Speaker Index
A
Josh Abraham
Abstrct
alien
Chema Alonso (1, 2)
Iftach Ian Amit
Anarchy Angel
Anch
Derek Anderson
Sterling Archer
James "Myrcurial" Arlen (1, 2, 3)
Mike Arpaia
a5h3r4h
B
Adam Baldwin
Kevin Bankston
Andrea Barisani
Bruce "Grymoire" Barnett
Aaron Barr
Rod Beckstrom
Andrea Bianchi
Daniele Bianco
Oliver Bilodeau (1, 2)
blakdayz
Tobias Bluzmanis
Emmanuel Bouillon
Sam Bowne
Michael Brooks
David M. N. Bryan
Jeff Bryner
Jamie Butler
C
Marcus J. Carey
George Chamales
Erika Chin
Jeremy Chiu (aka Birdman)
Ming Chow
Steve Christey
Sandy "Mouse" Clark
Ryan "LosTboY" Clarke Christopher Cleary
Tyler Cohen
Kees Cook
Greg Conti
converge
Joshua Corman (1, 2)
Paul Craig
Adrian Crenshaw "Irongeek"
Dan Crowley
Phil Cryer
D
Jack Daniel
Dark Tangent (1, 2, 3
datagram
Ganesh Devarajan
Deviant Ollam (1, 2)
Whitfield Diffie
Artem Dinaburg
Jerry Dixon
Alva 'Skip' Duckwall
E
Peter Eckersley
Luiz Eduardo
Carsten Eiram
Nelson Elhage
Tim Elrod
Patrick Engebretson
Joshua Engelman
Justin Engler
eskimo
Tom Eston
F
Hanni Fakhoury
Ben Feinstein
Matt Fiddler
Gregory Fleischer
Foofus
Zac Franken
Freaksworth
Gus Fritschie
Eric Fulton
G
Daniel Garcia
Juan Garrido "Silverhack" (1, 2)
Andrew Gavin
Kenneth Geers
Jake "GenericSuperhero"
Ramon Gomez
Vlad Gostom
Rob Graham
Wendel Gugliemetti Henrique
H
Brad "Renderman" Haines
Nathan Hamiel
Rob Havelt
Deral Heiland
Chris Hoff
Dan Holden
Thomas J. Holt
Rick Howard
Hubris
Alex Hutton (1, 2)
Mikko Hypponen
I
Jibran Ilyas
Robert "Hackajar" Imhoff-Dousharm
J
Aseem Jakhar
Jeff Jarmoc
Jericho
Matt Johanson
Kevin Johnson
Matt 'openfly' Joyce
K
Dan Kaminsky
Patrik Karlsson
Paul Kehrer
Dave Kennedy (ReL1K)
Brian Kennish
Max Kilger
Todd Kimball
Steve Kirk
Alexander Kornbrust
Itzik Kotler (1, 2)
Jake Kouns
Matt Krick "DCFluX"
L
Anthony Lai (aka Darkfloyd)
Adam Laurie
Seth Law
Shane Lawson
Don LeBert
Grayson Lenik
Katy Levinson
Steven Levy
Ryan Linn
David Litchfield
Johnny Long
M
Art Manion
William Manning
Joey Maresca
Moxie Marlinspike (1, 2)
Joshua Marpet
Brian Martin
Dave Maynor
Chris McCeniry
John McCoy
Wesley McGrew
Martin McKeay
John McNabb
Charlie Miller
Rich Mogull
Michael Moore
Stefan Morris
David Mortman
Katie Moussouris
N
naharo
Teague Newman
O
Steve Ocepek
Yekaterina Tsipenyuk O'Neil
Kurt Opsahl
Kyle 'Kos' Osborn
Jason Ostrom
Nicole Ozer
P
Josh Pauli
Nicholas J. Percoco (1, 2, 3)
Larry Pesce
Rich Perkins
Abigail Phillips
Josh Phillips
Gregory Pickett
Jason M. Pittman
PK
Bruce Potter
R
Tiffany Rad
Mahmud Ab Rahman
Rebecca Reagan
Ted Reed
Semon Rezchikov
Paul Roberts
Michael Robinson
Russ Rogers Dan Rosenberg
David Rude
S
Deborah Salons
Tony Sager
Michael Scarito
Michael "theprez98" Schearer (1, 2)
Sean Schulte
Jason Scott
Justin Searle
Dave Shackleford
Jimmy Shah
Shrdlu
Skunkworks
Reeves Smith
Jayson E. Street
John J. Strauchs
Chris "TheSuggmeister" Sumner
Harish Skanda Sureddy
Bruce Sutherland
Martin Holst Swende
T
Mike Tassey
Richard Thieme
Marc Weber Tobias
Schuyler Towne
Marketa Trimble
V
Will Vandevanter
W
Morgan Wang
Shawn Webb
Matt "scriptjunkie" Weeks
Linton Wells
Jacob West
Jos Weyers
Thomas Wilhelm
Andrew Wilson
Brad Woodberg
Mike Wright
Z
Joey Zhu
Zoz
Highlights
DEF CON 19 Program
Lost your program? Didn't pick one up? Couldn't make it to the con? Here it is!PDF (19MB)
Contest Results
May be found on the DEF CON 19 Contest Results pageAudio/Video RSS Feeds
Speaker MaterialsSlides (video)
More Video:
10,000¢ Hacker Pyramid and Hacker Jeopardy - Friday Night10,000¢ Hacker Pyramid and Hacker Jeopardy - Saturday Night
DEF CON 19 Closing Ceremonies
DEF CON 19 DVD
Download original ISODEF CON 19 Original DVD (~1.6 GB)
Download updated ISO
DEF CON 19 Updated DVD
