Ambush - Catching Intruders at Any Point
Applications and Cloud and Hackers, Oh My!
Arizona Craigslist Hookers (and other dating website shenanigans)
Ask the EFF
Big Data's Fourth V: Or why we'll never find the Loch Ness Monster
Breaking Microsoft Dynamics Great Plains - an insiders guide
Empirical Exploitation
Force Multipliers for Red Team Operations
Global Loot
How I Learned To Stop Worrying And Love The Smart Meter
How I managed to break into the InfoSec World with only a tweet and an email
Introducing 'Android Security Evaluation Framework' - ASEF
Introducing the Smartphone Penetration Testing Framework
IPv6 Panel / Drinking Game
Keynote: The State of Security BSides
Lightning Talks
Lotus Notes Password Hash Redux
Mainframed: The Forgotten Fortress
Making Lockpicks the Legion303 Way
Max Level Web App Security
Metrics that Suck Even Less
Mirror Mirror -- Reflected PDF Attacks Using SQL Injection
Mobile Snitch - Devices telling the world about you
Occupy Burp Suite: Informing the 99% of what the 1%'ers are knowingly taking advantage of
Puzzle Competitions and You
Reticle: Dropping an Intelligent F-BOMB
RFID LOL
Router of Darkness, Techniques for Embedded System Hacking
Secret Pentesting Techniques... Shh......
Sexy Defense
Shot With Your Own Gun: How Appliances are Used Against You
Stiltwalker: Round 2
TBA day of Conference
TBA day of Conference
TBA day of Conference
TBA day of Conference
TBA day of Conference
The Badmin Project (Na-na-nanana Na-na-nanana BADMIN)
The Blooming Social Media Economics Built on 'Fake' Identities
The Leverage of Language, or: How I realized Information Theory could save Information Security
The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems
When Devices Rat Us Out
Why have we not fixed the ID problem