - Track 5
  • From "No Way" to 0-day: Weaponizing the Unweaponizable

    Joshua Wise
    Sat, 13:00 - 13:50
    Grande E-F - Track 5
  • Function Hooking for Mac OSX and Linux

    Joe Damato
    Sun, 17:00 - 17:50
    Royale 6-7-8 - Track 4
  • Fun with VxWorks

    HD Moore
    Sat, 14:00 - 15:00
    Skybox 206 - Skytalks
  • G
  • Gaming in the Glass Safe - Games, DRM and Privacy

    Ferdinand Schober
    Sun, 16:00 - 16:50
    Grande E-F - Track 5
  • Getting Root: Remote Viewing, Non-local Consciousness, Big Picture Hacking, and Knowing Who You Are

    Richard Thieme
    Fri, 19:00 - 19:50
    Royale 6-7-8 - Track 4
  • Getting Social with the Smart Grid

    Tony Flick, Justin Morehouse
    Sun, 17:00 - 17:50
    Royale 2-3-4 - Track 1
  • Go Go Gadget Python! : Introduction to Hardware Hacking

    Furkan Cayci, Nick Waite
    Thu, 13:00 - 14:00
    Capri Room 111 - Capri 111
  • Google Toolbar: The NARC Within

    Jeff Bryner
    Fri, 12:00 - 12:20
    Grande E-F - Track 5
  • H
  • Hacking and Protecting Oracle Database Vault

    Esteban Martínez Fayó
    Fri, 19:00 - 19:50
    Royale 1 - Track 2
  • Hacking Facebook Privacy

    Chris Conley
    Fri, 16:00 - 16:50
    Royale 5 - Track 3
  • Hacking .Net Applications: A Dynamic Attack

    Jon McCoy
    Sat, 17:00 - 17:50
    Grande E-F - Track 5
  • Hacking Oracle From Web Apps

    Sumit Siddharth
    Fri, 17:00 - 17:50
    Royale 1 - Track 2
  • Hacking The Future: Weaponizing The Next Generation

    James Arlen, James Costello, Leigh Honeywell, Tim Krabec, Tiffany Rad
    Thu, 13:00 - 15:00
    Royale 6-7-8 - Track 4
  • Hacking with Hardware: Introducing the Universal RF Usb Keboard Emulation Device - URFUKED

    Monta Elkins
    Sat, 18:00 - 18:50
    Royale 6-7-8 - Track 4
  • Hacrypanalsys -- RSA

    Alek Amrani
    Fri, 11:00 - 12:00
    Skybox 206 - Skytalks
  • Hardware Black Magic: Designing Printed Circuit Boards

    Stephen Janansky, Dr. Fouad Kiamilev, Corey 'c0re' Lange
    Thu, 13:00 - 16:00
    Capri Room 113 - Capri 113
  • Hardware Hacking for Software Guys

    Dave King
    Sun, 11:00 - 11:50
    Grande E-F - Track 5
  • HD Voice - The Overdue Revolution

    Doug Mohney
    Sat, 14:00 - 14:50
    Royale 2-3-4 - Track 1
  • How Hackers Won the Zombie Apocalypse

    Dennis Brown
    Fri, 13:00 - 13:50
    Royale 6-7-8 - Track 4
  • How I Met Your Girlfriend

    Samy Kamkar
    Sun, 13:00 - 13:50
    Royale 2-3-4 - Track 1
  • How To Get Your FBI File (and Other Information You Want From the Federal Government)

    Marcia Hofmann
    Fri, 10:00 - 10:50
    Royale 5 - Track 3
  • How to Hack Millions of Routers

    Craig Heffner
    Sat, 16:00 - 16:50
    Royale 5 - Track 3
  • How to Pwn an ISP in 10 Minutes or less

    Michael Schearer
    Fri, 13:00 - 14:00
    Skybox 206 - Skytalks
  • How Unique Is Your Browser?

    Peter Eckersley
    Fri, 12:00 - 12:50
    Royale 1 - Track 2
  • I
  • I know where your credit card is...

