A Bridge Too Far: Defeating Wired 802.1x with a Transparent Bridge Using Linux
 
                        
                        
                    
                         
                        
                        
                        
                    
                    Abusing HTML5
 
                        
                    
                         
                        
                        
                        
                    
                    Advanced High Security Lock Bypass and Its Implications
Agnitio: the security code review Swiss army knife. Its static analysis, but not as we know it.
Alice and Bob are Fucked
And That's How I Lost My Eye: Exploring Emergency Data Destruction
An Insider's Look at International Cyber Security Threats and Trends
Archive Team: A Distributed Preservation of Service Attack
Are You In Yet? The CISO's View of Pentesting
Ask EFF: The Year in Digital Civil Liberties
Assessing Civilian Willingness to Participate in On-Line Political and Social Conflict
Attacking and Defending the Smart Grid
 
                        
                        
                    
                    Awards Ceremonies
Balancing The Pwn Trade Deficit – APT Secrets in Asia
 
                        
                        
                    
                         
                        
                        
                        
                    
                    Battery Firmware Hacking
 
                        
                    
                        
                         
                        
                        
                    
                         
                        
                        
                        
                    
                    Beat to 1337: Creating A Successful University Cyber Defense Organization
Becoming Jack Flack – Real Life Cloak and Dagger
Big Brother on the Big Screen: Fact/Fiction?
Bit-squatting: DNS Hijacking Without Exploitation
Black Ops of TCP/IP 2011
 
                        
                    
                        
                         
                        
                        
                    
                         
                        
                        
                        
                    
                    Blinkie Lights: Network Monitoring with Arduino
 
                        
                        
                    
                         
                        
                        
                        
                    
                    Bosses love Excel, Hackers too.
 
                        
                    
                        
                         
                        
                        
                    
                         
                        
                        
                        
                    
                    Building The DEF CON Network, Making A Sandbox for 10,000 Hackers
Build your own Synthetic Aperture Radar
 
                        
                        
                        
                    
                    Bulletproofing The Cloud: Are We Any Closer To Security?
 
                        
                        
                        
                    
                    Cellular Privacy: A Forensic Analysis of Android Network Traffic
Chip & PIN is Definitely Broken
 
                        
                    
                         
                        
                        
                        
                    
                    Cipherspaces/Darknets: An Overview Of Attack Strategies
Contractors, Clearances, and Chaos: Tales from the Crypt
Covert Post-Exploitation Forensics With Metasploit
 
                        
                        
                    
                         
                        
                        
                        
                    
                    DCFluX in: License to Transmit
 
                        
                        
                        
                    
                    Deceptive Hacking: How Misdirection Can Be Used To Steal Information Without Being Detected
 
                        
                        
                        
                    
                    DEF CON 101
DEF CON Awards
DEFCON Challenge for Database Geeks
 
                        
                        
                        
                    
                    DEF CON Comedy Jam IV
Distributed Denial of Service Attacks for White Hats
DIY Non-Destructive Entry
 
                        
                        
                        
                    
                    Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
 
                        
                    
                        
                         
                        
                        
                    
                         
                        
                        
                        
                    
                    Don't Fix It In Software
Dust: Your Feed RSS Belongs To You!
Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration Tests
 
                        
                        
                        
                    
                    Economics of Password Cracking in the GPU Era
 
                        
                        
                        
                    
                    Fame: Not The Musical
Familiarity Breeds Contempt
Federation and Empire
 
                        
                        
                    
                    Fingerbank - Open DHCP Fingerprints Database
 
                        
                        
                    
                    Former Keynotes - The Future
From Printer To Pwnd: Leveraging Multifunction Printers During Penetration Testing
 
                        
                        
                    
                         
                        
                        
                        
                    
                    Fun with EC2/Amazon Cloud Services
Get Off of My Cloud: Cloud Credential Compromise and Exposure
 
                        
                        
                    
                         
                        
                        
                        
                    
                    Getting F***** On the River
Getting SSLizzard
 
                        
                        
                    
                         
                        
                        
                        
                    
                    Gone in 60 Minutes: Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP
 
                        
                        
                        
                    
                    Hacking and Forensicating an Oracle Database Server
Hacking and Securing DB2 LUW Databases
 
