• 1
  • 10000 Yen into the Sea

    Flipper
    Fri, 12:00 - 12:45
    Track 3 - Track 3
  • A
  • Abusing NoSQL Databases

    Ming
    Fri, 16:30 - 16:50
    Track 2 - Track 2
  • ACL Steganography - Permissions to Hide Your Porn

    Michael Perklin
    Fri, 13:00 - 13:45
    Penn & Teller Theater - Penn & Teller
  • Adventures in Automotive Networks and Control Units

    Charlie Miller, Christopher Valasek
    Fri, 10:00 - 10:45
    Track 3 - Track 3
  • All Your Base Still Belong To Us: Physical Penetration Testing Tales From The Trenches

    Harry Regan, Valerie Thomas
    Sat, 11:00 - 11:50
    SkyTalks - SkyTalks
  • All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio

    Balint Seeber
    Fri, 10:00 - 11:45
    Track 4 - Track 4
  • Android WebLogin: Google's Skeleton Key

    Craig Young
    Sat, 13:00 - 13:20
    Track 2 - Track 2
  • An Open Letter - The White Hat's Dilemma: Professional Ethics in the Age of Swartz, PRISM and Stuxnet

    Alex Stamos
    Sat, 15:00 - 15:45
    Track 4 - Track 4
  • A Password is Not Enough: Why disk encryption is broken and how we might fix it

    Daniel Selifonov
    Fri, 16:00 - 16:45
    Penn & Teller Theater - Penn & Teller
  • Ask the EFF: The Year in Digital Civil Liberties

    Dan Auerbach, Eva Galperin, Marcia Hofmann, Mark Jaycox, Kurt Opsahl, Mitch Stoltz
    Fri, 14:00 - 15:45
    Track 4 - Track 4
  • A Thorny Piece Of Malware (And Me): The Nastiness of SEH, VFTables & Multi-Threading

    Marion Marschalek
    Sun, 12:30 - 12:50
    Track 2 - Track 2
  • B
  • Backdoors, Government Hacking and The Next Crypto Wars

    Christopher Soghoian
    Fri, 12:00 - 12:45
    Penn & Teller Theater - Penn & Teller
  • Bitcoin, Litecoin, and Alternative Cryptocurrencies - Pros, Cons, and Threats

    James Ball, Alexander Heid, Chris Snyder, Travis Tolle, YTcracker
    Sat, 17:00 - 17:50
    SkyTalks - SkyTalks
  • Blucat: Netcat For Bluetooth

    Joseph Paul Cohen
    Sun, 14:00 - 14:45
    Track 3 - Track 3
  • BoutiqueKit: Playing WarGames with expensive rootkits and malware

    Josh Thomas
    Sat, 12:00 - 12:45
    Track 2 - Track 2
  • Bringing Intelligence back to the hacker community

    Antitree
    Fri, 10:00 - 10:50
    SkyTalks - SkyTalks
  • Building an Android IDS on Network Level

    Jaime Sanchez
    Sat, 13:30 - 13:50
    Track 2 - Track 2
  • Business logic flaws in mobile operators services

    Bogdan Alecu
    Fri, 13:00 - 13:45
    Track 3 - Track 3
  • BYO-Disaster and Why Corporate Wireless Security Still Sucks

    Josh Hoover, James Snodgrass
    Sat, 16:00 - 16:45
    Track 1 - Track 1
  • BYOD PEAP Show

    Josh Yavor
    Sun, 15:00 - 15:45
    Track 3 - Track 3
  • C
  • Challenges being a criminal defense digital forensics expert

    The Public
    Sun, 16:00 - 16:50
    SkyTalks - SkyTalks
  • Closing Ceremonies

     
    Sun, 17:00 - 19:00
    Track 2
  • Collaborative Penetration Testing With Lair

    Dan Kottmann, Tom Steele
    Sun, 14:30 - 14:50
    Track 2 - Track 2
  • Combatting Mac OSX/iOS Malware with Data Visualization

    Remy Baumgarten
    Sun, 12:00 - 12:20
    Track 2 - Track 2
  • Conducting massive attacks with open source distributed computing