    Bruno Gonçalves de Oliveira
    Sun, 10:00 - 11:00
    Skybox 206 - Skytalks
  • Implementing IPv6 at ARIN

    Matt Ryanczak
    Sun, 13:00 - 13:50
    Royale 6-7-8 - Track 4
  • Improving Antivirus Scanner Accuracy with Hypervisor Based Analysis

    Danny Quist
    Sat, 10:00 - 10:50
    Grande E-F - Track 5
  • Industrial Cyber Security

    Paul Malkewicz, J. Novak, Wade Polk
    Sat, 20:00 - 20:50
    Royale 1 - Track 2
  • Insecurity Engineering of Physical Security Systems: Locks, Lies, and Videotape

    Tobias Bluzmanis, Matt Fiddler, Marc Weber Tobias
    Sat, 12:00 - 12:50
    Royale 6-7-8 - Track 4
  • IPv6: No Longer Optional

    John Curran
    Sun, 11:00 - 11:50
    Royale 6-7-8 - Track 4
  • J
  • Jackpotting Automated Teller Machines Redux

    Barnaby Jack
    Sat, 11:00 - 11:50
    Royale 6-7-8 - Track 4
  • K
  • Kartograph : Finding a Needle in a Haystack or How to Apply Reverse Engineering Techniques to Cheat at Video Games

    Dan Boneh, Elie Bursztein, Jocelyn Lagarenne
    Sun, 15:00 - 15:50
    Grande E-F - Track 5
  • Katana: Portable Multi-Boot Security Suite

    JP Dunning
    Sat, 12:00 - 12:50
    Grande E-F - Track 5
  • Keynote

    Top Secret
    Fri, 10:00 - 10:50
    Royale 2-3-4 - Track 1
  • Kim Jong-il and Me: How to Build a Cyber Army to Defeat the U.S.

    Charlie Miller
    Sat, 11:00 - 11:50
    Royale 1 - Track 2
  • L
  • Legal Developments in Hardware Hacking

    Jennifer Granick
    Sat, 10:00 - 10:50
    Royale 2-3-4 - Track 1
  • Letting the Air Out of Tire Pressure Monitoring Systems

    Mike Metzger
    Fri, 16:30 - 16:50
    Grande E-F - Track 5
  • Like a Boss: Attacking JBoss

    Tyler Krpata
    Fri, 16:00 - 16:20
    Grande E-F - Track 5
  • Live Fire Exercise: Baltic Cyber Shield 2010

    Kenneth Geers
    Fri, 20:00 - 20:50
    Royale 6-7-8 - Track 4
  • Lord of the Bing: Taking Back Search Engine Hacking from Google and Bing

    Francis Brown, Rob Ragan
    Fri, 14:00 - 14:50
    Royale 1 - Track 2
  • M
  • Malware Freak Show 2: The Client-Side Boogaloo

    Jibran Ilyas, Nicholas J. Percoco
    Sat, 16:00 - 16:50
    Grande E-F - Track 5
  • Malware Migrating To Gaming Consoles: Embedded Devices, An Antivirus-Free Safe Hideout For Malware

    Ki-Chan Ahn, Dong-Joo Ha
    Sat, 14:00 - 14:50
    Grande E-F - Track 5
  • masSEXploitation

    Michael Brooks
    Sat, 11:00 - 11:50
    Royale 5 - Track 3
  • Mastering the Nmap Scripting Engine

    David Fifield, Fyodor
    Fri, 17:00 - 17:50
    Royale 2-3-4 - Track 1
  • Meet the EFF

    Kevin Bankston, Eva Galperin, Jennifer Granick, Marcia Hofmann, Kurt Opsahl
    Fri, 18:00 - 18:50
    Royale 2-3-4 - Track 1
  • Meet the Feds - CSI:TCP/IP

    Panel
    Fri, 11:00 - 11:50
    Royale 2-3-4 - Track 1
  • Meet the Feds - Policy, Privacy, Deterrence and Cyber War

    Fed Policy, Privacy Panel
    Fri, 13:00 - 13:50
    Royale 2-3-4 - Track 1
  • Mobile Privacy: Tor on the iPhone and Other Unusual Devices

    Marco Bonetti
    Sat, 16:00 - 16:50
    Royale 2-3-4 - Track 1
  • Multiplayer Metasploit -- Double Penetration Made Easy

