Speakers
- Agent X
- Iftach Ian Amit
- Ofir Arkin
- atlas
- Kevin Bankston
- Andrea Barisani
- John Benson
- Peter Berghammer
- Daniele Bianco
- Sean M. Bodmer
- Sam Bowne
- Sergey Bratus
- Taylor Brinton
- David Byrne
- D.J. Capelis
- Jim Christy
- Patrick Chung
- Anton Chuvakin
- Maria Cirino
- Robert W. Clark
- Greg Conti
- Crispin Cowan
- Jesse D'Aguanno
- The Dark Tangent
- Rick Deacon
- Dead Addict
- Delchi
- Jared DeMott
- Ganesh Devarajan
- Deviant Ollam
- Roger Dingledine
- Toralv Dirro
- Jerry Dixon
- I)ruid
- Steve Dunker
- Peter Eckersley
- Luiz Eduardo
- Dr. Richard Enbody
- Joel Eriksson
- Nathan S. Evans
- Gadi Evron
- Ben Feinstein
- Matt Fiddler
- Tim Fowler
- Zac Franken
- Andy Fried
- Kenneth Geers
- geoffrey
- Dave Goldsmith
- Damian Gomez
- K N Gopinath
- Joe Grand
- Jennifer Granick
- Thomas Grasso
- Christian Grothoff
- Lukas Grunwald
- Barry Gundy
- Peter Gutmann
- David Gustin
- Ian G. Harris
- John Heasman
- Aaron Higbee
- Ricky Hill
- Marcia Hofmann
- Greg Hoglund
- Dr. Thomas J. Holt
- Broward Horne
- David Hulton
- Bob Hopper
- Dan Hubbard
- Jon Iadonisi
- Mike Jacobs
- Karl Janmar
- Luke Jennings
- Dave Josephsen
- Dan Kaminsky
- Vitaliy Kamlyuk
- Patrik Karlsson
- King Tuna
- Dirk Kollberg
- Tim Kosiba
- Benjamin Kurtz
- Lee Kushner
- Mickey Lasky
- Bob Lentz
- Edward Lee
- Janne Lindqvist
- David Litchfield
- Johnny Long
- Myles Long
- Marce Luck
- Kevin Manson
- Marklar
- Rich Marshall
- Nick Mathewson
- David Maynor
- Nathan McFeters
- Mark McGovern
- Haroon Meer
- Charlie Miller
- Doug Mohney
- H.D. Moore
- David Mortman
- Scott Moulton
- Shawn Moyer
- Alexander Muentz
- Rich Murphey
- Mike Murray
- Brett Neilson
- Ne0nRa1n
- Noid
- Claes Nyberg
- Christer Öberg
- Danny O'Brien
- Brendan O'Connor
- Robert O'Hara
- Kurt Opsahl
- Steve Orrin
- Alfredo Ortega
- Chris Palmer
- Daniel Peck
- Mike Perry
- Aaron Peterson
- Pilgrim
- Plet
- Bruce Potter
- Ken Privette
- Paul Proctor
- Dr. Bill Punch
- Danny Quist
- Aviv Raff
- Vivek Ramachandran
- Renderman
- Keith Rhodes
- Matt Richard
- Billy Rios
- Ian Robertson
- Martyn Ruks
- Tony Sager
- Oskar Sandberg
- Michael Schearer
- Bruce Schneier
- Michael Schrenk
- Ari Schwartz
- Jason Scott
- Dror Shalev
- Zed A. Shaw
- Marco Slaviero
- David C. Smith
- Window Snyder
- Julian Spillane
- Squidly1
- Alex Stamos
- Robert Stoudt
- Tom Stracener
- Subere
- Sysmin
- Tatsumori
- Richard Thieme
- Thorn
- theprez98
- Marc Weber Tobias
- Steve Topletz
- Schuyler Towne
- Valsmith
- Randal Vaughn
- Paul Vixie
- Mario Vuksan
W
- Linton Wells
- Jacob West
- Thomas Wilhelm
- Christian Wirth
- Dov Yoran
- Paul Sebastian Ziegler
- Matt Zimmerman
- Philip R. Zimmermann
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
V
Y
Z
Highlights
DefCon 15 Program
Lost your program? Didn't pick one up? Couldn't make it to the con? Here it is!(PDF file - 7.3 MB)
Contest Results
May be found on the Defcon 15 Post-Con pageAudio/Video RSS Feeds
VideoAudio
DEF CON 15 Website
DEF CON 15 Post-Con PagePress Coverage
- Badge Hack at DefCon - Wired News
- Security Bites Podcast: Defeating online banking security - Cnet News
- How phishers defeat online banking controls - Cnet News
- New Bank Practices Make Hacking Easier - Dark Reading
- Capture the Experience - Dark Reading
- Flash mob in Estonia - Cnet News
- The Vulnerability Disclosure Game: Are We More Secure? - CSO Magazine
- Hackers Welcome - Forbes
- E-Voting Certification Gets Security Completely Backward - Wired News
- Hackers sought as allies in war on terrorism and cyber crim - AFP
- I Married a Fed at DefCon - Wired News
- Defcon 2007 Mayhem, mystery and marriage - TG Daily
- In defense of Black Hat and Defcon - Cnet News
- Black Hat 'supersizes' in Las Vegas - Cnet News
