Updated 07-04-01
 
 


DEF CON Nine Schedule
Here is the map of where things are.


Thursday the 12th
Time
13:00 - 22:00
Early registration in the main conference area
Bar and the hang out area opens
Friday the 13th
Time
Uber Haxor
General Session
Newbie
10:00 - 10:50 Biing Jong Lin, Chieh Chun Lin, Jan Che Su: A Survey of Country-Wide Web Server Security William L. Tafoya Freaky: OS/X and Macintosh Security
11:00 - 11:50 Jason Peel Cypherpunk Grade Covert Network Channels Bruce Schneier: Bruce Schneier Answers Questions Sharad: Security & Privacy (an introduction to some interesting
concepts)
12:00 - 12:50 FX: Attacking control, routing, and tunneling protocols James Bamford: Researching Secrets (Book signing right after) Shatter: FAQ The newbies: Information for people new to security, hacking or Defcon
13:00 - 13:50 Mark Grimes: TCP/IP Intelligent Agents: The Future of Electronic Warfare and Defense Simple Nomad: Widdershins: De-evolution and the Politics of Technology Dennis Salguero: The business side of starting your own consulting firm and how they can succeed
14:00 - 14:50 ph0tek: Writing Back Doors Kevin McPeake & Chris Goggans: Falling Dominos Robert Graham: Principles of Cyber Anarchy
15:00 - 15:50 TechnoDragon: Hardware mods, how to look for them Barry J. Stiefel: NAT For Newbies and Not-So-Newbies: A Tutorial
16:00 - 16:50 Raven Alder: A Perl script that tracks Denial of Service attacks across Cisco backbones Marcus Andersson: Firewalling wireless devices
17:00 - 17:50
DJ Area Set-up
18:00 - 18:50 Adam Bresson: Data Mining with PHP Stephen Hsu: Triangle Boy: IP spoofing and strong encryption in service of a free Internet
DJ Area Opens
'till 6AM
19:00 - 19:50 Nick Farr: Designing Secure Interfaces "for Dummies"
CyberEthical Surfivor: The Game
20:00 - 20:50 White Knight: Internet Video Surveillance
21:00 - 21:50   Movie: Cyber Traq
22:00 - 22:50
23:00 - 23:50 Haxor Jeopardy Round 1
00:00 - 00:50
01:00 - 01:50  
Saturday the 14th
Time
Uber Haxor
General Session
Newbie
10:00 - 10:50 Optyx: KIS - Kernel Intrusion System Daniel J. Burroughs: Applying Information Warfare theory to generate a higher level of knowledge from current IDS Dr. Cyrus Peikari: An open-source, international, attenuated computer virus
11:00 - 11:50 Bruce Potter & Adam: The Captive Portal Dr. Ian Goldberg: Arranging an Anonymous Rendezvous: Privacy Protection for Internet Servers Lile Elam: Renagade wireless networks: Creating Connectivity on Demand!
12:00 - 12:50 Ofir Arkin: Introducing X - Playing Tricks with ICMP Jay Beale: Attacking & Securing Red Hat AKA How Effective Has Bastille Linux Been? Len Sassaman: What is SSL, a CA and FreeCert?
13:00 - 13:50 Robert Grill, Michael Cohen: Windows NT and Novell Host Based Intrusion Detection Using Native Logging and 3rd Party Log Reporting Tools Thor: Grabbing User Credentials via W2k ODBC Libraries Dario D. Diaz: Digital Millennium Copyright Act
14:00 - 14:50 D-Krypt: Web Aplication Security cDc: Hacktavism Panel John Q. Newman: How 
background investigations are conducted & how they can be defeated
15:00 - 15:50 Halvar Flake: Reverse Engeneering Jim Christy: Meet the FED Panel Michael Wilson: Hacker Doctrine in Information Warfare
16:00 - 16:50 Thomas J. Munn: Using Open BSD, snort, Linux, and a few other tricks to set up a transparent, ACTIVE Ids Bryan Glancey: Weakest Link The Defendant: So you got your lame ass sued: A legal narrative
17:00 - 17:50
DJ Area Set-up
18:00 - 18:50 K2: Polymorphic shellcode API Peter Shipley: 802.11b War Driving
DJ Area Open
19:00 - 19:50 Rob Shein: Evaluating VPN Solutions Enrique Sanchez: Distributed Intrusion Detection System Evasion
20:00 - 20:50  
Social Engineering Contest
Black & White Ball
21:00 - 21:50
22:00 - 22:50
 TCP/IP Drinking Game
DJ Area Opens
'till 6AM
23:00 - 23:50
Haxor Jeopardy Round 2
00:00 - 00:50
01:00 - 01:50  
Sunday the 15th
Time
Uber Haxor
General Session
Newbie
10:00 - 10:50 Anders Ingeborn: Designing small payloads Richard Thieme: Hacking a Trans-Planetary Net: The Essence of Hacking in a Context of Pan-global Culture, the Wetware / dryware Interface, and Going to Europa David Gessel: Intro to Quantum Cryptography
11:00 - 11:50 Robert Muncy: Securing Cisco Routers Brenno de Winter: IP V6 Security Jennifer Granick: European Cybercrime treaty
12:00 - 12:50 Phil King: 8 Bits and 8 Pins: More Fun With Micro controller Hacking Keith Nugent: Windows 2000 Security: How to lock down your Win2k boxes Ryan Lackey: HavenCo
13:00 - 13:50 Dan Kaminsky: Gateway Cryptography:  Hacking Impossible Tunnels Through Improbable Networks with OpenSSH and the GNU Privacy Guard John L. Dodge & Bernadette H. Schell: Laurentian University Hacker Study Update
14:00 - 14:50 Dmitry Sklyarov & Andy Malyshev: eBooks security theory and practice HC: NTFS Alternate Data Streams Dan Moniz: The Impact of P2P on Security in the Enterprise
15:00 - 15:50   DEF CON Awards Ceremony: CTF, Scavenger Hunt, Coffee Wars & Social Engineering Contest Prizes Awarded.  
16:00 - 16:50
Thanks for coming! DEF CON closes up, but feel free to hang out.