DEF CON 19 Website
DEF CON 19 SitePress Coverage
- When Hackers Become The Man - CNet
- Wit and lethality: Preview of DEFCON 2011 - TechRepublic
- DEFCON 19 - 2011 – Overview of the Conference - Global Security Mag
- Lessons from Black Hat & Defcon 19 - It's Easier to be the Bad Guy - HP Community Blog
- Picking Locks and Hacking Servers at Defcon - NY Times
- Jailbreak Experts Comex, Geohot And Many More Spotted Together At DEFCON Party - Appadvice
- Deb does DEFCON: Hacking conference tackles cyberwar and civil liberties - TechRepublic
- Android could allow mobile ad or phishing pop-ups - CNet News
- DefCon Dings Reveal Google Product Security Risks - Gizmodo
- Vulnerability Found In Android That Allows For Phishing Scams and Pop-up Ads - Phandroid.com
- Mobiles become emergency data network - BBC
- Facebook Offers Cash To 'Bug Bounty Hunters' At DefCon Hacker Conference - Huffington Post
- CDMA and 4G Connections Compromised At DefCon 19? - TechCrunch
- DEF CON 19 - hackers get hacked! - Full Disclosure
- WASP: The Linux-powered flying spy drone that cracks Wi-Fi & GSM networks - Geek.com
- DIY aerial drone monitors Wi-Fi, GSM networks - The Register
- Do-It-Yourself Hacker Drone Highlight of Hacker Conference - International Business Times
- Build Your Own Camera, Launch It Like a Grenade - PCWorld
- Geek hacks flare gun into wireless camera drone shooter - Slash Gear
- Building A Better 'Anonymous'? - Information Week
- Is LulzSec's Leader at DefCon? - PC Magazine
- In Search of Anonymous: Down and Out in the Digital Age - Deliberately Considered (blog)
- Search of Anonymous: Down and Out in the Digital Age Pt II - Deliberately Considered (blog)
- Infosec Island's Scot Terban Replaces Aaron Barr at DEFCON - Infosec Island
- Defcon panel: Anonymous is here. LulzSec is here. They're everywhere - Venture Beat
- Hackers debate 'Anonymous' tactics at DefCon gathering - Agence France-Presse
- Five Questions About Aaron Barr's DEFCON (by Aaron Barr) - Threatpost
- DEF CON Opens Its Doors To Pre-Teen And Teen Hackers - Washington Post
- 10-Year-Old Hacker Finds Flaws in Video Games - Fox News
- Tween Hacker's Time-Travel Trick - Dark Reading
- 10-Year-Old Outs Security Flaw in iOS and Android Games - PCWorld
- DefCon 19: 10-year-old code cracker reveals zero-day smartphone gaming security flaw - Infosecurity.com
- Defcon Lockpickers Open Card-And-Code Government Locks In Seconds - Forbes
- Wire pops lock certified for US defense facilities - AFP
- Hackable High-Tech Locks Pose National Security Risks - Security News Daily
- Hacking Home Automation Systems Through Your Power Lines - Wired Threat Level Blog
- Def Con 19: Expert hacks X10 home-automation system - Consumer Reports
- Defcon Hacking Contest Targets Big Corporations (VIDEO) - Huffington Post
- DEFCON 2011: SSL and the future of authenticity - Naked Security Blog (Sophos)
- European Nopsled Team win DEFCON 19 CTF - blog.satori.com
General
Mobile Devices
Feds
CDMA Phone Hack
UAV/Aerial Hacking
Anonymous/LulzSec
DEF CON Kids
Steven Levy
Mikko Hypponen
Wall of Sheep
Marc Weber Tobias
Hacking Through Power Lines
Social Engineering
Moxie Marlinspike
CTF
Was August 4-7, 2011 at the Rio Hotel & Casino
Speakers & Presentations
Dark Tangent and LosTboY
Welcome and The Making of the DEF CON 19 Badge
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Panel
Meet the Federal Agent 2.0
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Abstrct
When Space Elephants Attack: A DEFCON Challenge for Database Geeks
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Chema Alonso, Juan Garrido "Silverhack"
Bosses love Excel, Hackers too.
