10000 Yen into the Sea
Abusing NoSQL Databases
ACL Steganography - Permissions to Hide Your Porn
Adventures in Automotive Networks and Control Units
All Your Base Still Belong To Us: Physical Penetration Testing Tales From The Trenches
All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio
Android WebLogin: Google's Skeleton Key
An Open Letter - The White Hat's Dilemma: Professional Ethics in the Age of Swartz, PRISM and Stuxnet
A Password is Not Enough: Why disk encryption is broken and how we might fix it
Ask the EFF: The Year in Digital Civil Liberties
A Thorny Piece Of Malware (And Me): The Nastiness of SEH, VFTables & Multi-Threading
Backdoors, Government Hacking and The Next Crypto Wars
Bitcoin, Litecoin, and Alternative Cryptocurrencies - Pros, Cons, and Threats
Blucat: Netcat For Bluetooth
BoutiqueKit: Playing WarGames with expensive rootkits and malware
Bringing Intelligence back to the hacker community
Building an Android IDS on Network Level
Business logic flaws in mobile operators services
BYO-Disaster and Why Corporate Wireless Security Still Sucks
BYOD PEAP Show
Challenges being a criminal defense digital forensics expert
Closing Ceremonies
Collaborative Penetration Testing With Lair
Combatting Mac OSX/iOS Malware with Data Visualization
Conducting massive attacks with open source distributed computing
C.R.E.A.M. Cache Rules Evidently Ambiguous, Misunderstood
Cycling and Hacking to Defcon
Data Evaporation from SSDs
DC Awards
De-Anonymizing Alt.Anonymous.Messages
Decapping Chips the Easy^W Hard Way
Decrypting DEFCON: Foundations Behind Some of the Games Hackers Play
DEF CON 101
DEF CON Comedy Jam Part VI, Return of the Fail
Defeating Internet Censorship with Dust, the Polymorphic Protocol Engine
Defeating SEAndroid
Defending Networks with Incomplete Information: A Machine Learning Approach
Defense by numbers: Making problems for script kiddies and scanner monkeys
Digital Warfare, InfoSec Research, and The 2nd Amendment
Discovering Dark Matter: Towards better Android Malware Heuristics -- Skytalk edition
DNS May Be Hazardous to Your Health
Doing Bad Things to 'Good' Security Appliances
Do-It-Yourself Cellular IDS
DragonLady: An Investigation of SMS Fraud Operations in Russia
Dude, WTF in my car?
EDS: Exploitation Detection System
Electromechanical PIN Cracking with Robotic Reconfigurable Button Basher (and C3BO)
EMET 4.0 PKI Mitigation
Evil DoS Attacks and Strong Defenses
Evolving Exploits Through Genetic Algorithms
Examining the Bitsquatting Attack Surface
Exploiting Music Streaming with JavaScript
Fast Forensics Using Simple Statistics and Cool Tools
Fear the Evil FOCA: IPv6 attacks in Internet connections
Forensic Fails - Shift + Delete won't help you here
#FreeCrypt0s: Using SDR to prevent him from getting rooted!
From Nukes to Cyber – Alternative Approaches for Proactive Defense and Mission Assurance
Getting The Goods With smbexec
gitDigger: Creating useful wordlists from public GitHub repositories
Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot
GoPro or GTFO: A Tale of Reversing an Embedded System
Hacked Up
Hacker Law School
Hacking Driverless Vehicles
Hacking Interfaces with your Mind
Hacking Management: From Operations to Command
Hacking the Brew
Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks
Hardware Hacking with Microcontrollers: A Panel Discussion
HiveMind: Distributed File Storage Using JavaScript Botnets
Home Invasion 2.0 - Attacking Network-Controlled Consumer Devices
How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers
How to Disclose or Sell an Exploit Without Getting in Trouble
How to Hack Your Mini Cooper: Reverse Engineering Controller Area Network (CAN) Messages on Passenger Automobiles
How to use CSP to stop XSS
HTTP Time Bandit
I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell
Insecurity - A Failure of Imagination
Intro to Web Application Hacking
Java Every-Days: Exploiting Software Running on 3 Billion Devices
JTAGulator: Assisted Discovery Of On-Chip Debug Interfaces
Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock
Kill 'em All — DDoS Protection Total Annihilation!
LAZZORS! PEW! PEW!
Legal Aspects of Full Spectrum Computer Network (Active) Defense
Let's screw with nmap
Liberator: 3-D printing a plastic gun
Made Open: Hacking Capitalism
Making Of The DEF CON Documentary
Meet Pentoo, the Longest Running Pen-testing Linux Distro
Meet the VCs
MITM All The IPv6 Things
Network Survival WCS
Noise Floor: Exploring the world of unintentional radio emissions
Occam's Katana: defeating big data analytics
Offensive Forensics: CSI for the Bad Guy
Oil & Gas Infosec 101
Oldtimers v. N00bz 2.0
Open Public Sensors, Trend Monitoring and Data Fusion
OTP, It won't save you from free rides!
Owning Management with Standards
Pentesters Toolkit
Phantom Network Surveillance UAV / Drone
Please Insert^W Inject More Coins
PowerPreter: Post Exploitation Like a Boss
PowerPwning: Post-Exploiting By Overpowering PowerShell
Predicting Susceptibility to Social Bots on Twitter
Privacy In DSRC Connected Vehicles
Project CANCER: Bringing VX Back
Proliferation
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Prowling Peer-to-Peer Botnets After Dark
Pwn'ing You(r) Cyber Offenders
Pwn The Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices
Reality Hackers
Resting on Your Laurels will get you Pwned: Effectively Code Reviewing REST Applications to avoid getting powned
Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions
RFID Hacking: Live Free or RFID Hard
Safety of the Tor network: a look at network diversity, relay operators, and malicious relays
So You Think Your Domain Controller is Secure?
Stalking a City for Fun and Frivolity
Stepping P3wns: Adventures in full spectrum embedded exploitation (and defense!)
Strange interactions in personal data: Brokers and the CFAA
Suicide Risk Assessment and Intervention Tactics
Swiping Cards At The Source: POS & Cash Machine Security
The ACLU Presents: NSA Surveillance and More
The art of the Rig - Building a pen-test rig that isn't worthless
The Bluetooth Device Database
The Cavalry Isn't Coming: Starting the Revolution to Fsck it All!
The Continued Rise of Idiocracy: CCSS, PBI and other education acronyms that nobody understands
The Dark Arts of OSINT
The dawn of Web 3.0: website mapping and vulnerability scanning in 3D, just like you saw in the movies
The DEF CON 21 Badge
The Dirty South – Getting Justified with Technology
The Glitch: Bringing Hacking Hardware to the Masses
The Government and UFOs: A Historical Analysis by Richard Thieme
The Growing Irrelevance of US Government Cybersecurity Intelligence Information
The Ninjaneers: Getting started in Building Your Own Robots for World Domination.
The Policy Wonk Lounge
The Politics of Privacy and Technology: Fighting an Uphill Battle
The Road Less Surreptitiously Traveled
The Secret Life of SIM Cards
This presentation will self-destruct in 45 minutes: A forensic deep dive into self-destructing message apps
Torturing Open Government Systems for Fun, Profit and Time Travel
Transcending Cloud Limitations by Obtaining Inner Piece
Unexpected Stories From a Hacker Who Made it Inside the Government
Utilizing Popular Websites for Malicious Purposes Using RDI
VoIP Wars: Return of the SIP
We are Legion: Pentesting with an Army of Low-power Low-cost Devices
Wireless Penetration Testing 101 & Wireless Contesting