0box Analyzer: AfterDark Runtime Forensics for Automated Malware Analysis and Clustering
Advanced Format String Attacks
Air Traffic Control Insecurity 2.0
Android Security -- Overview and Potential Issues
A New Approach to Forensic Methodology - !!BUSTED!! Case Studies
An Examination of the Adequacy of the Laws Related to Cyber Warfare
An Observatory for the SSLiverse
Antique Exploitation (aka Terminator 3.1.1 for Workgroups
App Attack: Surviving the Mobile Application Explosion
Attack the Key, Own the Lock
Awards Ceremonies hosted by Dark Tangent
Bad Memories
Balancing the Pwn Trade Deficit
Be A Mentor!
Big Brother on the Big Screen: Fact/Fiction?
Black Ops Of Fundamental Defense: Web Edition
Blitzableiter - the Release
Breaking Bluetooth By Being Bored
Browser Based Defenses
Browser Extension Malware
Build a Lie Detector/Beat a Lie Detector
Build Your Own Security Operations Center for Little or No Money
Build your own UAV 2.0 - Wireless Mayhem from the Heavens!
Bypassing Smart-card Authentication and Blocking Debiting: Vulnerabilities in Atmel Cryptomemory-based Stored-value Systems
Changing Threats To Privacy: From TIA To Google
ChaosVPN for Playing CTFs
Cloud Computing, a Weapon of Mass Destruction?
Connection String Parameter Attacks
Constricting the Web: Offensive Python for Web Hackers
Crawling BitTorrent DHTs for Fun
Cyber[Crime|War] Charting Dangerous Waters
Cyberterrorism and the Security of the National Drinking Water Infrastructure
DC 18 Movie Night - GET LAMP
DCFluX in: Moon-bouncer
Deceiving the Heavens to Cross the Sea: Using the the 36 stratagems for Social Engineering
Decoding reCAPTCHA
DEF CON 101
Defcon Security Jam III: Now in 3-D?
Determining Fair Value For Your Skills, and Getting It
DNS Systemic Vulnerabilities and Risk Management: A Discussion
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Electronic Weaponry or How To Rule the World While Shopping at Radio Shack
Enough Cyber Talk Already! Help get this Collaboration Engine Running!
Evilgrade, You Still Have Pending Upgrades?
Exploitable Assumptions Workshop
Exploitation on ARM - Technique and Bypassing Defense Mechanisms
Exploiting Digital Cameras
Exploiting Internet Surveillance Systems
Exploiting SCADA Systems
Exploiting WebSphere Application Server's JSP Engine
ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically
Extreme-range RFID Tracking
Facial Recognition: Facts, Fiction, and Fsck-ups
Flame WAR!
FOCA2: The FOCA
FOE‚ The Release of Feed Over Email, a Solution to Feed Controversial News to Censored Countries
FPGA Bitstream Reverse Engineering
From "No Way" to 0-day: Weaponizing the Unweaponizable
Function Hooking for Mac OSX and Linux
Fun with VxWorks
Gaming in the Glass Safe - Games, DRM and Privacy
Getting Root: Remote Viewing, Non-local Consciousness, Big Picture Hacking, and Knowing Who You Are
Getting Social with the Smart Grid
Go Go Gadget Python! : Introduction to Hardware Hacking
Google Toolbar: The NARC Within
Hacking and Protecting Oracle Database Vault
Hacking Facebook Privacy
Hacking .Net Applications: A Dynamic Attack
Hacking Oracle From Web Apps
Hacking The Future: Weaponizing The Next Generation
Hacking with Hardware: Introducing the Universal RF Usb Keboard Emulation Device - URFUKED
Hacrypanalsys -- RSA
Hardware Black Magic: Designing Printed Circuit Boards
Hardware Hacking for Software Guys
HD Voice - The Overdue Revolution
How Hackers Won the Zombie Apocalypse
How I Met Your Girlfriend
How To Get Your FBI File (and Other Information You Want From the Federal Government)
How to Hack Millions of Routers
How to Pwn an ISP in 10 Minutes or less
How Unique Is Your Browser?
I know where your credit card is...
Implementing IPv6 at ARIN
Improving Antivirus Scanner Accuracy with Hypervisor Based Analysis
Industrial Cyber Security
Insecurity Engineering of Physical Security Systems: Locks, Lies, and Videotape
IPv6: No Longer Optional
Jackpotting Automated Teller Machines Redux
Kartograph : Finding a Needle in a Haystack or How to Apply Reverse Engineering Techniques to Cheat at Video Games
Katana: Portable Multi-Boot Security Suite
Keynote
Kim Jong-il and Me: How to Build a Cyber Army to Defeat the U.S.