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Chema Alonso, Juan Garrido "Silverhack"
Dust: Your Feed RSS Belongs To You! Avoid Censorship!
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Sterling Archer, Freaksworth
IP4 TRUTH: The IPocalypse is a LIE
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)James "Myrcurial" Arlen
Security When Nano Seconds Count
Read It! (Slides | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Mike Arpaia, Ted Reed
Beat to 1337: Creating A Successful University Cyber Defense Organization
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Adam Baldwin
Pillaging DVCS Repos For Fun And Profit
Read It! (Slides | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Andrea Barisani, Adam Laurie, Zac Franken & Daniele Bianco
Chip & PIN is Definitely Broken
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Bruce "Grymoire" Barnett
Deceptive Hacking: How Misdirection Can Be Used To Steal Information Without Being Detected
Read It! (Slides | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Olivier Bilodeau
Fingerbank — Open DHCP Fingerprints Database
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Olivier Bilodeau
PacketFence, The Open Source Nac: What We've Done In The Last Two Years
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Emmanuel Bouillon UPDATED
Federation and Empire
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Sam Bowne
Three Generations of DoS Attacks (with Audience Participation, as Victims)
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)David M. N. Bryan, Luiz Eduardo
Building The DEF CON Network, Making A Sandbox For 10,000 Hackers
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Jeff Bryner
Kinectasploit: Metasploit Meets Kinect
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Jamie Butler
Physical Memory Forensics for Cache
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Marcus J. Carey, David Rude & Will Vandevanter
Metasploit vSploit Modules
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)George Chamales
Lives On The Line: Securing Crisis Maps In Libya, Sudan, And Pakistan
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Ming Chow
Abusing HTML5
Read It! (PDF | PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Sandy "Mouse" Clark, Brad "RenderMan" Haines
Familiarity Breeds Contempt
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Christopher Cleary
Operational Use of Offensive Cyber
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Tyler Cohen
Look At What My Car Can Do
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Kees Cook
Kernel Exploitation Via Uninitialized Stack
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Greg Conti
The Art and Science of Security Research
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Paul Craig
Internet Kiosk Terminals: The Redux
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Adrian Crenshaw "Irongeek"
Cipherspaces/Darknets: An Overview Of Attack Strategies
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Daniel Crowley
Speaking with Cryptographic Oracles
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Phil Cryer
Taking Your Ball And Going Home; Building Your Own Secure Storage Space That Mirrors Dropbox's Functionality
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Jack Daniel, James Arlen, Joshua Corman, Alex Hutton, Martin McKeay & Dave Shackleford
PCI 2.0: Still Compromising Controls and Compromising Security
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Dark Tangent, Rod Beckstrom, Jerry Dixon, Tony Sager, Linton Wells II
Former Keynotes - The Future
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)datagram
Introduction to Tamper Evident Devices
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Ganesh Devarajan, Don LeBert
VDLDS — All Your Voice Are Belong To Us
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Deviant Ollam
Safe to Armed in Seconds: A Study of Epic Fails of Popular Gun Safes
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Whitfield Diffie and Moxie Marlinspike
Whitfield Diffie and Moxie Marlinspike
See it! (Slides Video| Speaker & Slides Video) Hear it! (m4b audio)Artem Dinaburg
Bit-squatting: DNS Hijacking Without Exploitation
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Alva 'Skip' Duckwall
A Bridge Too Far: Defeating Wired 802.1x with a Transparent Bridge Using Linux
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Nelson Elhage
Virtualization under attack: Breaking out of KVM
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Tim Elrod, Stefan Morris
I Am Not a Doctor but I Play One on Your Network
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Dr. Patrick Engebretson, Dr. Josh Pauli
Mamma Don't Let Your Babies Grow Up to be Pen Testers - (a.k.a. Everything Your Guidance Counselor Forgot to Tell You About Pen Testing)
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)eskimo
Steganography and Cryptography 101
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Tom Eston, Josh Abraham & Kevin Johnson
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Ben Feinstein, Jeff Jarmoc
"Get Off of My Cloud": Cloud Credential Compromise and Exposure
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Foofus
Handicapping the US Supreme Court: Can We Get Rich by Forceful Browsing?
