0wn the Con
802.11 ObgYn or "Spread Your Spectrum"
All Your Packets are Belong To Us: Attacking Backbone Technologies
Are bad times good for security professionals?
Automated Mapping of Large Binary Objects
Blinded by Flash: Widespread Security Risks Flash Developers Don't See
Building an All-Channel Bluetooth Monitor
Building the 2008 and 2009 ShmooBall Launchers
Building Wireless Sensor Hardware and Software
Closing Remarks
Decoding the SmartKey
EDL Cloning for $250
Enough with the Insanity: Dictionary Based Rainbow Tables
Exploring Novel Ways in Building Botnets
Fail 2.0: Further Musings on Attacking Social Networks
Hack the Genome! The Age of Bimolecular Cryptology
Jsunpack: An Automatic JavaScript Unpacker
Keynote
Man in the Middling Everything with The Middler
Next Generation Wireless Recon, Visualizing the Airwaves
Off the Shelf Security Meeting Crime with an Open Mind
Opening Remarks
Open Vulture - Scavenging the Friendly Skies Open Source UAV Platform
Phishing Statistics and Intuitive Enumeration of Hosts and Roles
Pulling a John Connor: Defeating Android
Radio Reconnaissance in Penetration Testing - All Your RF Are Belong to Us
Reinterpreting the Disclosure Debate for Web Infections
Re-Playing with (Blind) SQL Injection
RFID Unplugged
Security vs. Usability: False Paradigms of Lazyness
Solve this Cipher and Win!
Storming the Ivy Tower: How to Hack Your Way into Academia
Stranger in a Strange Land: Reflections on a Linux Guy's First Year at Microsoft
Ten Cool Things You Didn't Know About Your Hard Drive!
The Day Spam Stopped (The Srizbi Botnet Takedown)
The Fast-Track Suite: Advanced Penetration Techniques Made Easy
The Gentlemen's Agreement: Pwning Friends Legally for Fun, ????, and Profit
The OWASP AntiSamy Project
They Took My Laptop! U.S. Search and Seizure Explained
Watching the Watcher: The Prevalence of Third-party Web Tracking