    Alejandro Caceres
    Sun, 15:00 - 15:45
    Track 1 - Track 1
  • C.R.E.A.M. Cache Rules Evidently Ambiguous, Misunderstood

    Jacob Thompson
    Sun, 16:00 - 16:45
    Track 4 - Track 4
  • Cycling and Hacking to Defcon

    JP Bourget, Bruce Potter
    Sat, 10:00 - 10:50
    SkyTalks - SkyTalks
  • D
  • Data Evaporation from SSDs

    Sam Bowne
    Sat, 16:30 - 16:50
    Track 2 - Track 2
  • DC Awards

     
    Sat, 15:00 - 15:45
    Track 3
  • De-Anonymizing Alt.Anonymous.Messages

    Tom Ritter
    Sat, 16:00 - 16:45
    Penn & Teller Theater - Penn & Teller
  • Decapping Chips the Easy^W Hard Way

    Zac Franken, Adam Laurie
    Fri, 16:00 - 17:45
    Track 4 - Track 4
  • Decrypting DEFCON: Foundations Behind Some of the Games Hackers Play

    LosT
    Thu, 14:00 - 14:50
    Track 2 - Track 2
  • DEF CON 101

    HighWiz, Lockheed, LosT, Pyr0, Roamer
    Thu, 10:00 - 11:50
    Track 2 - Track 2
  • DEF CON Comedy Jam Part VI, Return of the Fail

    James Arlen, Rob Graham, Christofer Hoff, David Maynor, Rich Mogull, David Mortman
    Sat, 12:00 - 13:45
    Track 4 - Track 4
  • Defeating Internet Censorship with Dust, the Polymorphic Protocol Engine

    Brandon Wiley
    Sat, 12:00 - 12:45
    Penn & Teller Theater - Penn & Teller
  • Defeating SEAndroid

    Pau Oliva
    Sat, 14:00 - 14:20
    Track 2 - Track 2
  • Defending Networks with Incomplete Information: A Machine Learning Approach

    Alex Pinto
    Sun, 13:00 - 13:45
    Track 3 - Track 3
  • Defense by numbers: Making problems for script kiddies and scanner monkeys

    Chris John Riley
    Sun, 10:00 - 10:45
    Track 4 - Track 4
  • Digital Warfare, InfoSec Research, and The 2nd Amendment

    Alexander Heid, Roamer, Rod Soto, Tuna
    Fri, 17:00 - 17:50
    SkyTalks - SkyTalks
  • Discovering Dark Matter: Towards better Android Malware Heuristics -- Skytalk edition

    Matthew McDevitt, Jimmy Shah, David Shaw
    Sat, 09:00 - 09:50
    SkyTalks - SkyTalks
  • DNS May Be Hazardous to Your Health

    Robert Stucke
    Sat, 17:00 - 17:45
    Track 3 - Track 3
  • Doing Bad Things to 'Good' Security Appliances

    Rob Bathurst, Mark Carey
    Sat, 14:30 - 15:20
    Track 2 - Track 2
  • Do-It-Yourself Cellular IDS

    Sherri Davidoff, Scott Fretheim, David Harrison, Randi Price
    Sat, 10:00 - 11:45
    Track 2 - Track 2
  • DragonLady: An Investigation of SMS Fraud Operations in Russia

    Ryan Smith, Tim Strazzere
    Fri, 12:00 - 12:45
    Track 2 - Track 2
  • Dude, WTF in my car?

    Alberto García Illera, Javier Vazquez Vidal
    Sat, 10:00 - 10:45
    Track 1 - Track 1
  • E
  • EDS: Exploitation Detection System

    Amr Thabet
    Sun, 14:00 - 14:45
    Track 1 - Track 1
  • Electromechanical PIN Cracking with Robotic Reconfigurable Button Basher (and C3BO)

    Justin Engler, Paul Vines
    Sat, 16:00 - 16:20
    Track 2 - Track 2
  • EMET 4.0 PKI Mitigation

    Neil Sikka
    Sun, 12:00 - 12:45
    Track 1 - Track 1
  • Evil DoS Attacks and Strong Defenses