Read It! (White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Gus Fritschie, Mike Wright
Getting F***** On the River
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Eric Fulton
Cellular Privacy: A Forensic Analysis of Android Network Traffic
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Daniel Garcia
UPnP Mapping
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Andrew Gavin
Gone in 60 Minutes: Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Kenneth Geers UPDATED
Strategic Cyber Security: An Evaluation of Nation-State Cyber Attack Mitigation Strategies
Read It! (Slides | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Ramon Gomez
Bulletproofing The Cloud: Are We Any Closer To Security?
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Vlad Gostom, Joshua Marpet
Smile for the Grenade! "Camera Go Bang!"
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Anch, blakdayz, Anarchy Angel, ngharo, Itzik Kotler, Jake "GenericSuperhero" & converge
Represent! Defcon Groups, Hackerspaces, and You.
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Nathan Hamiel, Gregory Fleischer, Justin Engler & Seth Law
Smartfuzzing The Web: Carpe Vestra Foramina
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Rob Havelt, Wendel Guglielmetti Henrique
Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration Tests
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Deral Heiland
From Printer To Pwnd: Leveraging Multifunction Printers During Penetration Testing
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Thomas J. Holt, Max Kilger
Assessing Civilian Willingness to Participate in On-Line Political and Social Conflict
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Rick Howard
An Insider's Look at International Cyber Security Threats and Trends
Read It! (PDF | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Mikko Hypponen
The History and the Evolution of Computer Viruses
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Robert "Hackajar" Imhoff-Dousharm
Economics of Password Cracking in the GPU Era
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Aseem "@" Jakhar
Jugaad – Linux Thread Injection Kit
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Matt 'openfly' Joyce
The Art of Trolling
Read It! (PNG) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Dan Kaminsky
Black Ops of TCP/IP 2011
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Dave Kennedy (ReL1K)
Hacking Your Victims Over Power Lines
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Brian Kennish
Tracking the Trackers: How Our Browsing History Is Leaking into the Cloud
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Alexander Kornbrust
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Itzik Kotler, Iftach Ian Amit
Sounds Like Botnet
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Matt Krick "DCFluX"
DCFluX in: License to Transmit
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Anthony Lai, Benson Wu, Jeremy Chiu & PK
Balancing The Pwn Trade Deficit – APT Secrets in Asia
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Shane Lawson, Bruce Potter & Deviant Ollam
And That's How I Lost My Eye: Exploring Emergency Data Destruction
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Grayson Lenik
I'm Your MAC(b)Daddy
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Katy Levinson
Don't Fix It In Software
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Steven Levy
We Owe it All to the Hackers
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Ryan Linn
PIG: Finding Truffles Without Leaving A Trace
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)David Litchfield
Hacking and Forensicating an Oracle Database Server
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)William Manning
Pervasive Cloaking
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Joey Maresca
We're (The Government) Here To Help: A Look At How FIPS 140 Helps (And Hurts) Security
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Moxie Marlinspike
SSL And The Future Of Authenticity
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Jon McCoy
Hacking .Net Applications: The Black Arts
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Wesley McGrew
Covert Post-Exploitation Forensics With Metasploit
Read It! (PDF | White Paper | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)John McNabb
Vulnerabilities of Wireless Water Meter Networks
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Charlie Miller
Battery Firmware Hacking
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)David Mortman, Rich Mogull, Chris Hoff, Dave Maynor, Larry Pesce, James Arlen & Rob Graham
DEF CON Comedy Jam IV, A New Hope For The Fail Whale
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Steve Ocepek
Blinkie Lights: Network Monitoring with Arduino
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Kurt Opsahl, Kevin Bankston, Marcia Hofmann, Hanni Fakhoury, Peter Eckersley & Rebecca Reagan
Ask EFF: The Year in Digital Civil Liberties
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Kyle 'Kos' Osborn, Matt Johanson
Hacking Google Chrome OS
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Jason Ostrom
VoIP Hopping the Hotel: Attacking the Crown Jewels through VoIP
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Nicole Ozer
Big Brother on the Big Screen: Fact/Fiction?