- Letter From Hackerdom: Not the Same Old DEF CON, Black Hat - Washington Post Blog
- Hackers, researchers gather for Black Hat, Defcon conventions - Mercury News
- Basics: Black Hat Briefings and Defcon 15 - Mercury News
- Takahashi: Foes mingle at Las Vegas hacking conferences - Mercury News
- Takahashi: Good hackers and bad (53%) - Mercury News
- The romance and mystery of a good hack - The Register
- Hacking for hijinks - The Register
- A Defcon survival guide - The Register
- Forbes Offers a Sympathetic Portrayal of Hackers - Slashdot
- The past is prologue at Black Hat Briefings - Government Computer News
- L0pht in Transition - CSO Magazine
- DefCon Recap - Dark Reading
- How to Land the Best Security Job - Dark Reading
- Overheard at DefCon - Security Focus
- Black Hat wrap-up: Less hackers, but plenty of flaws - SC Magazine
- Educating hackers and defenders Hindu - Business Line
- Podcast: News to know midday: Fake Steve; New iMac; DEF CON flap revisited - ZD Net
- Top 10 geek vacations, Part II - InfoWorld
- Hacker space movement sought for U.S. - Wired Blog
- Germany enacts 'anti-hacker' law - The Register
- Websense to Unveil Web 2.0 Threat Detection at Defcon - PC Magazine
- Websence Protects Web 2.0 - ABC News
- Websense to Unveil Web 2.0 Threat Detection at Defcon - Eweek
- DEF CON - Websense lures Web 2.0 attackers with HoneyJax - Network World
- Iphone partially unlocked - TG Daily
- Will the iPhone be iPwned? - Security Focus
- Picking locks the old-school way - Wired News
- Medeco Readies Assembly-Line Fix for DefCon Lock Hack - Wired News
- Ultra-High Security Locks Used by White House Easily Opened by 12-Year Old Girl - InfoWorld
- Lockpicking for Geekkids - Wired Blog
- White House High-Security Locks Broken: Bumped and Picked at DefCon - Wired News
- Hackers click locks open at conference in US - AFP
- The Study of Physical Hacks at DefCon - Slashdot
- Anti-theft technology - Government Computer News
- Simple Hack Can Unlock Most Any Office Door - CSO Magazine
- Polymorphic Malware: A Threat That Changes on the Fly - CSO Magazine
- Researcher: Media players have critical flaws - MSNBC
- Researcher: media players invite malware - ABC News
- How an undercover NBC reporter was outed by hackers - Salon.com
- Defcon: Hacks, Lies, and Videotape - Cio-Today
- Dateline Mole Allegedly at DefCon with Hidden Camera -- Updated: Mole Caught on Tape - Wired News
- Defcon drama: Undercover reporter bolts after outing - Cnet News
- Middle America, Meet The Hacker - Forbes
- Exposed undercover reporter flees hackers conference - AFP
- Undercover 'Dateline' Reporter Outed, Flees from Defcon - PC Magazine
- Undercover TV Producer Bootd from DefCon - ABC News
- NBC muckraker gets hacked at Defcon - The Register
- Dateline NBC Mole Outed At Defcon - Slashdot
- DefCon: Hacking meetup infiltrated by Dateline 'media mole' - CIO Magazine
- Undercover NBC Dateline reporter bolts from DEF CON 2007 - ZD Net
- DefCon's Moss: Undercover Reporter Damages 'Neutral Zone' - Information Week
- NBC Dateline's "Catch a Predator" Series Pays Cops and Undercover "Victims" -- UPDATED - Wired News
- The Great Rootkit Debate - Dark Reading
- Hacker shows flaw in software that controls key infrastructure - Computer Crime Research Center
- America's Hackable Backbone - Forbes
- Researcher worries about cyber-hijackers - MSNBC
- Hacker shows flaw in software that controls key infrastructure - Mercury News
- FaceBook code leaked on Site - ABC News
- Hackers: Networking Sites Flawed - The St. Petersburg Times
- - Hackers: Social Networking Sites Flawed Fox
- Hackers: Social networks vulnerable - USA Today
- MySpace weakness patched, hacker's profile deleted - AFP
- Myspace Hacker's Profile Deleted - ABC News