    Sam Bowne, Matthew Prince
    Fri, 14:00 - 14:45
    Track 1 - Track 1
  • Evolving Exploits Through Genetic Algorithms

    soen
    Sun, 15:30 - 15:50
    Track 2 - Track 2
  • Examining the Bitsquatting Attack Surface

    Jaeson Schultz
    Fri, 17:00 - 17:20
    Track 2 - Track 2
  • Exploiting Music Streaming with JavaScript

    Franz Payer
    Sun, 10:00 - 10:45
    Track 3 - Track 3
  • F
  • Fast Forensics Using Simple Statistics and Cool Tools

    John Ortiz
    Sun, 13:00 - 13:45
    Track 4 - Track 4
  • Fear the Evil FOCA: IPv6 attacks in Internet connections

    Chema Alonso
    Sat, 11:00 - 11:45
    Track 3 - Track 3
  • Forensic Fails - Shift + Delete won't help you here

    Michael Perklin, Eric Robi
    Sun, 14:00 - 14:45
    Track 4 - Track 4
  • #
  • #FreeCrypt0s: Using SDR to prevent him from getting rooted!

    Jason N00bz, Raj
    Sat, 12:00 - 12:50
    SkyTalks - SkyTalks
  • F
  • From Nukes to Cyber – Alternative Approaches for Proactive Defense and Mission Assurance

    Lt. Gen. Robert Elder (USAF, retired)
    Sat, 10:00 - 10:45
    Penn & Teller Theater - Penn & Teller
  • G
  • Getting The Goods With smbexec

    Eric Milam
    Fri, 16:00 - 16:20
    Track 2 - Track 2
  • gitDigger: Creating useful wordlists from public GitHub repositories

    Jaime Filson, Rob Fuller
    Sun, 10:00 - 10:20
    Track 2 - Track 2
  • Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot

    Mike Baker, Amir Etemadieh, CJ Heres, Hans Nielsen
    Fri, 15:00 - 15:45
    Penn & Teller Theater - Penn & Teller
  • GoPro or GTFO: A Tale of Reversing an Embedded System

    Zach Lanier, Todd Manning
    Sat, 17:00 - 17:20
    Track 2 - Track 2
  • H
  • Hacked Up

    Andrea Matwyshyn
    Fri, 12:00 - 12:50
    SkyTalks - SkyTalks
  • Hacker Law School

    Marcia Hofmann, Jim Rennie
    Thu, 10:00 - 11:50
    Track 3 - Track 3
  • Hacking Driverless Vehicles

    Zoz
    Fri, 11:00 - 11:45
    Track 3 - Track 3
  • Hacking Interfaces with your Mind

    Kevin Carter
    Fri, 15:00 - 15:50
    SkyTalks - SkyTalks
  • Hacking Management: From Operations to Command

    Lockheed, Naifx, Roamer
    Thu, 12:00 - 12:50
    Track 2 - Track 2
  • Hacking the Brew

    Chris Roberts
    Sat, 13:00 - 13:50
    SkyTalks - SkyTalks
  • Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks

    Hunter Scott
    Sat, 15:00 - 15:45
    Track 1 - Track 1
  • Hardware Hacking with Microcontrollers: A Panel Discussion

    FirmWarez, Joe Grand, LosT, RenderMan, Mark Smith
    Sat, 14:00 - 14:45
    Track 4 - Track 4
  • HiveMind: Distributed File Storage Using JavaScript Botnets

    Sean Malone
    Sun, 12:00 - 12:45
    Track 3 - Track 3
  • Home Invasion 2.0 - Attacking Network-Controlled Consumer Devices

    David Bryan, Dan Crowley, Jennifer Savage
    Sat, 12:00 - 12:45
    Track 1 - Track 1
  • How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers

    Michael Schrenk
    Fri, 17:00 - 17:45
    Track 3 - Track 3
  • How to Disclose or Sell an Exploit Without Getting in Trouble

    James Denaro
    Sat, 18:00 - 18:20
    Track 4 - Track 4
  • How to Hack Your Mini Cooper: Reverse Engineering Controller Area Network (CAN) Messages on Passenger Automobiles