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Nicholas J. Percoco, Paul Kehrer
Getting SSLizzard
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Nicholas J. Percoco, Jibran Ilyas
Malware Freak Show 3: They're pwning er'body out there!
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Nicholas J. Percoco, Sean Schulte
This is REALLY not the droid you're looking for...
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Josh Phillips
Hacking MMORPGs for Fun and Mostly Profit
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Gregory Pickett
Port Scanning Without Sending Packets
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Jason M. Pittman
My password is: #FullOfFail! — The Core Problem with Authentication and How We Can Overcome It
Read It! (PDF)Semon Rezchikov, Morgan Wang & Joshua Engelman
Why Airport Security Can't Be Done FAST
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Paul Roberts, Aaron Barr, Joshua Corman & Jericho
"Whoever Fights Monsters..." Aaron Barr, Anonymous, and Ourselves
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Michael Robinson
What Time Are You Anyway?
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Russ Rogers and Dark Tangent
DEF CON Awards
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Dan Rosenberg
Owned Over Amateur Radio: Remote Kernel Exploitation in 2011
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Michael Scarito
Build your own Synthetic Aperture Radar
See it! (Slides Video| Speaker & Slides Video) Hear it! (m4b audio)Michael "theprez98" Schearer, Abigail Phillips, Deborah Salons & Todd Kimball
Net Neutrality Panel
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Michael "theprez98" Schearer
WTF Happened to the Constitution?! The Right to Privacy in the Digital Age
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Jason Scott
Archive Team: A Distributed Preservation of Service Attack
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Justin Searle
Attacking and Defending the Smart Grid
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Jimmy Shah
Mobile App Moolah: Profit taking with Mobile Malware
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Shrdlu
Are You In Yet? The CISO's View of Pentesting
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Skunkworks
Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Reeves Smith
How Haunters Void Warranties
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)John J. Strauchs, Tiffany Rad, Teague Newman & Dora The SCADA Explorer
SCADA & PLCs in Correctional Facilities: The Nightmare Before Christmas
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Jayson E. Street
Steal Everything, Kill Everyone, Cause Total Financial Ruin! (Or How I Walked In And Misbehaved)
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Chris "TheSuggmeister" Sumner, alien & Alison B UPDATED
Weaponizing Cyberpsychology and Subverting Cybervetting for Fun, Profit and Subterfuge
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Bruce Sutherland
How To Get Your Message Out When Your Government Turns Off The Internet
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Martin Holst Swende, Patrik Karlsson
Web Application Analysis With Owasp Hatkit
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Mike Tassey, Rich Perkins
Wireless Aerial Surveillance Platform
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Richard Thieme
Staring into the Abyss: The Dark Side of Crime-fighting, Security, and Professional Intelligence
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Marc Weber Tobias, Matt Fiddler & Tobias Bluzmanis
Insecurity: An Analysis Of Current Commercial And Government Security Lock Designs
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Schuyler Towne
DIY Non-Destructive Entry
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Marketa Trimble
The Future of Cybertravel: Legal Implications of the Evasion of Geolocation
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Shawn Webb
Runtime Process Insemination
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Matt "scriptjunkie" Weeks
Network Nightmare: Ruling The Nightlife Between Shutdown And Boot With Pxesploit
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Yekaterina Tsipenyuk O'Neil, Erika Chin
Seven Ways to Hang Yourself with Google Android
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Jos Weyers UPDATED
Key Impressioning
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Thomas Wilhelm
Staying Connected during a Revolution or Disaster
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Andrew Wilson, Michael Brooks
Traps of Gold
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Brad Woodberg
Network Application Firewalls: Exploits and Defense
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Joey Zhu
Phishing and Online Scam in China
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Zoz, Andrea Bianchi
Vanquishing Voyeurs: Secure Ways To Authenticate Insecurely
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)Panels
Jake Kouns, Brian Martin, Steve Christey, Carsten Eiram, Art Manion, Dan Holden, Alex Hutton & Katie Moussouris

