Black Ball - Krisz Klink
Black Ball - njnTrubl
Registration at Royale Registration Desk
Welcome to Defcon 17 with Dark Tangent and the Making of & Hacking the DC17 Badge
Perspective of the DoD Chief Security Officer
Is your Iphone Pwned? Auditing, Attacking and Defending Mobile Devices
Beckstrom's Law - A Model for Valuing Networks and Security
Catching DNS Tunnels with AI - A Talk About Artificial Intelligence, Geometry and Malicious Traffic
Fillmatic (DJ)
Coffee Wars X
Asymmetric Defense: How to Fight Off the NSA Red Team with Five People or Less
Jailbreaking and the Law of Reversing
Is That You, Baby, or Just a Bridge in the Sky?
Binary Obfuscation from the Top-Down: Obfuscating Executables Without Writing Assembly
DJ Rene
Q & A with Bruce Schneier
Hacking the Wiimote and Wii Fit to Help the Disabled
TBA
0-day, gh0stnet and the inside story of the Adobe JBIG2 vulnerability
Death of Anonymous Travel
Cross Site Scripting Anonymous Browser 2.0
DJ njnTrubl
Beverage Cooling Contraption Contest
Open CTF Begins
More Tricks For Defeating SSL
Cloud Security in Map/Reduce
Maximum CTF: Getting the Most Out of Capture the Flag
Hacking WITH the iPod Touch
Socially Owned in the Cloud
8thNerve (DJ)
The Year In Computer Crime Cases
Deblaze - A Remote Method Enumeration Tool for Flex Servers
Subverting the World Of Warcraft API
Advancing Video Application Attacks with Video Interception, Recording, and Replay
Defcon Security Jam 2: The Fails Keep on Coming
Attacking SMS. It's No Longer Your BFF
Pepse (DJ)
Making Fun of Your Malware
Advanced MySQL Exploitation
That Awesome Time I Was Sued For Two Billion Dollars
Computer and Internet Security Law - A Year in Review 2008 - 2009
Proxy Prank-o-Matic
DJ Felix Kay
Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis and Visualization
Session Donation
three point Oh.
Why Tor is Slow, and What We're Doing About It
Ask EFF: The Year in Digital Civil Liberties
Stealing Profits from Stock Market Spammers or: How I learned to Stop Worrying and Love the Spam
Digital Phreak (DJ)
QueerCon PreFunk
Malware Freak Show
BitTorrent Hacks
Automated Malware Similarity Analysis
Corruptdata (DJ)
Criminal Charges are not pursued: Hacking PKI
Fragging Game Servers
Injecting Electromagnetic Pulses into Digital Devices
Attacking Tor at the Application Layer
Meet the Feds 2009
Pool Party - The Scritch (DJ)
Something about Network Security
Locally Exploiting Wireless Sensors
Hacking UFOlogy 102: The Implications of UFOs for Life, the Universe, and Everything
Pool Party - Inconspicuous Villain (DJ)
10,000ยข Hacker Pyramid
Pool Party - DJ Reeves
Black Ball - RECOGNIZE: The Goon Band
Hacker Karaoke
Pool Party - Simo Sleevin
Black Ball - Phylo (DJ)
Pool Party - Simon Plexus
Black Ball - E-Roc (DJ)
Queercon
Black Ball - Mitch Mitchem