                        
                        
                        
                    
                    Hacking Google Chrome OS
 
                        
                    
                        
                         
                        
                        
                    
                         
                        
                        
                        
                    
                    Hacking Healthcare
Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System
Hacking MMORPGs for Fun and Mostly Profit
Hacking .Net Applications: The Black Arts
 
                        
                    
                        
                         
                        
                        
                    
                         
                        
                        
                        
                    
                    Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin
Hacking with QR Codes
Hacking Your Victims Over Power Lines
 
                        
                    
                        
                         
                        
                        
                    
                         
                        
                        
                        
                    
                    Handicapping the US Supreme Court
 
                        
                        
                    
                    How Haunters Void Warranties
 
                        
                        
                        
                    
                    How To Get Your Message Out When Your Government Turns Off The Internet
I Am Not a Doctor but I Play One on Your Network
 
                        
                    
                        
                         
                        
                        
                    
                         
                        
                        
                        
                    
                    If you want to go phishing, you need the right bait…
I'm Your MAC(b)Daddy
 
                        
                        
                        
                    
                    Insecurity: An Analysis Of Current Commercial And Government Security Lock Designs
 
                        
                    
                        
                         
                        
                        
                    
                         
                        
                        
                        
                    
                    Internet Kiosk Terminals: The Redux
 
                        
                    
                        
                         
                        
                        
                    
                         
                        
                        
                        
                    
                    Introduction to Tamper Evident Devices
 
                        
                        
                        
                    
                    IP4 TRUTH: The IPocalypse is a LIE
Is it 0-day or 0-care?
Jugaad – Linux Thread Injection Kit
 
                        
                        
                    
                         
                        
                        
                        
                    
                    Kernel Exploitation Via Uninitialized Stack
 
                        
                        
                        
                    
                    Key Impressioning
 
                        
                        
                        
                    
                    Kinectasploit: Metasploit Meets Kinect
 
                        
                        
                    
                         
                        
                        
                        
                    
                    Lives On The Line: Securing Crisis Maps In Libya, Sudan, And Pakistan
 
                        
                        
                        
                    
                    Look At What My Car Can Do
 
                        
                        
                    
                         
                        
                        
                        
                    
                    Malware Freak Show 3: They're pwning er'body out there!
 
                        
                        
                        
                    
                    Mamma Don't Let Your Babies Grow Up to be Pen Testers
 
                        
                        
                        
                    
                    Meet the Federal Agent 2.0
Metasploit vSploit Modules
 
                        
                        
                    
                         
                        
                        
                        
                    
                    Meta-Work and Zombie Flows: How Compliance and Standards Strangled Infosec
Mobile App Moolah: Profit taking with Mobile Malware
My password is: #FullOfFail! — The Core Problem with Authentication and How We Can Overcome It
Net Neutrality Panel
Network Application Firewalls vs. Contemporary Threats
 
                        
                    
                        
                         
                        
                        
                    
                         
                        
                        
                        
                    
                    Network Migration for Penetration Testers
Network Nightmare: Ruling The Nightlife Between Shutdown And Boot With Pxesploit
 
                        
                    
                        
                         
                        
                        
                    
                         
                        
                        
                        
                    
                    Network Security Podcast Meetup
Operational Use of Offensive Cyber
Out of the basement and into the BEDROOM
Owned Over Amateur Radio: Remote Kernel Exploitation in 2011
 
                        
                    
                         
                        
                        
                        
                    
                    PacketFence, The Open Source Nac: What We've Done In The Last Two Years
PCI 2.0: Still Compromising Controls and Compromising Security
Pervasive Cloaking
Phishing and Online Scam in China
 
                        
                        
                        
                    
                    Physical Memory Forensics for Cache
 
                        
                        
                    
                         
                        
                        
                        
                    
                    PIG: Finding Truffles Without Leaving A Trace
 
                        
                        
                    
                         
                        
                        
                        
                    
                    Pillaging DVCS Repos For Fun And Profit
 
                        
                        
                        
                    
                    Planes Keep Falling On My Head
Port Scanning Without Sending Packets
 
                        
                        
                    
                         
                        
                        