    Jason Staggs
    Sat, 15:30 - 15:50
    Track 2 - Track 2
  • How to use CSP to stop XSS

    Kenneth Lee
    Fri, 15:00 - 15:20
    Track 2 - Track 2
  • HTTP Time Bandit

    Tigran Gevorgyan, Vaagn Toukharian
    Fri, 14:30 - 14:50
    Track 2 - Track 2
  • I
  • I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell

    Doug DePerry, Tom Ritter
    Fri, 10:00 - 10:45
    Track 2 - Track 2
  • Insecurity - A Failure of Imagination

    Tobias Bluzmanis, Marc Weber Tobias
    Sat, 10:00 - 10:45
    Track 4 - Track 4
  • Intro to Web Application Hacking

    Terrence Gareau
    Thu, 15:00 - 15:50
    Track 2 - Track 2
  • J
  • Java Every-Days: Exploiting Software Running on 3 Billion Devices

    Brian Gorenc, Jasiel Spelman
    Sun, 11:00 - 11:45
    Track 3 - Track 3
  • JTAGulator: Assisted Discovery Of On-Chip Debug Interfaces

    Joe Grand
    Sat, 17:30 - 17:50
    Track 2 - Track 2
  • K
  • Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock

    dlaw, gdkar, robj
    Sat, 11:00 - 11:45
    Track 4 - Track 4
  • Kill 'em All — DDoS Protection Total Annihilation!

    Dr. Wai-Leng Lee, Tony Miu
    Fri, 15:00 - 15:45
    Track 1 - Track 1
  • L
  • LAZZORS! PEW! PEW!

    Acr0nym, Johan Hybinette
    Sun, 11:00 - 11:50
    SkyTalks - SkyTalks
  • Legal Aspects of Full Spectrum Computer Network (Active) Defense

    Robert Clark
    Sat, 12:00 - 12:45
    Track 3 - Track 3
  • Let's screw with nmap

    Gregory Pickett
    Sun, 15:00 - 15:45
    Track 4 - Track 4
  • Liberator: 3-D printing a plastic gun

    Dallas, Ohm
    Fri, 09:00 - 09:50
    SkyTalks - SkyTalks
  • M
  • Made Open: Hacking Capitalism

    Todd Bonnewell
    Sun, 10:30 - 11:20
    Track 2 - Track 2
  • Making Of The DEF CON Documentary

    Rachel Lovinger, Jason Scott
    Fri, 12:00 - 13:45
    Track 4 - Track 4
  • Meet Pentoo, the Longest Running Pen-testing Linux Distro

    ZeroChaos
    Thu, 14:00 - 14:50
    Track 3 - Track 3
  • Meet the VCs

    Eileen Burbidge, Ping Li, Matt Ocko, Phil Paul
    Fri, 14:00 - 14:45
    Track 3 - Track 3
  • MITM All The IPv6 Things

    Brent Bandelgar, Scott Behrens
    Fri, 14:00 - 14:20
    Track 2 - Track 2
  • N
  • Network Survival WCS

    James Costello
    Sun, 14:00 - 14:50
    SkyTalks - SkyTalks
  • Noise Floor: Exploring the world of unintentional radio emissions

    Melissa Elliott
    Sat, 17:00 - 17:45
    Track 1 - Track 1
  • O
  • Occam's Katana: defeating big data analytics

    Rob Bird
    Sat, 15:00 - 15:50
    SkyTalks - SkyTalks
  • Offensive Forensics: CSI for the Bad Guy

    Benjamin Caudill
    Fri, 13:00 - 13:20
    Track 2 - Track 2
  • Oil & Gas Infosec 101

    Aaron Bayles
    Thu, 13:00 - 13:50
    Track 3 - Track 3
  • Oldtimers v. N00bz 2.0

    Panel
    Sat, 14:00 - 14:50
    SkyTalks - SkyTalks
  • Open Public Sensors, Trend Monitoring and Data Fusion

    Daniel Burroughs
    Sun, 14:00 - 14:20
    Track 2 - Track 2
  • OTP, It won't save you from free rides!

