A Bridge Too Far: Defeating Wired 802.1x with a Transparent Bridge Using Linux
Abusing HTML5
Advanced High Security Lock Bypass and Its Implications
Agnitio: the security code review Swiss army knife. Its static analysis, but not as we know it.
Alice and Bob are Fucked
And That's How I Lost My Eye: Exploring Emergency Data Destruction
An Insider's Look at International Cyber Security Threats and Trends
Archive Team: A Distributed Preservation of Service Attack
Are You In Yet? The CISO's View of Pentesting
Ask EFF: The Year in Digital Civil Liberties
Assessing Civilian Willingness to Participate in On-Line Political and Social Conflict
Attacking and Defending the Smart Grid
Awards Ceremonies
Balancing The Pwn Trade Deficit – APT Secrets in Asia
Battery Firmware Hacking
Beat to 1337: Creating A Successful University Cyber Defense Organization
Becoming Jack Flack – Real Life Cloak and Dagger
Big Brother on the Big Screen: Fact/Fiction?
Bit-squatting: DNS Hijacking Without Exploitation
Black Ops of TCP/IP 2011
Blinkie Lights: Network Monitoring with Arduino
Bosses love Excel, Hackers too.
Building The DEF CON Network, Making A Sandbox for 10,000 Hackers
Build your own Synthetic Aperture Radar
Bulletproofing The Cloud: Are We Any Closer To Security?
Cellular Privacy: A Forensic Analysis of Android Network Traffic
Chip & PIN is Definitely Broken
Cipherspaces/Darknets: An Overview Of Attack Strategies
Contractors, Clearances, and Chaos: Tales from the Crypt
Covert Post-Exploitation Forensics With Metasploit
DCFluX in: License to Transmit
Deceptive Hacking: How Misdirection Can Be Used To Steal Information Without Being Detected
DEF CON 101
DEF CON Awards
DEFCON Challenge for Database Geeks
DEF CON Comedy Jam IV
Distributed Denial of Service Attacks for White Hats
DIY Non-Destructive Entry
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Fix It In Software
Dust: Your Feed RSS Belongs To You!
Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration Tests
Economics of Password Cracking in the GPU Era
Fame: Not The Musical
Familiarity Breeds Contempt
Federation and Empire
Fingerbank - Open DHCP Fingerprints Database
Former Keynotes - The Future
From Printer To Pwnd: Leveraging Multifunction Printers During Penetration Testing
Fun with EC2/Amazon Cloud Services
Get Off of My Cloud: Cloud Credential Compromise and Exposure
Getting F***** On the River
Getting SSLizzard
Gone in 60 Minutes: Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP
Hacking and Forensicating an Oracle Database Server
Hacking and Securing DB2 LUW Databases
Hacking Google Chrome OS
Hacking Healthcare
Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System
Hacking MMORPGs for Fun and Mostly Profit
Hacking .Net Applications: The Black Arts
Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin
Hacking with QR Codes
Hacking Your Victims Over Power Lines
Handicapping the US Supreme Court
How Haunters Void Warranties
How To Get Your Message Out When Your Government Turns Off The Internet
I Am Not a Doctor but I Play One on Your Network
If you want to go phishing, you need the right bait…
I'm Your MAC(b)Daddy
Insecurity: An Analysis Of Current Commercial And Government Security Lock Designs
Internet Kiosk Terminals: The Redux
Introduction to Tamper Evident Devices
IP4 TRUTH: The IPocalypse is a LIE
Is it 0-day or 0-care?
Jugaad – Linux Thread Injection Kit
Kernel Exploitation Via Uninitialized Stack
Key Impressioning
Kinectasploit: Metasploit Meets Kinect
Lives On The Line: Securing Crisis Maps In Libya, Sudan, And Pakistan
Look At What My Car Can Do
Malware Freak Show 3: They're pwning er'body out there!
