• 09:00
  • Prehack - How to create and/or prevent a backdoor during the design and development of a product

    Headless Chook, Shane Kemper
    Fri, 09:00 - 09:50
    Skytalks
  • 10:00
  • The Christopher Columbus Rule and DHS

    Mark Weatherford
    Fri, 10:00 - 10:50
    Track 5 / Penn & Teller
  • Welcome & Making the DEF CON 20 Badge

     
    Fri, 10:00 - 10:50
    Track 1
  • Should the Wall of Sheep Be Illegal? A Debate Over Whether and How Open WiFi Sniffing Should Be Regulated

    Kevin Bankston, Matt Blaze, Jennifer Granick
    Fri, 10:00 - 10:50
    Track 2
  • Making Sense of Static - New Tools for Hacking GPS

    Colin Beighley, Fergus Noble
    Fri, 10:00 - 10:50
    Track 3
  • Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole

    Ang Cui
    Fri, 10:00 - 10:20
    Track 4 / Turbo
  • Juice Jacking: Hacking the Defcon Attendee's Smartphones

    Robert Rowley
    Fri, 10:00 - 10:50
    Skytalks
  • 10:30
  • APK File Infection on an Android System

    Bob Pan
    Fri, 10:30 - 10:50
    Track 4 / Turbo
  • 11:00
  • Socialized Data: Using Social Media as a Cyber Mule

    Timothy Mullen
    Fri, 11:00 - 11:50
    Track 5 / Penn & Teller
  • DEF CON Documentary Trailer

     
    Fri, 11:00 - 11:20
    Track 1
  • MegaUpload: Guilty or Not Guilty?

    Jennifer Granick, Jim Rennie
    Fri, 11:00 - 11:50
    Track 2
  • Can You Track Me Now? Government And Corporate Surveillance Of Mobile Geo-Location Data

    Catherine Crump, Toby Kohlenberg, Christopher Soghoian, Ashkan Soltani, Ben Wizner
    Fri, 11:00 - 12:50
    Track 3
  • Passive Bluetooth Monitoring in Scapy

    Ryan Holeman
    Fri, 11:00 - 11:20
    Track 4 / Turbo
  • 2005 Called - They want their Lotus Notes password hashes back

    Willard Dawson
    Fri, 11:00 - 11:50
    Skytalks
  • 11:20
  • Before, During, and After

    Dead Addict, Gail Thackeray
    Fri, 11:20 - 11:50
    Track 1
  • 11:30
  • Not-So-Limited Warranty: Target Attacks on Warranties for Fun and Profit

    Darkred
    Fri, 11:30 - 11:50
    Track 4 / Turbo
  • 12:00
  • Cortana: Rise of the Automated Red Team

    Raphael Mudge
    Fri, 12:00 - 12:50
    Track 5 / Penn & Teller
  • Shared Values, Shared Responsibility

    General Keith B. Alexander
    Fri, 12:00 - 12:50
    Track 1
  • Meet the EFF

    Peter Eckersley, Hanni Fakhoury, Eva Galperin, Marcia Hofmann, Kurt Opsahl, Trevor Timm
    Fri, 12:00 - 12:50
    Track 2
  • Not So Super Notes, How Well Does US Dollar Note Security Prevent Counterfeiting?

    Matthew Duggan
    Fri, 12:00 - 12:20
    Track 4 / Turbo
  • Appearance Hacking 101: The Art of Everyday Camouflage

    Valerie Thomas
    Fri, 12:00 - 12:50
    Skytalks
  • 12:30
  • The Open Cyber Challenge Platform

    Linda C. Butler
    Fri, 12:30 - 12:50
    Track 4 / Turbo
  • 13:00
  • Owning One to Rule Them All

    Dave DeSimone, David Kennedy
    Fri, 13:00 - 13:50
    Track 5 / Penn & Teller
  • The Art of Cyberwar

    Kenneth Geers
    Fri, 13:00 - 13:50
    Track 1
  • Panel: The Making of DEF CON 20

     
    Fri, 13:00 - 13:50
    Track 2
  • Don't Stand So Close To Me: An Analysis of the NFC Attack Surface

    Charlie Miller
    Fri, 13:00 - 13:50
    Track 3
  • How to Channel Your Inner Henry Rollins

    Alberto GarcĂ­a Illera, Jayson E. Street
    Fri, 13:00 - 13:20
    Track 4 / Turbo
  • TBA-sky1

     
    Fri, 13:00 - 13:50
    Skytalks
  • 13:30
  • Bad (and Sometimes Good) Tech Policy: It's Not Just a DC Thing

    Chris Conley
    Fri, 13:30 - 13:50
    Track 4 / Turbo
  • 14:00
  • Changing the Security Paradigm: Taking Back Your Network and Bringing Pain to the Adversary

    Shawn Henry
    Fri, 14:00 - 14:50
    Track 5 / Penn & Teller
  • Drones!