                        
                    
                    Putting the Hack in Ikea Hacks -or- Some Assembler Required
Represent! Defcon Groups, Hackerspaces, and You.
Runtime Process Insemination
 
                        
                        
                    
                         
                        
                        
                        
                    
                    Safe to Armed in Seconds: A Study of Epic Fails of Popular Gun Safes
 
                        
                        
                        
                    
                    SCADA & PLCs in Correctional Facilities: The Nightmare Before Christmas
 
                        
                    
                         
                        
                        
                        
                    
                    Security When Nano Seconds Count
Seven Ways to Hang Yourself with Google Android
Smartfuzzing The Web: Carpe Vestra Foramina
 
                        
                        
                    
                         
                        
                        
                        
                    
                    Smile for the Grenade! "Camera Go Bang!"
 
                        
                        
                        
                    
                    Sneaky PDF
 
                        
                        
                        
                    
                    Sounds Like Botnet
 
                        
                        
                    
                         
                        
                        
                        
                    
                    Speaking with Cryptographic Oracles
 
                        
                        
                        
                    
                    SSL And The Future Of Authenticity
Staring into the Abyss: The Dark Side of Crime-fighting, Security, and Professional Intelligence
Staying Connected during a Revolution or Disaster
 
                        
                        
                        
                    
                    Steal Everything, Kill Everyone, Cause Total Financial Ruin!
Steganography and Cryptography 101
 
                        
                        
                        
                    
                    Strategic Cyber Security: An Evaluation of Nation-State Cyber Attack Mitigation Strategies
Taking Your Ball And Going Home; Building Your Own Secure Storage Space That Mirrors Dropbox's
TBD
The Art and Science of Security Research
The Art of Trolling
 
                        
                        
                    
                         
                        
                        
                        
                    
                    The Future of Cybertravel: Legal Implications of the Evasion of Geolocation
The History and Evolution of Computer Viruses
The REAL cutting edge to hash cracking
This is REALLY not the droid you're looking for...
 
                        
                    
                         
                        
                        
                        
                    
                    Three Generations of DoS Attacks
 
                        
                    
                         
                        
                        
                        
                    
                    Tracking the Trackers: How Our Browsing History Is Leaking into the Cloud
 
                        
                        
                    
                         
                        
                        
                        
                    
                    Tractor Jacking 101
Traps of Gold
TSA-Proof Get Home Bags
UPnP Mapping
 
                        
                        
                    
                         
                        
                        
                        
                    
                    Vanquishing Voyeurs: Secure Ways To Authenticate Insecurely
 
                        
                        
                    
                         
                        
                        
                        
                    
                    VDLDS — All Your Voice Are Belong To Us
 
                        
                        
                    
                         
                        
                        
                        
                    
                    Virtualization under attack: Breaking out of KVM
 
                        
                    
                         
                        
                        
                        
                    
                    VoIP Hopping the Hotel: Attacking the Crown Jewels through VoIP
 
                        
                    
                         
                        
                        
                        
                    
                    Vulnerabilities of Wireless Water Meter Networks
Walking the Green Mile: How to Get Fired After a Security Incident
Weaponizing Cyberpsychology and Subverting Cybervetting for Fun, Profit and Subterfuge
 
                        
                        
                    
                    Web Application Analysis With Owasp Hatkit
 
                        
                        
                        
                    
                    Welcome and the Making of the DEF CON 19 Badge
We owe it all to the Hackers
We're (The Government) Here To Help: A Look At How FIPS 140 Helps (And Hurts) Security
What Time Are You Anyway?
 
                        
                        
                        
                    
                    When Space Elephants Attack: A DEFCON Challenge for Database Geeks
 
                        
                        
                        
                    
                    When the going gets weird, the weird turn pro
Whitfield Diffie & Moxie Marlinspike
Whoever Fights Monsters... Aaron Barr, Anonymous, and Ourselves
Why Airport Security Can't Be Done FAST
 
                        
                        
                        
                    
                    Wireless Aerial Surveillance Platform
 
                        
                        
                        
                    
                    Wireless Dirty Sisters – The other RF shit you aren't Looking at, and why you're going to get fscked
WTF Happened to the Constitution?