    Ryan Linn
    Sat, 13:00 - 14:00
    Skybox 206 - Skytalks
  • Multiplayer Metasploit: Tag-Team Penetration and Information Gathering

    Ryan Linn
    Sun, 10:00 - 10:50
    Royale 1 - Track 2
  • My Life As A Spyware Developer

    Garry Pejski
    Sat, 15:00 - 15:50
    Grande E-F - Track 5
  • O
  • oCTF: 5 years in 50 minutes

    DC-949
    Fri, 10:00 - 10:50
    Grande E-F - Track 5
  • Of Bytes and Bullets

    Panel
    Fri, 16:00 - 16:50
    Royale 2-3-4 - Track 1
  • Open Letter - Call to Action

     
    Fri, 15:00 - 15:50
    Royale 2-3-4 - Track 1
  • Open Public Sensors and Trend Monitoring

    Daniel Burroughs
    Fri, 11:00 - 11:20
    Grande E-F - Track 5
  • Open Source Framework for Advanced Intrusion Detection Solutions

    Patrick Mullen, Ryan Pentney
    Sun, 15:00 - 15:50
    Royale 5 - Track 3
  • Operating System Fingerprinting for Virtual Machines

    Nguyen Anh Quynh
    Fri, 13:30 - 13:50
    Grande E-F - Track 5
  • Our Instrumented Lives: Sensors, Sensors, Everywhere...

    Greg Conti
    Fri, 11:00 - 11:50
    Royale 5 - Track 3
  • P
  • Panel: Internet Wars

    John Bumgarner, Daniel Uriah Clemens, Andy Fried, Kenneth Geers, John Ives, Dan Kaminsky, Marcus Sachs, Paul Vixie
    Fri, 21:00 - 21:50
    Royale 6-7-8 - Track 4
  • PCI, Compromising Controls and Compromising Security

    Jack Daniel
    Sun, 12:00 - 12:50
    Royale 2-3-4 - Track 1
  • Physical Computing, Virtual Security: Adding the Arduino Devel Environment to Your Security Toolbox

    Follower, Leigh Honeywell
    Sat, 17:00 - 17:50
    Royale 6-7-8 - Track 4
  • Physical Security : You're Doing It Wrong!

    A.P. Delchi
    Sat, 15:00 - 15:50
    Royale 6-7-8 - Track 4
  • Powershell...omfg

    Joshua Kelley, David Kennedy
    Sun, 12:00 - 12:50
    Royale 1 - Track 2
  • Practical Cellphone Spying

    Kristin Paget
    Sat, 13:00 - 13:50
    Royale 2-3-4 - Track 1
  • Programmable HID USB Keystroke Dongle: Using the Teensy as a Pen Testing Device

    Adrian Crenshaw
    Sat, 19:00 - 19:50
    Royale 6-7-8 - Track 4
  • Protecting Your Ass(etts)

    Tim Krabec
    Fri, 14:00 - 15:00
    Skybox 206 - Skytalks
  • Pwned By The Owner: What Happens When You Steal A Hacker's Computer

    Zoz
    Fri, 19:30 - 19:50
    Grande E-F - Track 5
  • pyREtic - In-memory Reverse Engineering for Obfuscated Python Bytecode

    Rich Smith
    Sat, 14:00 - 14:50
    Royale 5 - Track 3
  • R
  • Repelling the Wily Insider

    Matias Madou, Jacob West
    Sun, 12:00 - 12:50
    Royale 5 - Track 3
  • Resilient Botnet Command and Control with Tor

    Dennis Brown
    Sat, 17:00 - 17:50
    Royale 2-3-4 - Track 1
  • Ripping Media Off Of the Wire

    HONEY
    Sat, 18:00 - 18:50
    Royale 2-3-4 - Track 1
  • Roman Profiles: The Six Mistakes

    Eric Smith
    Sun, 13:00 - 14:00
    Skybox 206 - Skytalks
  • S
  • SCADA and ICS for Security Experts: How to Avoid Cyberdouchery

    James Arlen
    Sat, 15:00 - 15:50
    Royale 1 - Track 2
  • SCADA != SCARY!

