Registration
Defending against Targeted attacks using Duck tape, Popsicle Sticks and Legos
Printer to PWND: Leveraging Multifunction Printers During Penetration Testing
Computer Search and Seizure
Fun with Flow
TEAM JOCH vs. Android: The Ultimate Showdown
Unlocking the Toolkit: Attacking Google Web Toolkit Applications
Yet Another Heapspray Detector
Hop Hacking Hedy
Hard Drive Paperweight: Recovery from a Seized Motor!
Exploiting the Hard-Working DWARF
Printers Gone Wild!
Tracking Flaws – Stream Reassembly Issues in Snort IPS
INTERSECT: Combining Commercial/FOSS Tools with Custom Code to Root Out Malware
Attacking 3G and 4G mobile telecommunications networks
An Evite from Surbo? Probably an invitation for trouble.
Project Ubertooth: Building a Better Bluetooth Adapter
Defeating mTANs for profit
ShmooCon Labs Goes To College
3D Modeling and Visualization of Real Time Security Events
Reverse Engineering Using the Android Emulator
The Getaway: Methods and Defenses for Data Exfiltration
GET LAMP
Fire Talks