    Chris Anderson
    Fri, 14:00 - 14:50
    Track 1
  • Crypto and the Cops: the Law of Key Disclosure and Forced Decryption

    Marcia Hofmann
    Fri, 14:00 - 14:50
    Track 2
  • NFC Hacking: The Easy Way

    Eddie Lee
    Fri, 14:00 - 14:50
    Track 3
  • Scylla: Because There's no Patch for Human Stupidity

    Carlos Alberto Rodriguez, Sergio Valderrama
    Fri, 14:00 - 14:20
    Track 4 / Turbo
  • TBA-sky2

    Timothy Mullen
    Fri, 14:00 - 14:50
    Skytalks
  • 14:30
  • Drinking From the Caffeine Firehose We Know as Shodan

    Dan Tentler
    Fri, 14:30 - 14:50
    Track 4 / Turbo
  • 15:00
  • Detecting Reflective Injection

    Andrew King
    Fri, 15:00 - 15:50
    Track 5 / Penn & Teller
  • An Inside Look Into Defense Industrial Base (DIB) Technical Security Controls: How Private Industry Protects Our Country's Secrets

    James Kirk
    Fri, 15:00 - 15:50
    Track 1
  • DEF CON Comedy Jam V, V for Vendetta

    James Arlen, Rob Graham, Christofer Hoff, David Maynor, Rich Mogull, David Mortman, Larry Pesce
    Fri, 15:00 - 16:50
    Track 2
  • Attacking TPM Part 2: A Look at the ST19WP18 TPM Device

    Chris Tarnovsky
    Fri, 15:00 - 15:50
    Track 3
  • Network Anti-Reconnaissance: Messing with Nmap Through Smoke and Mirrors

    Dan Petro
    Fri, 15:00 - 15:20
    Track 4 / Turbo
  • Making Lockpicks the Legion303 Way

    Steve Pordon
    Fri, 15:00 - 15:50
    Skytalks
  • 15:30
  • How to Hack VMware vCenter Server in 60 Seconds

    Alexander Minozhenko
    Fri, 15:30 - 15:50
    Track 4 / Turbo
  • 16:00
  • Post-Exploitation Nirvana: Launching OpenDLP Agents over Meterpreter Sessions

    Michael Baucom, Andrew Gavin, Charles Smith
    Fri, 16:00 - 16:50
    Track 5 / Penn & Teller
  • Life Inside a Skinner Box: Confronting our Future of Automated Law Enforcement

    Greg Conti, Woody Hartzog, Lisa Shay
    Fri, 16:00 - 16:50
    Track 1
  • Bypassing Endpoint Security for $20 or Less

    Phil Polstra
    Fri, 16:00 - 16:50
    Track 3
  • Demorpheus: Getting Rid Of Polymorphic Shellcodes In Your Network

    Svetlana Gaivoronski, Dennis Gamayunov
    Fri, 16:00 - 16:20
    Track 4 / Turbo
  • Stiltwalker, Round 2

    DC-949
    Fri, 16:00 - 16:50
    Skytalks
  • 16:30
  • New Techniques in SQLi Obfuscation: SQL never before used in SQLi

    Nick Galbreath
    Fri, 16:30 - 16:50
    Track 4 / Turbo
  • 17:00
  • Anti-Forensics and Anti-Anti-Forensics: Attacks and Mitigating Techniques for Digital-Forensic Investigations

    Michael Perklin
    Fri, 17:00 - 17:50
    Track 1
  • The Art Of The Con

     
    Fri, 17:00 - 17:50
    Track 2
  • Safes and Containers: Insecurity Design Excellence

    Tobias Bluzmanis, Matt Fiddler, Marc Weber Tobias
    Fri, 17:00 - 17:50
    Track 3
  • DivaShark - Monitor your Flow

    Robert Deaton
    Fri, 17:00 - 17:20
    Track 4 / Turbo
  • Hammer: Smashing Binary Formats Into Bits

    Dan Hirsch, Meredith L. Patterson
    Fri, 17:00 - 17:50
    Skytalks
  • 17:30
  • Blind XSS

    Adam Baldwin
    Fri, 17:30 - 17:50
    Track 4 / Turbo
  • 18:00
  • Movie Night With The Dark Tangent: "21" + Q&A With "MIT Mike" Aponte

    Mike Aponte
    Fri, 18:00 - 19:50
    Track 2
  • Taking Back Our Data - An Invitation To Discussion

    Mark Smith
    Fri, 18:00 - 18:50
    Skytalks
  • 20:00
  • Movie night with The Dark Tangent: "Code2600" + Q&A with the Director

     
    Fri, 20:00 - 21:50
    Track 2