- Morning Buzz: Aug. 6, 2007 - U.S. News and World Report
- Teaching hacking helps students, professors say - Security Focus
- Teaching hacking helps students, professors say - Dark Reading
- 2 Screws, 1 Plastic Cover, How Many Airports Infiltrated? - Eweek
- Open Sesame: Access Control Hack Unlocks Doors - Wired News
- Access Card Systems -- Trivially Vulnerable - Washington Post Blog
- Buffer Overflow Found in RFID Passport Readers - Slashdot
- Arphid Watch: A Passport Crashing Technique - Wired Blog
- Scan this guy's e-passport and watch your system crash - ABC News
- An Inside Look at Internet Attackers' Black Marke - PCWorld
- Online Crooks Fine-tune Selling of Malware - CIO India
- An Inside Look at Internet Attackers' Black Market - ABC News
- Black market for malware a thriving place - The Register
- Malware: Serious Business - Dark Reading
- There's hope for stopping mobile malware - InfoWorld
- Hacking Without Exploits - Dark Reading
- A Visit to the Drive Doctor - Dark Reading
- New Wireless Security Threats Revealed at Defcon 15 - Government Technology
- AirDefense Makes New Detection And Protection Methods Available to Customers - Networkcomputing
- AirTight Revealed Potent Variant of Evil Twin at DEF CON 15 - Web Services Journal NJ
- Is AMD's 65nm SOI process broken? - ZD Net
- Finjan Identifies Important Vulnerability in Windows Vista's Contact Gadget, Leading to a Security Update Issued by Microsoft - ITNews Italy
- Exploits in the Fast Lane - Dark Reading
- Security firm makes it easy to come up with attack code - ComputerWorld UK
- Defcon: Security firm automates generation of attack code - ComputerWorld
- Immunity releases new exploit-writing tool - ComputerWeeklyUK
- Security firm makes it easy to come up with attack code - Tech World
- Security firm makes it easy to come up with attack cod - ComputerWorld UK
- Defcon: Security firm automates generation of attack code - ComputerWorld
- Immunity releases new exploit-writing tool - ComputerWeeklyUK
- Immunity releases new exploit-writing tool - Search Security
- Immunity says debugger tool will cut zero-day attacks - ComputerWeeklyUK
- Immunity Unleashes Automatic Exploit Tool - PC Magazine
- Securty Firm Autmates Attack Code Generation - ABC News
- Defcon: Security firm automates generation of attack code - CIO Magazine
- How to break forensics software - The Inquirer
- Researcher: media players invite malware - USA Today
- Microsoft to update critical Windows, Office, flaws. - Search Security
- Mozilla: 10-Day Patch Guarantee 'Not our Policy' - IDG News Service
- net.wars: Wall of sheep - Newswireless.com
- Browsing the Intranet Problem - Dark Reading
- Internet Explorer and Your Web Site's Privac - Washington Post Blog
- Hackers bite into "cookies" to plunder user data from websites - AFP
- Wi-Fi hot spots are easy prey for hackers - Detroit Free Press
- Your Wi-Fi can tell people a lot about you - Cnet News
- Public Wi-Fi use raises hacking risk - USA Today
- Flash: Public Wi-Fi even more insecure than previously thought - The Register
- DEF CON to Demo New Wi-Fi Hacks - Security News Portal
- XeroBank Launches Anonymizing Tool Suite - Dark Reading
Badges
Banks
CTF
Cyber War
Disclosure
E-voting
Feds
General
Germany
Honeypots
iPhone
Lock Picking
Malware
Media Players
NBC Undercover
Rootkits
SCADA
Social Networks
MySpace
Speakers
Sam Bowne
Zac Franken
Lukas Grunwald
Thomas Holt
Mikko Hyyponen
Charlie Miller
HD Moore
Scott Moulton
Vendors
AirDefense
AirTight
AMD
Finjan
Immunity
ISEC
Microsoft
Mozilla
Wall of Sheep
Web Hacking
Wi-Fi
Xerobank
Speakers & Presentations
encoded in h.264 from original .mov (Video iPod friendly)Agent X
44 Lines about 22 Things that keep me up at Night
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)atlas UPDATED