Mamma Don't Let Your Babies Grow Up to be Pen Testers
Meet the Federal Agent 2.0
Metasploit vSploit Modules
Meta-Work and Zombie Flows: How Compliance and Standards Strangled Infosec
Mobile App Moolah: Profit taking with Mobile Malware
My password is: #FullOfFail! — The Core Problem with Authentication and How We Can Overcome It
Net Neutrality Panel
Network Application Firewalls vs. Contemporary Threats
Network Migration for Penetration Testers
Network Nightmare: Ruling The Nightlife Between Shutdown And Boot With Pxesploit
Network Security Podcast Meetup
Operational Use of Offensive Cyber
Out of the basement and into the BEDROOM
Owned Over Amateur Radio: Remote Kernel Exploitation in 2011
PacketFence, The Open Source Nac: What We've Done In The Last Two Years
PCI 2.0: Still Compromising Controls and Compromising Security
Pervasive Cloaking
Phishing and Online Scam in China
Physical Memory Forensics for Cache
PIG: Finding Truffles Without Leaving A Trace
Pillaging DVCS Repos For Fun And Profit
Planes Keep Falling On My Head
Port Scanning Without Sending Packets
Putting the Hack in Ikea Hacks -or- Some Assembler Required
Represent! Defcon Groups, Hackerspaces, and You.
Runtime Process Insemination
Safe to Armed in Seconds: A Study of Epic Fails of Popular Gun Safes
SCADA & PLCs in Correctional Facilities: The Nightmare Before Christmas
Security When Nano Seconds Count
Seven Ways to Hang Yourself with Google Android
Smartfuzzing The Web: Carpe Vestra Foramina
Smile for the Grenade! "Camera Go Bang!"
Sneaky PDF
Sounds Like Botnet
Speaking with Cryptographic Oracles
SSL And The Future Of Authenticity
Staring into the Abyss: The Dark Side of Crime-fighting, Security, and Professional Intelligence
Staying Connected during a Revolution or Disaster
Steal Everything, Kill Everyone, Cause Total Financial Ruin!
Steganography and Cryptography 101
Strategic Cyber Security: An Evaluation of Nation-State Cyber Attack Mitigation Strategies
Taking Your Ball And Going Home; Building Your Own Secure Storage Space That Mirrors Dropbox's
TBD
The Art and Science of Security Research
The Art of Trolling
The Future of Cybertravel: Legal Implications of the Evasion of Geolocation
The History and Evolution of Computer Viruses
The REAL cutting edge to hash cracking
This is REALLY not the droid you're looking for...
Three Generations of DoS Attacks
Tracking the Trackers: How Our Browsing History Is Leaking into the Cloud
Tractor Jacking 101
Traps of Gold
TSA-Proof Get Home Bags
UPnP Mapping
Vanquishing Voyeurs: Secure Ways To Authenticate Insecurely
VDLDS — All Your Voice Are Belong To Us
Virtualization under attack: Breaking out of KVM
VoIP Hopping the Hotel: Attacking the Crown Jewels through VoIP
Vulnerabilities of Wireless Water Meter Networks
Walking the Green Mile: How to Get Fired After a Security Incident
Weaponizing Cyberpsychology and Subverting Cybervetting for Fun, Profit and Subterfuge
Web Application Analysis With Owasp Hatkit
Welcome and the Making of the DEF CON 19 Badge
We owe it all to the Hackers
We're (The Government) Here To Help: A Look At How FIPS 140 Helps (And Hurts) Security
What Time Are You Anyway?
When Space Elephants Attack: A DEFCON Challenge for Database Geeks
When the going gets weird, the weird turn pro
Whitfield Diffie & Moxie Marlinspike
Whoever Fights Monsters... Aaron Barr, Anonymous, and Ourselves
Why Airport Security Can't Be Done FAST
Wireless Aerial Surveillance Platform
Wireless Dirty Sisters – The other RF shit you aren't Looking at, and why you're going to get fscked
WTF Happened to the Constitution?