Discovering Dark Matter: Towards better Android Malware Heuristics -- Skytalk edition
From Nukes to Cyber – Alternative Approaches for Proactive Defense and Mission Assurance
Dude, WTF in my car?
Do-It-Yourself Cellular IDS
Predicting Susceptibility to Social Bots on Twitter
Insecurity - A Failure of Imagination
Cycling and Hacking to Defcon
The Politics of Privacy and Technology: Fighting an Uphill Battle
The Road Less Surreptitiously Traveled
Fear the Evil FOCA: IPv6 attacks in Internet connections
Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock
All Your Base Still Belong To Us: Physical Penetration Testing Tales From The Trenches
Defeating Internet Censorship with Dust, the Polymorphic Protocol Engine
Home Invasion 2.0 - Attacking Network-Controlled Consumer Devices
BoutiqueKit: Playing WarGames with expensive rootkits and malware
Legal Aspects of Full Spectrum Computer Network (Active) Defense
DEF CON Comedy Jam Part VI, Return of the Fail
#FreeCrypt0s: Using SDR to prevent him from getting rooted!
Privacy In DSRC Connected Vehicles
RFID Hacking: Live Free or RFID Hard
Android WebLogin: Google's Skeleton Key
We are Legion: Pentesting with an Army of Low-power Low-cost Devices
Hacking the Brew
Building an Android IDS on Network Level
Phantom Network Surveillance UAV / Drone
Stalking a City for Fun and Frivolity
Defeating SEAndroid
Pwn The Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices
Hardware Hacking with Microcontrollers: A Panel Discussion
Oldtimers v. N00bz 2.0
Doing Bad Things to 'Good' Security Appliances
Safety of the Tor network: a look at network diversity, relay operators, and malicious relays
Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks
DC Awards
An Open Letter - The White Hat's Dilemma: Professional Ethics in the Age of Swartz, PRISM and Stuxnet
Occam's Katana: defeating big data analytics
How to Hack Your Mini Cooper: Reverse Engineering Controller Area Network (CAN) Messages on Passenger Automobiles
De-Anonymizing Alt.Anonymous.Messages
BYO-Disaster and Why Corporate Wireless Security Still Sucks
Electromechanical PIN Cracking with Robotic Reconfigurable Button Basher (and C3BO)
PowerPreter: Post Exploitation Like a Boss
Suicide Risk Assessment and Intervention Tactics
Data Evaporation from SSDs
Noise Floor: Exploring the world of unintentional radio emissions
GoPro or GTFO: A Tale of Reversing an Embedded System
DNS May Be Hazardous to Your Health
OTP, It won't save you from free rides!
Bitcoin, Litecoin, and Alternative Cryptocurrencies - Pros, Cons, and Threats
JTAGulator: Assisted Discovery Of On-Chip Debug Interfaces
How to Disclose or Sell an Exploit Without Getting in Trouble
Reality Hackers
The Policy Wonk Lounge