    bughardy, Eagle1753
    Sat, 17:00 - 17:45
    Track 4 - Track 4
  • Owning Management with Standards

    Tim Krabec
    Sun, 15:00 - 15:50
    SkyTalks - SkyTalks
  • P
  • Pentesters Toolkit

    Anch
    Thu, 12:00 - 12:50
    Track 3 - Track 3
  • Phantom Network Surveillance UAV / Drone

    Ricky Hill
    Sat, 14:00 - 14:45
    Penn & Teller Theater - Penn & Teller
  • Please Insert^W Inject More Coins

    Nicolas Oberli
    Fri, 17:30 - 17:50
    Track 2 - Track 2
  • PowerPreter: Post Exploitation Like a Boss

    Nikhil Mittal
    Sat, 16:00 - 16:45
    Track 3 - Track 3
  • PowerPwning: Post-Exploiting By Overpowering PowerShell

    Joe Bialek
    Sun, 15:00 - 15:20
    Track 2 - Track 2
  • Predicting Susceptibility to Social Bots on Twitter

    Chris Sumner, Randall Wald
    Sat, 10:00 - 10:45
    Track 3 - Track 3
  • Privacy In DSRC Connected Vehicles

    Christie Dudley
    Sat, 13:00 - 13:45
    Penn & Teller Theater - Penn & Teller
  • Project CANCER: Bringing VX Back

    Mohamed Saher
    Fri, 16:00 - 16:50
    SkyTalks - SkyTalks
  • Proliferation

    Ambassador Joseph DeTrani
    Fri, 10:00 - 10:45
    Penn & Teller Theater - Penn & Teller
  • Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust

    Dan Griffin
    Fri, 14:00 - 14:45
    Penn & Teller Theater - Penn & Teller
  • Prowling Peer-to-Peer Botnets After Dark

    Tillmann Werner
    Fri, 13:00 - 13:45
    Track 1 - Track 1
  • Pwn'ing You(r) Cyber Offenders

    Piotr Duszynski
    Fri, 13:30 - 13:50
    Track 2 - Track 2
  • Pwn The Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices

    Wesley McGrew
    Sat, 14:00 - 14:45
    Track 3 - Track 3
  • R
  • Reality Hackers

    Rebecca Wexler
    Sat, 20:00 - 21:00
    Track 2 - Track 2
  • Resting on Your Laurels will get you Pwned: Effectively Code Reviewing REST Applications to avoid getting powned

    Dinis Cruz, Abraham Kang
    Sun, 11:00 - 11:45
    Track 4 - Track 4
  • Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions

    Andy Davis
    Sun, 16:00 - 16:45
    Track 1 - Track 1
  • RFID Hacking: Live Free or RFID Hard

    Francis Brown
    Sat, 13:00 - 13:45
    Track 1 - Track 1
  • S
  • Safety of the Tor network: a look at network diversity, relay operators, and malicious relays

    Runa A. Sandvik
    Sat, 15:00 - 15:45
    Penn & Teller Theater - Penn & Teller
  • So You Think Your Domain Controller is Secure?

    Justin Hendricks
    Fri, 15:30 - 15:50
    Track 2 - Track 2
  • Stalking a City for Fun and Frivolity

    Brendan O'Connor
    Sat, 14:00 - 14:45
    Track 1 - Track 1
  • Stepping P3wns: Adventures in full spectrum embedded exploitation (and defense!)

    Michael Costello, Ang Cui
    Sun, 13:00 - 13:45
    Track 1 - Track 1
  • Strange interactions in personal data: Brokers and the CFAA

    Christie Dudley
    Sun, 12:00 - 12:50
    SkyTalks - SkyTalks
  • Suicide Risk Assessment and Intervention Tactics

    Amber Baldet
    Sat, 16:00 - 16:45
    Track 4 - Track 4
  • Swiping Cards At The Source: POS & Cash Machine Security

    Ryan Linn
    Fri, 11:00 - 11:50
    SkyTalks - SkyTalks
  • T
  • The ACLU Presents: NSA Surveillance and More

    Alex Abdo, Kade Crockford, Catherine Crump, Nicole Ozer, Christopher Soghoian
    Fri, 15:00 - 15:45
    Track 3 - Track 3
  • The art of the Rig - Building a pen-test rig that isn't worthless

    Anch
    Fri, 13:00 - 13:50
    SkyTalks - SkyTalks
  • The Bluetooth Device Database

    Ryan Holeman
    Sun, 16:00 - 16:20
    Track 3 - Track 3
  • The Cavalry Isn't Coming: Starting the Revolution to Fsck it All!