Legal Developments in Hardware Hacking
Letting the Air Out of Tire Pressure Monitoring Systems
Like a Boss: Attacking JBoss
Live Fire Exercise: Baltic Cyber Shield 2010
Lord of the Bing: Taking Back Search Engine Hacking from Google and Bing
Malware Freak Show 2: The Client-Side Boogaloo
Malware Migrating To Gaming Consoles: Embedded Devices, An Antivirus-Free Safe Hideout For Malware
masSEXploitation
Mastering the Nmap Scripting Engine
Meet the EFF
Meet the Feds - CSI:TCP/IP
Meet the Feds - Policy, Privacy, Deterrence and Cyber War
Mobile Privacy: Tor on the iPhone and Other Unusual Devices
Multiplayer Metasploit -- Double Penetration Made Easy
Multiplayer Metasploit: Tag-Team Penetration and Information Gathering
My Life As A Spyware Developer
oCTF: 5 years in 50 minutes
Of Bytes and Bullets
Open Letter - Call to Action
Open Public Sensors and Trend Monitoring
Open Source Framework for Advanced Intrusion Detection Solutions
Operating System Fingerprinting for Virtual Machines
Our Instrumented Lives: Sensors, Sensors, Everywhere...
Panel: Internet Wars
PCI, Compromising Controls and Compromising Security
Physical Computing, Virtual Security: Adding the Arduino Devel Environment to Your Security Toolbox
Physical Security : You're Doing It Wrong!
Powershell...omfg
Practical Cellphone Spying
Programmable HID USB Keystroke Dongle: Using the Teensy as a Pen Testing Device
Protecting Your Ass(etts)
Pwned By The Owner: What Happens When You Steal A Hacker's Computer
pyREtic - In-memory Reverse Engineering for Obfuscated Python Bytecode
Repelling the Wily Insider
Resilient Botnet Command and Control with Tor
Ripping Media Off Of the Wire
Roman Profiles: The Six Mistakes
SCADA and ICS for Security Experts: How to Avoid Cyberdouchery
SCADA != SCARY!
Searching for Malware: A Review of Attackers’ Use of Search Engines to Lure Victims
Search & Seizure & Golfballs
Seccubus - Analyzing vulnerability assessment data the easy way...
Securing MMOs: A Security Professional's View From the Inside
SHacking DOCSIS For Fun and Profit
SHODAN for Penetration Testers
SIE Passive DNS and the ISC DNS Database
Silence of the RAM
SMART Project: Applying Reliability Metrics to Security Vulnerabilities
Sniper Forensics - One Shot, One Kill
Social Engineering and Target Profiling with 100% Accuracy
Social Networking Special Ops: Extending Data Visualization Tools for Faster Pwnage
So Many Ways to Slap A Yo-Ho:: Xploiting Yoville and Facebook for Fun and Profit
Story Time
Tales from the Crypto
TBA
TBA
The Anatomy of Drug Testing
The Chinese Cyber Army - An Archaeological Study from 2001 to 2010
The Games We Play
The Keys To Running A Successful DEF CON Group By DC612
The Law of Laptop Search and Seizure
The Night The Lights Went Out In Vegas: Demystifying Smartmeter Networks
The Power of Chinese Security
The Rise of Idiocracy
The Search for Perfect Handcuffs... and the Perfect Handcuff Key
These Aren't the Permissions You're Looking For
This is not the droid you're looking for...
This Needs to be Fixed, and Other Jokes in Commit Statements
Token Kidnapping's Revenge
Toolsmithing an IDA Bridge, Case Study For Building A Reverse Engineering Tool"
Training the Next Generation of Hardware Hackers -- Teaching Computer Organization and Assembly Language Hands-on with Embedded Systems
Trolling Reverse-Engineers with Math: Ness... It hurts...
VirGraff101: An Introduction to Virtual Graffiti
Wardriving the Smart Grid: Practical Approaches to Attacking Utility Packet Radios
Weaponizing Lady GaGa, Psychosonic Attacks
Web Application Fingerprinting with
Web Services We Just Don't Need
We Don't Need No Stinkin' Badges: Hacking Electronic Door Access Controllers
Welcome and Making the DEF CON 18 Badge
What you lookin' at...Punk.
Who Cares About IPv6?
Why Security People Suck
WiMAX Hacking 2010
Winning Risky Internet Games
WPA Too!
WRT54-TM, Media Center and Network Sniffer
Your Boss is a Douchebag... How About You?
You're Stealing It Wrong! 30 Years of Inter-Pirate Battles
Your ISP and the Government: Best Friends Forever.
You Spent All That Money And You Still Got Owned...
You want me to let you do WHAT!