    Mike Guthrie
    Fri, 16:00 - 17:00
    Skybox 206 - Skytalks
  • Searching for Malware: A Review of Attackers’ Use of Search Engines to Lure Victims

    David Maynor
    Sat, 11:00 - 11:50
    Grande E-F - Track 5
  • Search & Seizure & Golfballs

    Eric Rachner, Jim Rennie
    Fri, 14:00 - 14:50
    Royale 5 - Track 3
  • Seccubus - Analyzing vulnerability assessment data the easy way...

    Frank Breedijk
    Sun, 14:00 - 14:50
    Royale 1 - Track 2
  • Securing MMOs: A Security Professional's View From the Inside

    metr0
    Sun, 17:00 - 17:50
    Grande E-F - Track 5
  • SHacking DOCSIS For Fun and Profit

    bitemytaco, Blake Self
    Sat, 17:00 - 17:50
    Royale 5 - Track 3
  • SHODAN for Penetration Testers

    Michael Schearer
    Sun, 17:00 - 17:50
    Royale 1 - Track 2
  • SIE Passive DNS and the ISC DNS Database

    Paul Vixie
    Fri, 10:00 - 10:50
    Royale 1 - Track 2
  • Silence of the RAM

    Sean Bodmer
    Fri, 12:00 - 13:00
    Skybox 206 - Skytalks
  • SMART Project: Applying Reliability Metrics to Security Vulnerabilities

    Blake Self, Dolores Zage, Wayne Zage
    Sun, 15:00 - 15:50
    Royale 6-7-8 - Track 4
  • Sniper Forensics - One Shot, One Kill

    Christopher E. Pogue
    Sun, 16:00 - 16:50
    Royale 5 - Track 3
  • Social Engineering and Target Profiling with 100% Accuracy

    Dave Marcus
    Sun, 12:00 - 13:00
    Skybox 206 - Skytalks
  • Social Networking Special Ops: Extending Data Visualization Tools for Faster Pwnage

    The Suggmeister
    Sun, 16:00 - 16:50
    Royale 2-3-4 - Track 1
  • So Many Ways to Slap A Yo-Ho:: Xploiting Yoville and Facebook for Fun and Profit

    strace
    Sun, 15:00 - 15:50
    Royale 2-3-4 - Track 1
  • Story Time

    Panel
    Sun, 16:00 - 17:00
    Skybox 206 - Skytalks
  • T
  • Tales from the Crypto

    G. Mark Hardy
    Fri, 15:00 - 15:50
    Royale 1 - Track 2
  • TBA

    Aphelia
    Sat, 10:00 - 11:00
    Skybox 206 - Skytalks
  • TBA

    Yeti
    Sun, 15:00 - 16:00
    Skybox 206 - Skytalks
  • The Anatomy of Drug Testing

    Jimi Fiekert
    Sun, 13:00 - 13:50
    Royale 5 - Track 3
  • The Chinese Cyber Army - An Archaeological Study from 2001 to 2010

    Wayne Huang, Jack Yu
    Sat, 18:00 - 18:50
    Royale 1 - Track 2
  • The Games We Play

    Brandon Nesbit
    Sun, 14:00 - 14:50
    Grande E-F - Track 5
  • The Keys To Running A Successful DEF CON Group By DC612

    Jared Bird, David Bryan
    Thu, 14:00 - 15:00
    Royale 5 - Track 3
  • The Law of Laptop Search and Seizure

    Kevin Bankston, Jennifer Granick, Marcia Hofmann, Kurt Opsahl
    Fri, 13:00 - 13:50
    Royale 5 - Track 3
  • The Night The Lights Went Out In Vegas: Demystifying Smartmeter Networks

    Garret Picchioni, Barrett Weisshaar
    Sat, 16:00 - 16:50
    Royale 1 - Track 2
  • The Power of Chinese Security

    Jake Appelbaum, Anthony Lai, Jon Oberheide
    Sat, 13:00 - 13:50
    Royale 1 - Track 2
  • The Rise of Idiocracy

    Onlychick
    Fri, 10:00 - 11:00
    Skybox 206 - Skytalks
  • The Search for Perfect Handcuffs... and the Perfect Handcuff Key

    Deviant Ollam
    Sun, 10:00 - 10:50
    Royale 2-3-4 - Track 1
  • These Aren't the Permissions You're Looking For

    Anthony Lineberry, David Richardson, Sr., Timothy Wyatt
    Sat, 15:00 - 15:50
    Royale 2-3-4 - Track 1
  • This is not the droid you're looking for...

