DEF CON 21 - Thursday, August 1
10:00
HighWiz, Lockheed, LosT, Pyr0, Roamer
DEF CON 101
Hofmann, Rennie
Hacker Law School
12:00
Lockheed, Naifx, Roamer
Hacking Management: From Operations to Command
Anch
Pentesters Toolkit
13:00
Beaker, Flipper
The Ninjaneers: Getting started in Building Your Own Robots for World Domination.
Bayles
Oil & Gas Infosec 101
14:00
LosT
Decrypting DEFCON: Foundations Behind Some of the Games Hackers Play
ZeroChaos
Meet Pentoo, the Longest Running Pen-testing Linux Distro
15:00
Gareau
Intro to Web Application Hacking
DaKahuna, Mellendick
Wireless Penetration Testing 101 & Wireless Contesting
DEF CON 21 - Friday, August 2
09:00
Dallas, Ohm
Liberator: 3-D printing a plastic gun
10:00
DeTrani
Proliferation
LosT, Moss
The DEF CON 21 Badge
DePerry, Ritter
I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell
Miller, Valasek
Adventures in Automotive Networks and Control Units
Seeber
All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio
Antitree
Bringing Intelligence back to the hacker community
11:00
Keenan
Torturing Open Government Systems for Fun, Profit and Time Travel
Weatherford
The Growing Irrelevance of US Government Cybersecurity Intelligence Information
Butler, Koscher
The Secret Life of SIM Cards
Zoz
Hacking Driverless Vehicles
Linn
Swiping Cards At The Source: POS & Cash Machine Security
12:00
Soghoian
Backdoors, Government Hacking and The Next Crypto Wars
Hitchcock, Kennedy
The Dirty South – Getting Justified with Technology
Smith, Strazzere
DragonLady: An Investigation of SMS Fraud Operations in Russia
Flipper
10000 Yen into the Sea
Lovinger, Scott
Making Of The DEF CON Documentary
Matwyshyn
Hacked Up
13:00
Perklin
ACL Steganography - Permissions to Hide Your Porn
Werner
Prowling Peer-to-Peer Botnets After Dark
Caudill
Offensive Forensics: CSI for the Bad Guy
Alecu
Business logic flaws in mobile operators services
Anch
The art of the Rig - Building a pen-test rig that isn't worthless
13:30
Duszynski
Pwn'ing You(r) Cyber Offenders
14:00
Griffin
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Bowne, Prince
Evil DoS Attacks and Strong Defenses
Bandelgar, Behrens
MITM All The IPv6 Things
Burbidge, Li, Ocko, Paul
Meet the VCs
Auerbach, Galperin, Hofmann, Jaycox, Opsahl, Stoltz
Ask the EFF: The Year in Digital Civil Liberties
Dunning
The Glitch: Bringing Hacking Hardware to the Masses
14:30
Gevorgyan, Toukharian
HTTP Time Bandit
15:00
Baker, Etemadieh, Heres, Nielsen
Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot
Lee, Miu
Kill 'em All — DDoS Protection Total Annihilation!
Lee
How to use CSP to stop XSS
Abdo, Crockford, Crump, Ozer, Soghoian
The ACLU Presents: NSA Surveillance and More
Carter
Hacking Interfaces with your Mind
15:30
Hendricks
So You Think Your Domain Controller is Secure?
16:00
Selifonov
A Password is Not Enough: Why disk encryption is broken and how we might fix it
Ozavci
VoIP Wars: Return of the SIP
Milam
Getting The Goods With smbexec
Thieme
The Government and UFOs: A Historical Analysis by Richard Thieme
Franken, Laurie
Decapping Chips the Easy^W Hard Way
Saher
Project CANCER: Bringing VX Back
16:30
Ming
Abusing NoSQL Databases
17:00
Zatko
Unexpected Stories From a Hacker Who Made it Inside the Government
Schultz
Examining the Bitsquatting Attack Surface
Schrenk
How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers
Heid, Roamer, Soto, Tuna
Digital Warfare, InfoSec Research, and The 2nd Amendment
17:30
Oberli
Please Insert^W Inject More Coins
DEF CON 21 - Saturday, August 3
09:00
McDevitt, Shah, Shaw
Discovering Dark Matter: Towards better Android Malware Heuristics -- Skytalk edition
10:00
Elder
From Nukes to Cyber – Alternative Approaches for Proactive Defense and Mission Assurance
Illera, Vidal
Dude, WTF in my car?
Davidoff, Fretheim, Harrison, Price
Do-It-Yourself Cellular IDS
Sumner, Wald
Predicting Susceptibility to Social Bots on Twitter
Bluzmanis, Tobias
Insecurity - A Failure of Imagination
Bourget, Potter
Cycling and Hacking to Defcon
11:00
Fulton, Zolnikov
The Politics of Privacy and Technology: Fighting an Uphill Battle
pukingmonkey
The Road Less Surreptitiously Traveled
Alonso
Fear the Evil FOCA: IPv6 attacks in Internet connections
dlaw, gdkar, robj
Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock
Regan, Thomas
All Your Base Still Belong To Us: Physical Penetration Testing Tales From The Trenches
12:00
Wiley
Defeating Internet Censorship with Dust, the Polymorphic Protocol Engine
Bryan, Crowley, Savage
Home Invasion 2.0 - Attacking Network-Controlled Consumer Devices
Thomas
BoutiqueKit: Playing WarGames with expensive rootkits and malware
Clark
Legal Aspects of Full Spectrum Computer Network (Active) Defense
Arlen, Graham, Hoff, Maynor, Mogull, Mortman
DEF CON Comedy Jam Part VI, Return of the Fail
N00bz, Raj
#FreeCrypt0s: Using SDR to prevent him from getting rooted!
