Liberator: 3-D printing a plastic gun
Proliferation
The DEF CON 21 Badge
I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell
Adventures in Automotive Networks and Control Units
All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio
Bringing Intelligence back to the hacker community
Torturing Open Government Systems for Fun, Profit and Time Travel
The Growing Irrelevance of US Government Cybersecurity Intelligence Information
The Secret Life of SIM Cards
Hacking Driverless Vehicles
Swiping Cards At The Source: POS & Cash Machine Security
Backdoors, Government Hacking and The Next Crypto Wars
The Dirty South – Getting Justified with Technology
DragonLady: An Investigation of SMS Fraud Operations in Russia
10000 Yen into the Sea
Making Of The DEF CON Documentary
Hacked Up
ACL Steganography - Permissions to Hide Your Porn
Prowling Peer-to-Peer Botnets After Dark
Offensive Forensics: CSI for the Bad Guy
Business logic flaws in mobile operators services
The art of the Rig - Building a pen-test rig that isn't worthless
Pwn'ing You(r) Cyber Offenders
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Evil DoS Attacks and Strong Defenses
MITM All The IPv6 Things
Meet the VCs
Ask the EFF: The Year in Digital Civil Liberties
The Glitch: Bringing Hacking Hardware to the Masses
HTTP Time Bandit
Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot
Kill 'em All — DDoS Protection Total Annihilation!
How to use CSP to stop XSS
The ACLU Presents: NSA Surveillance and More
Hacking Interfaces with your Mind
So You Think Your Domain Controller is Secure?
A Password is Not Enough: Why disk encryption is broken and how we might fix it
VoIP Wars: Return of the SIP
Getting The Goods With smbexec
The Government and UFOs: A Historical Analysis by Richard Thieme
Decapping Chips the Easy^W Hard Way
Project CANCER: Bringing VX Back
Abusing NoSQL Databases
Unexpected Stories From a Hacker Who Made it Inside the Government
Examining the Bitsquatting Attack Surface
How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers
Digital Warfare, InfoSec Research, and The 2nd Amendment
Please Insert^W Inject More Coins