DEFCON Challenge for Database Geeks
DCFluX in: License to Transmit
Staying Connected during a Revolution or Disaster
Insecurity: An Analysis Of Current Commercial And Government Security Lock Designs
Why Airport Security Can't Be Done FAST
Hacking Your Victims Over Power Lines
Key Impressioning
The Art of Trolling
IP4 TRUTH: The IPocalypse is a LIE
Safe to Armed in Seconds: A Study of Epic Fails of Popular Gun Safes
DIY Non-Destructive Entry
Attacking and Defending the Smart Grid
Vulnerabilities of Wireless Water Meter Networks
Staring into the Abyss: The Dark Side of Crime-fighting, Security, and Professional Intelligence
Smile for the Grenade! "Camera Go Bang!"
An Insider's Look at International Cyber Security Threats and Trends
Strategic Cyber Security: An Evaluation of Nation-State Cyber Attack Mitigation Strategies
Phishing and Online Scam in China
Handicapping the US Supreme Court
Look At What My Car Can Do
Internet Kiosk Terminals: The Redux
Build your own Synthetic Aperture Radar
Blinkie Lights: Network Monitoring with Arduino
Kinectasploit: Metasploit Meets Kinect
How Haunters Void Warranties
Don't Fix It In Software
Wireless Aerial Surveillance Platform
SCADA & PLCs in Correctional Facilities: The Nightmare Before Christmas