13:00
Dudley
Privacy In DSRC Connected Vehicles
Brown
RFID Hacking: Live Free or RFID Hard
Young
Android WebLogin: Google's Skeleton Key
Polstra
We are Legion: Pentesting with an Army of Low-power Low-cost Devices
Roberts
Hacking the Brew
13:30
Sanchez
Building an Android IDS on Network Level
14:00
Hill
Phantom Network Surveillance UAV / Drone
O'Connor
Stalking a City for Fun and Frivolity
Oliva
Defeating SEAndroid
McGrew
Pwn The Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices
FirmWarez, Grand, LosT, RenderMan, Smith
Hardware Hacking with Microcontrollers: A Panel Discussion
Panel
Oldtimers v. N00bz 2.0
14:30
Bathurst, Carey
Doing Bad Things to 'Good' Security Appliances
15:00
Sandvik
Safety of the Tor network: a look at network diversity, relay operators, and malicious relays
Scott
Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks
DC Awards
Stamos
An Open Letter - The White Hat's Dilemma: Professional Ethics in the Age of Swartz, PRISM and Stuxnet
Bird
Occam's Katana: defeating big data analytics
15:30
Staggs
How to Hack Your Mini Cooper: Reverse Engineering Controller Area Network (CAN) Messages on Passenger Automobiles
16:00
Ritter
De-Anonymizing Alt.Anonymous.Messages
Hoover, Snodgrass
BYO-Disaster and Why Corporate Wireless Security Still Sucks
Engler, Vines
Electromechanical PIN Cracking with Robotic Reconfigurable Button Basher (and C3BO)
Mittal
PowerPreter: Post Exploitation Like a Boss
Baldet
Suicide Risk Assessment and Intervention Tactics
16:30
Bowne
Data Evaporation from SSDs
17:00
Elliott
Noise Floor: Exploring the world of unintentional radio emissions
Lanier, Manning
GoPro or GTFO: A Tale of Reversing an Embedded System
Stucke
DNS May Be Hazardous to Your Health
bughardy, Eagle1753
OTP, It won't save you from free rides!
Ball, Heid, Snyder, Tolle, YTcracker
Bitcoin, Litecoin, and Alternative Cryptocurrencies - Pros, Cons, and Threats
17:30
Grand
JTAGulator: Assisted Discovery Of On-Chip Debug Interfaces
18:00
Denaro
How to Disclose or Sell an Exploit Without Getting in Trouble
20:00
Wexler
Reality Hackers
The Policy Wonk Lounge
DEF CON 21 - Sunday, August 4
10:00
Corman, Percoco
The Cavalry Isn't Coming: Starting the Revolution to Fsck it All!
Filson, Fuller
gitDigger: Creating useful wordlists from public GitHub repositories
Payer
Exploiting Music Streaming with JavaScript
Riley
Defense by numbers: Making problems for script kiddies and scanner monkeys
10:30
Bonnewell
Made Open: Hacking Capitalism
11:00
Schiffman, SkyDog
The Dark Arts of OSINT
Gorenc, Spelman
Java Every-Days: Exploiting Software Running on 3 Billion Devices
Cruz, Kang
Resting on Your Laurels will get you Pwned: Effectively Code Reviewing REST Applications to avoid getting powned
Acr0nym, Hybinette
LAZZORS! PEW! PEW!
11:30
Caceres, Rogers
The dawn of Web 3.0: website mapping and vulnerability scanning in 3D, just like you saw in the movies
12:00
Sikka
EMET 4.0 PKI Mitigation
Baumgarten
Combatting Mac OSX/iOS Malware with Data Visualization
Malone
HiveMind: Distributed File Storage Using JavaScript Botnets
London, O'Meara
This presentation will self-destruct in 45 minutes: A forensic deep dive into self-destructing message apps
Dudley
Strange interactions in personal data: Brokers and the CFAA
12:30
Marschalek
A Thorny Piece Of Malware (And Me): The Nastiness of SEH, VFTables & Multi-Threading
13:00
Costello, Cui
Stepping P3wns: Adventures in full spectrum embedded exploitation (and defense!)
Blacher
Transcending Cloud Limitations by Obtaining Inner Piece
Pinto
Defending Networks with Incomplete Information: A Machine Learning Approach
Ortiz
Fast Forensics Using Simple Statistics and Cool Tools
0nlychick
The Continued Rise of Idiocracy: CCSS, PBI and other education acronyms that nobody understands
13:30
Chechik, Davidi
Utilizing Popular Websites for Malicious Purposes Using RDI
14:00
Thabet
EDS: Exploitation Detection System
Burroughs
Open Public Sensors, Trend Monitoring and Data Fusion
Cohen
Blucat: Netcat For Bluetooth
Perklin, Robi
Forensic Fails - Shift + Delete won't help you here
Costello
Network Survival WCS
14:30
Kottmann, Steele
Collaborative Penetration Testing With Lair
15:00
Caceres
Conducting massive attacks with open source distributed computing
Bialek
PowerPwning: Post-Exploiting By Overpowering PowerShell
Yavor
BYOD PEAP Show
Pickett
Let's screw with nmap
Krabec
Owning Management with Standards
15:30
soen
Evolving Exploits Through Genetic Algorithms
16:00
Davis
Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions
Holeman
The Bluetooth Device Database
Thompson
C.R.E.A.M. Cache Rules Evidently Ambiguous, Misunderstood
Public
Challenges being a criminal defense digital forensics expert
17:00
Closing Ceremonies


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.