Remedial Heap Overflows: dlmalloc style
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)Andrea Barisani & Daniele Bianco
Injecting RDS-TMC Traffic Information Signals
a.k.a. How to freak out your Satellite Navigation
Read It! (Slides | White Paper) Extras (ZIP)
See It! (m4v Video)
Hear it! (m4b Audio) John Benson (jur1st)
Bridging the Gap Between Technology and the Law
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Peter Berghammer
A Journalist's Perspective on Security Research
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Sean M. Bodmer UPDATED
Analyzing Intrusions & Intruders
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Sergey Bratus
Entropy-based data organization tricks for log and packet capture browsing
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)David Byrne
Intranet Invasion With Anti-DNS Pinning
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)D.J.Capelis UPDATED
Virtualization: Enough holes to work Vegas
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Jim Christy, Jerry Dixon, Tim Fowler, Andy Fried, Barry Gundy, Bob Hopper, Jon Iadonisi, Mike Jacobs, Tim Koshiba, Bob Lentz, Kevin Manson, Rich Marshall, Ken Privette, Keith Rhodes, Linton Wells
Panel: Meet the Fed
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Paul Proctor, Patrick Chung, Maria Cirino,
Mark McGovern, Dov Yoran
Panel: Meet the VCs
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Robert W. Clark
Computer and Internet Security Law - A Year in Review 2006 - 2007
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Crispin Cowan
Securing Linux Applications With AppArmor
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Jesse "x30n" D'Aguanno
LAN Protocol Attacks Part 1 - Arp Reloaded
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Rick Deacon
Hacking Social Lives: MySpace.com
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)Dead Addict
Picking up the Zero Day; An Everyones Guide to Unexpected Disclosures
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)Jared DeMott, Dr. Richard Enbody, Dr. Bill Punch UPDATED
Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)Ganesh Devarajan UPDATED
Unraveling SCADA Protocols: Using Sulley Fuzzer
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Deviant Ollam, Noid, Frank Thornton (a.k.a. Thorn), jur1st
Boomstick Fu: The Fundamentals of Physical Security at its Most Basic Level
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Roger Dingledine
Tor and blocking-resistance
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Toralv Dirro, Dirk Kollberg UPDATED
Trojans: A Reality Check
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)I)ruid UPDATED
Real-time Steganography with RTP
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)Steve Dunker
Everything you ever wanted to know about Police Procedure in 50 minutes
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)Luiz Eduardo
The Hacker Society around the (corporate) world
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Joel Eriksson, Karl Janmar, Claes Nyberg, Christer Öberg UPDATED
Kernel Wars
Read It! (Slides | White Paper) Extras (ZIP) Code (ZIP) See It! (m4v Video) Hear it! (m4b Audio)Nathan S. Evans, Christian Grothoff
Routing in The Dark: Pitch Black
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)Gadi Evron
Estonia: Information Warfare and Strategic Lessons
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Gadi Evron, Andrew Fried, Thomas Grasso, Dan Hubbard, Dan Kaminsky, Randy Vaughn, Paul Vixie
Panel: Internet Wars 2007
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Zac Franken
Biometric and token based access control systems: Are you protected by two screws and a plastic cover? Probably.
