• Friday, August 5
  • DEFCON Challenge for Database Geeks

     
    Fri, 10:00 - 10:50
    Track 4 - Track 4
  • DCFluX in: License to Transmit

    Matt Krick
    Fri, 11:00 - 11:50
    Track 4 - Track 4
  • Staying Connected during a Revolution or Disaster

    Thomas Wilhelm
    Fri, 12:00 - 12:50
    Track 4 - Track 4
  • Insecurity: An Analysis Of Current Commercial And Government Security Lock Designs

    Matt Fiddler, Marc Weber Tobias
    Fri, 13:00 - 13:50
    Track 4 - Track 4
  • Why Airport Security Can't Be Done FAST

    Joshua Engelman, Semon Rezchikov, Morgan Wang
    Fri, 14:00 - 14:50
    Track 4 - Track 4
  • Hacking Your Victims Over Power Lines

    David Kennedy
    Fri, 15:00 - 15:50
    Track 4 - Track 4
  • Key Impressioning

    Jos Weyers
    Fri, 16:00 - 16:50
    Track 4 - Track 4
  • The Art of Trolling

    Matt Joyce
    Fri, 17:00 - 17:50
    Track 4 - Track 4
  • IP4 TRUTH: The IPocalypse is a LIE

    Sterling Archer, Freaksworth
    Fri, 18:00 - 18:50
    Track 4 - Track 4
  • Saturday, August 6
  • Safe to Armed in Seconds: A Study of Epic Fails of Popular Gun Safes

    Deviant Ollam
    Sat, 10:00 - 10:50
    Track 4 - Track 4
  • DIY Non-Destructive Entry

    Schuyler Towne
    Sat, 11:00 - 11:50
    Track 4 - Track 4
  • Attacking and Defending the Smart Grid

    Justin Searle
    Sat, 12:00 - 12:50
    Track 4 - Track 4
  • Vulnerabilities of Wireless Water Meter Networks

    John McNabb
    Sat, 13:00 - 13:50
    Track 4 - Track 4
  • Staring into the Abyss: The Dark Side of Crime-fighting, Security, and Professional Intelligence

    Richard Thieme
    Sat, 14:00 - 14:50
    Track 4 - Track 4
  • Smile for the Grenade! "Camera Go Bang!"

    Vlad Gostom, Joshua Marpet
    Sat, 15:00 - 15:50
    Track 4 - Track 4
  • An Insider's Look at International Cyber Security Threats and Trends

    Rick Howard
    Sat, 16:00 - 16:50
    Track 4 - Track 4
  • Strategic Cyber Security: An Evaluation of Nation-State Cyber Attack Mitigation Strategies

    Kenneth Geers
    Sat, 17:00 - 17:50
    Track 4 - Track 4
  • Phishing and Online Scam in China

    Joey Zhu
    Sat, 18:00 - 18:20
    Track 4 - Track 4
  • Handicapping the US Supreme Court

    Foofus
    Sat, 18:30 - 18:50
    Track 4 - Track 4
  • Sunday, August 7
  • Look At What My Car Can Do

    Tyler Cohen
    Sun, 10:00 - 10:50
    Track 4 - Track 4
  • Internet Kiosk Terminals: The Redux

    Paul Craig
    Sun, 11:00 - 11:50
    Track 4 - Track 4
  • Build your own Synthetic Aperture Radar

    Michael Scarito
    Sun, 12:00 - 12:50
    Track 4 - Track 4
  • Blinkie Lights: Network Monitoring with Arduino

    Steve Ocepek
    Sun, 13:00 - 13:50
    Track 4 - Track 4
  • Kinectasploit: Metasploit Meets Kinect

    Jeff Bryner
    Sun, 14:00 - 14:20
    Track 4 - Track 4
  • How Haunters Void Warranties

    Reeves Smith
    Sun, 14:30 - 14:50
    Track 4 - Track 4
  • Don't Fix It In Software

    Katy Levinson
    Sun, 15:00 - 15:50
    Track 4 - Track 4
  • Wireless Aerial Surveillance Platform

    Richard Perkins, Mike Tassey
    Sun, 16:00 - 16:50
    Track 4 - Track 4
  • SCADA & PLCs in Correctional Facilities: The Nightmare Before Christmas

    Dora the SCADA Explorer, Teague Newman, Tiffany Rad, John J. Strauchs
    Sun, 17:00 - 17:50
    Track 4 - Track 4