    Christian Papathanasiou, Nicholas J. Percoco
    Sat, 12:00 - 12:50
    Royale 2-3-4 - Track 1
  • This Needs to be Fixed, and Other Jokes in Commit Statements

    Logan Lodge, Bruce Potter
    Sat, 12:00 - 12:50
    Royale 5 - Track 3
  • Token Kidnapping's Revenge

    Cesar Cerrudo
    Fri, 13:00 - 13:50
    Royale 1 - Track 2
  • Toolsmithing an IDA Bridge, Case Study For Building A Reverse Engineering Tool"

    Adam Pridgen
    Sun, 15:00 - 15:50
    Royale 1 - Track 2
  • Training the Next Generation of Hardware Hackers -- Teaching Computer Organization and Assembly Language Hands-on with Embedded Systems

    Dr. Gerald Kane, Andrew Kongs
    Fri, 17:30 - 17:50
    Grande E-F - Track 5
  • Trolling Reverse-Engineers with Math: Ness... It hurts...

    Frank^2
    Sat, 13:00 - 13:50
    Royale 5 - Track 3
  • V
  • VirGraff101: An Introduction to Virtual Graffiti

    Magen Hughes
    Fri, 16:00 - 16:50
    Royale 6-7-8 - Track 4
  • W
  • Wardriving the Smart Grid: Practical Approaches to Attacking Utility Packet Radios

    Nathan Keltner, Shawn Moyer
    Sat, 14:00 - 14:50
    Royale 1 - Track 2
  • Weaponizing Lady GaGa, Psychosonic Attacks

    Brad Smith
    Fri, 18:00 - 18:50
    Royale 6-7-8 - Track 4
  • Web Application Fingerprinting with

    Patrick Thomas
    Fri, 14:00 - 14:20
    Grande E-F - Track 5
  • Web Services We Just Don't Need

    Mike Bailey
    Sun, 10:00 - 10:50
    Royale 6-7-8 - Track 4
  • We Don't Need No Stinkin' Badges: Hacking Electronic Door Access Controllers

    Shawn Merdinger
    Sat, 14:00 - 14:50
    Royale 6-7-8 - Track 4
  • Welcome and Making the DEF CON 18 Badge

    Joe Grand, Jeff Moss
    Fri, 10:00 - 11:50
    Royale 6-7-8 - Track 4
  • What you lookin' at...Punk.

    Chris Nickerson
    Sat, 15:00 - 16:00
    Skybox 206 - Skytalks
  • Who Cares About IPv6?

    Sam Bowne
    Fri, 13:00 - 13:20
    Grande E-F - Track 5
  • Why Security People Suck

    Gene Bransfield
    Sun, 11:00 - 12:00
    Skybox 206 - Skytalks
  • WiMAX Hacking 2010

    aSMig, Goldy, Pierce
    Sun, 10:00 - 10:50
    Grande E-F - Track 5
  • Winning Risky Internet Games

    Victor Teissler
    Fri, 17:00 - 18:00
    Skybox 206 - Skytalks
  • WPA Too!

    MD Sohail Ahmad
    Sat, 15:00 - 15:50
    Royale 5 - Track 3
  • WRT54-TM, Media Center and Network Sniffer

    John A. Colley
    Fri, 14:30 - 14:50
    Grande E-F - Track 5
  • Y
  • Your Boss is a Douchebag... How About You?

    Luiz Eduardo
    Fri, 18:30 - 18:50
    Grande E-F - Track 5
  • You're Stealing It Wrong! 30 Years of Inter-Pirate Battles

    Jason Scott
    Sat, 19:00 - 19:50
    Royale 2-3-4 - Track 1
  • Your ISP and the Government: Best Friends Forever.

    Christopher Soghoian
    Fri, 12:00 - 12:50
    Royale 5 - Track 3
  • You Spent All That Money And You Still Got Owned...

    Joseph McCray
    Sun, 16:00 - 16:50
    Royale 1 - Track 2
  • You want me to let you do WHAT!

    John B. Hoopes
    Sun, 14:00 - 15:00
    Skybox 206 - Skytalks