    Joshua Corman, Nicholas J. Percoco
    Sun, 10:00 - 10:45
    Track 1 - Track 1
  • The Continued Rise of Idiocracy: CCSS, PBI and other education acronyms that nobody understands

    0nlychick
    Sun, 13:00 - 13:50
    SkyTalks - SkyTalks
  • The Dark Arts of OSINT

    Noah Schiffman, SkyDog
    Sun, 11:00 - 11:45
    Track 1 - Track 1
  • The dawn of Web 3.0: website mapping and vulnerability scanning in 3D, just like you saw in the movies

    Alejandro Caceres, Teal Rogers
    Sun, 11:30 - 11:50
    Track 2 - Track 2
  • The DEF CON 21 Badge

    LosT, Jeff Moss
    Fri, 10:00 - 10:45
    Track 1
  • The Dirty South – Getting Justified with Technology

    Nick Hitchcock, David Kennedy
    Fri, 12:00 - 12:45
    Track 1 - Track 1
  • The Glitch: Bringing Hacking Hardware to the Masses

    JP Dunning
    Fri, 14:00 - 14:50
    SkyTalks - SkyTalks
  • The Government and UFOs: A Historical Analysis by Richard Thieme

    Richard Thieme
    Fri, 16:00 - 16:45
    Track 3 - Track 3
  • The Growing Irrelevance of US Government Cybersecurity Intelligence Information

    Mark Weatherford
    Fri, 11:00 - 11:45
    Track 1 - Track 1
  • The Ninjaneers: Getting started in Building Your Own Robots for World Domination.

    Beaker, Flipper
    Thu, 13:00 - 13:50
    Track 2 - Track 2
  • The Policy Wonk Lounge

     
    Sat, 20:00 - 21:00
    Track 4 - Track 4
  • The Politics of Privacy and Technology: Fighting an Uphill Battle

    Eric Fulton, Daniel Zolnikov
    Sat, 11:00 - 11:45
    Penn & Teller Theater - Penn & Teller
  • The Road Less Surreptitiously Traveled

    pukingmonkey
    Sat, 11:00 - 11:45
    Track 1 - Track 1
  • The Secret Life of SIM Cards

    Eric Butler, Karl Koscher
    Fri, 11:00 - 11:45
    Track 2 - Track 2
  • This presentation will self-destruct in 45 minutes: A forensic deep dive into self-destructing message apps

    Andrea London, Kyle O'Meara
    Sun, 12:00 - 12:45
    Track 4 - Track 4
  • Torturing Open Government Systems for Fun, Profit and Time Travel

    Tom Keenan
    Fri, 11:00 - 11:45
    Penn & Teller Theater - Penn & Teller
  • Transcending Cloud Limitations by Obtaining Inner Piece

    Zak Blacher
    Sun, 13:00 - 13:20
    Track 2 - Track 2
  • U
  • Unexpected Stories From a Hacker Who Made it Inside the Government

    Peiter Zatko
    Fri, 17:00 - 17:45
    Track 1 - Track 1
  • Utilizing Popular Websites for Malicious Purposes Using RDI

    Daniel Chechik, Anat Davidi
    Sun, 13:30 - 13:50
    Track 2 - Track 2
  • V
  • VoIP Wars: Return of the SIP

    Fatih Ozavci
    Fri, 16:00 - 16:45
    Track 1 - Track 1
  • W
  • We are Legion: Pentesting with an Army of Low-power Low-cost Devices

    Phil Polstra
    Sat, 13:00 - 13:45
    Track 3 - Track 3
  • Wireless Penetration Testing 101 & Wireless Contesting

    DaKahuna, Rick Mellendick
    Thu, 15:00 - 15:50
    Track 3 - Track 3