Read It! (PDF) See It! (m4v Video)Kenneth Geers UPDATED
Greetz from Room 101
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)geoffrey UPDATED
The Completion Backward Principle
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Damien Gomez
Intelligent debugging for VulnDev
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)K.N. Gopinath UPDATED
Multipot: A More Potent Variant of Evil Twin
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)Joe Grand
Making of the DEF CON 15 Badge
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)Jennifer Granick
Disclosure and Intellectual Property Law: Case Studies
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Lukas Grunwald
Security by Politics - Why it will never work
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)David Gustin, Ab3nd
Hardware Hacking for Software Geeks
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Peter Gutmann
The Commercial Malware Industry
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Ian G. Harris
INTERSTATE: A Stateful Protocol Fuzzer for SIP
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)John Heasman
Hacking the Extensible Firmware Interface
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Aaron Higbee
Hack Your Car for Boost and Power!
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Ricky Hill
GeoLocation of Wireless Access Points and "Wireless GeoCaching"
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)Broward Horne
Click Fraud Detection with Practical Memetics
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)David Hulton
Faster PwninG Assured: New adventures with FPGAs
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Dan Hubbard UPDATED
HoneyJax (AKA Web Security Monitoring and Intelligence 2.0)
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Luke Jennings
One Token to Rule Them All: Post-Exploitation Fun in Windows Environments
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)Dave Josephsen
Homeless Vikings, (short-lived bgp prefix hijacking and the spamwars)
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)Dan Kaminsky
Black Ops 2007: Design Reviewing The Web
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Patrik Karlsson UPDATED
SQL injection and out-of-band channeling
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Edward Lee UPDATED
Comparing Application Security Tools
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Janne Lindqvist
IPv6 is Bad for Your Privacy
Read It! (Slides | White paper) See It! (m4v Video) Hear it! (m4b Audio)Myles Long, Rob "Flack" O'Hara, Christian "RaDMan" Wirth UPDATED
Self-Publishing and the Computer Underground
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Nick Mathewson UPDATED
Social Attacks on Anonymity Networks
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Nick Mathewson UPDATED
Technical Changes Since The Last Tor Talk
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Haroon Meer, Marco Slaviero UPDATED
It's All About the Timing
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)Charlie Miller UPDATED
How smart is Intelligent Fuzzing
- or -
How stupid is Dumb Fuzzing?
