Introduction to SDR and the Wireless Village
Hardware and Trust Security: Explain it like I’m 5
Hackers Hiring Hackers - How to Do Things Better
Hacking Web Apps
DEF CON 101: The Panel.
Seeing through the Fog
Alice and Bob are Really Confused
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Hacker in the Wires
Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey
Forensic Artifacts From a Pass the Hash Attack
Guests N’ Goblins: Exposing Wi-Fi Exfiltration Risks and Mitigation techniques
Sorry, Wrong Number: Mysteries Of The Phone System - Past and Present
Dark side of the ELF - leveraging dynamic loading to pwn noobs
Backdooring Git
Medical Devices: Pwnage and Honeypots
Secure Messaging for Normal People