Read It! (Slides | White Paper)
See It! (m4v Video)
Hear it! (m4b Audio) Doug Mohney
The Next Wireless Frontier - TV White Spaces
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)H.D. Moore, Valsmith UPDATED
Tactical Exploitation
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)David Mortman, Paul Proctor,
Window Snyder, Ian Robertson, David Maynor,
Dave Goldsmith
Disclosure Panel
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Scott Moulton
Re-Animating Drives & Advanced Data Recovery
Read It! (White Paper) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)Shawn Moyer
(un)Smashing the Stack: Overflows, Countermeasures, and the Real World
Read It! (White Paper) See It! (m4v Video) Hear it! (m4b Audio)Alexander Muentz UPDATED
Protecting your IT infrastructure from legal attacks- Subpoenas, Warrants and Transitive Trust
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)Mike Murray, Lee Kushner
Creating and Managing Your Security Career
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Mike Murray, Anton Chuvakin
The Science of Social Engineering: NLP, Hypnosis and the science of persuasion
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Brett Neilson, Taylor Brinton UPDATED
Being in the know... Listening to and understanding modern radio systems
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)Ne0nra1n, Julian Spillane
Hack your brain with video games
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Danny O'Brien
Digital Rights Worldwide: Or How to Build a Global Hacker Conspiracy
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Brendan O'Connor
Greater than 1: Defeating "strong" Authentication in Web Applications
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Kurt Opsahl, Kevin Bankston, Marcia Hofmann, Matt Zimmerman, Danny O'Brien, Peter Eckersley
Panel: Ask the EFF
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Steve Orrin UPDATED
The SOA/XML Threat Model and New XML/SOA/Web 2.0 Attacks & Threats
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Alfredo Ortega
OpenBSD remote Exploit and another IPv6 vulnerabilities
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)Chris Palmer, Alex Stamos
Breaking Forensics Software: Weaknesses in Critical Evidence Collection
Read It! (White Paper) See It! (m4v Video) Hear it! (m4b Audio)Daniel Peck, Ben Feinstein
CaffeineMonkey: Automated Collection, Detection and Analysis of Malicious JavaScript
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)Mike Perry UPDATED
Securing the Tor Network
Read It! (Slides | White Paper) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)Bruce Potter UPDATED
Dirty Secrets of the Security Industry
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Danny Quist, Valsmith
Covert Debugging: Circumventing Software Armoring Techniques
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Aviv Raff, Iftach Ian Amit
The Inherent Insecurity of Widgets and Gadgets
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Vivek Ramachandran UPDATED
The Emperor Has No Cloak - WEP Cloaking Exposed
Read It! (Slides | White Paper) See It! (m4v Video)Matt Richard, Fred Doyle UPDATED
Beyond Vulnerability Scanning - Extrusion and Exploitability Scanning
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Billy Rios, Nathan McFeters UPDATED
Biting the Hand that Feeds You - Storing and Serving Malicous Content >From Well Known Web Servers
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)Tony Sager
Vulnerabilities and The Information Assurance Directorate
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Oskar Sandberg UPDATED
Network Mathematics: Why is it a Small World?
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Michael Schearer
The Church of WiFi Presents: Hacking Iraq
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Michael Schrenk UPDATED
The Executable Image Exploit
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Ari Schwartz, Ben Edelman, Eileen Harrington, Mario Vuksan
Panel: Center for Democracy & Technology Anti-Spyware Coalition
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Jason Scott
THE EDGE OF FOREVER - MAKING COMPUTER HISTORY
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Dror Shalev UPDATED
A Crazy Toaster: Can Home Devices Turn Against Us?
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)David C. Smith, Mickey Laskey
Cool stuff learned from competing in the DC3 digital forensic challenge
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Squidly1 UPDATED
Thinking Outside the Console (box)
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)Robert Stoudt UPDATED
When Tapes Go Missing
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)Tom Stracener, Marce Luck UPDATED
Hacking the EULA: Reverse Benchmarking Web Application Security Scanners
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Subere
Fingerprinting and Cracking Java Obfuscated Code
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)Sysmin, Marklar UPDATED
Creating Unreliable Systems, Attacking the Systems that Attack You
Read It! (PDF) See It! (m4v Video)Thorn, Renderman, theprez98
The Church of WiFi's Wireless Extravaganza
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Richard Theime
Hacking UFOlogy: Thirty Years in the Wilderness of Mirrors
Read It! (White Paper) See It! (m4v Video) Hear it! (m4b Audio)Marc Weber Tobias, Matt Fiddler
High Insecurity: Locks, Lies, and Liability
Read It! (PDF) See It! (m4v Video)Steve Topletz
Portable Privacy: Digital Munitions for the Privacy War
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Schuyler Towne
Locksport: An emerging subculture
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Jacob West UPDATED
How I Learned to Stop Fuzzing and Find More Bugs
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Paul Sebastian Ziegler, Tatsumori UPDATED


