Speaker Index


A

Josh Abraham
Abstrct
alien
Chema Alonso (1, 2)
Iftach Ian Amit
Anarchy Angel
Anch
Derek Anderson
Sterling Archer
James "Myrcurial" Arlen (1, 2, 3)
Mike Arpaia
a5h3r4h

B

Adam Baldwin
Kevin Bankston
Andrea Barisani
Bruce "Grymoire" Barnett
Aaron Barr
Rod Beckstrom
Andrea Bianchi
Daniele Bianco
Oliver Bilodeau (1, 2)
blakdayz
Tobias Bluzmanis
Emmanuel Bouillon
Sam Bowne
Michael Brooks
David M. N. Bryan
Jeff Bryner
Jamie Butler

C

Marcus J. Carey
George Chamales
Erika Chin
Jeremy Chiu (aka Birdman)
Ming Chow
Steve Christey
Sandy "Mouse" Clark
Ryan "LosTboY" Clarke Christopher Cleary
Tyler Cohen
Kees Cook
Greg Conti
converge
Joshua Corman (1, 2)
Paul Craig
Adrian Crenshaw "Irongeek"
Dan Crowley
Phil Cryer

D

Jack Daniel
Dark Tangent (1, 2, 3
datagram
Ganesh Devarajan
Deviant Ollam (1, 2)
Whitfield Diffie
Artem Dinaburg
Jerry Dixon
Alva 'Skip' Duckwall

E

Peter Eckersley
Luiz Eduardo
Carsten Eiram
Nelson Elhage
Tim Elrod
Patrick Engebretson
Joshua Engelman
Justin Engler
eskimo
Tom Eston

F

Hanni Fakhoury
Ben Feinstein
Matt Fiddler
Gregory Fleischer
Foofus
Zac Franken
Freaksworth
Gus Fritschie
Eric Fulton

G

Daniel Garcia
Juan Garrido "Silverhack" (1, 2)
Andrew Gavin
Kenneth Geers
Jake "GenericSuperhero"
Ramon Gomez
Vlad Gostom
Rob Graham
Wendel Gugliemetti Henrique

H

Brad "Renderman" Haines
Nathan Hamiel
Rob Havelt
Deral Heiland
Chris Hoff
Dan Holden
Thomas J. Holt
Rick Howard
Hubris
Alex Hutton (1, 2)
Mikko Hypponen

I

Jibran Ilyas
Robert "Hackajar" Imhoff-Dousharm

J

Aseem Jakhar
Jeff Jarmoc
Jericho
Matt Johanson
Kevin Johnson
Matt 'openfly' Joyce

K

Dan Kaminsky
Patrik Karlsson
Paul Kehrer
Dave Kennedy (ReL1K)
Brian Kennish
Max Kilger
Todd Kimball
Steve Kirk
Alexander Kornbrust
Itzik Kotler (1, 2)
Jake Kouns
Matt Krick "DCFluX"

L

Anthony Lai (aka Darkfloyd)
Adam Laurie
Seth Law
Shane Lawson
Don LeBert
Grayson Lenik
Katy Levinson
Steven Levy
Ryan Linn
David Litchfield
Johnny Long

M

Art Manion
William Manning
Joey Maresca
Moxie Marlinspike (1, 2)
Joshua Marpet
Brian Martin
Dave Maynor
Chris McCeniry
John McCoy
Wesley McGrew
Martin McKeay
John McNabb
Charlie Miller
Rich Mogull
Michael Moore
Stefan Morris
David Mortman
Katie Moussouris

N

naharo
Teague Newman

O

Steve Ocepek
Yekaterina Tsipenyuk O'Neil
Kurt Opsahl
Kyle 'Kos' Osborn
Jason Ostrom
Nicole Ozer

P

Josh Pauli
Nicholas J. Percoco (1, 2, 3)
Larry Pesce
Rich Perkins
Abigail Phillips
Josh Phillips
Gregory Pickett
Jason M. Pittman
PK
Bruce Potter

R

Tiffany Rad
Mahmud Ab Rahman
Rebecca Reagan
Ted Reed
Semon Rezchikov
Paul Roberts
Michael Robinson
Russ Rogers Dan Rosenberg
David Rude

S

Deborah Salons
Tony Sager
Michael Scarito
Michael "theprez98" Schearer (1, 2)
Sean Schulte
Jason Scott
Justin Searle
Dave Shackleford
Jimmy Shah
Shrdlu
Skunkworks
Reeves Smith
Jayson E. Street
John J. Strauchs
Chris "TheSuggmeister" Sumner
Harish Skanda Sureddy
Bruce Sutherland
Martin Holst Swende

T

Mike Tassey
Richard Thieme
Marc Weber Tobias
Schuyler Towne
Marketa Trimble

V

Will Vandevanter

W

Morgan Wang
Shawn Webb
Matt "scriptjunkie" Weeks
Linton Wells
Jacob West
Jos Weyers
Thomas Wilhelm
Andrew Wilson
Brad Woodberg
Mike Wright

Z

Joey Zhu
Zoz

Highlights


DEF CON 19 Program

Lost your program? Didn't pick one up? Couldn't make it to the con? Here it is!
PDF (19MB)

Contest Results

May be found on the DEF CON 19 Contest Results page

Audio/Video RSS Feeds

Speaker Materials
Slides (video)

More Video:

10,000¢ Hacker Pyramid and Hacker Jeopardy - Friday Night

10,000¢ Hacker Pyramid and Hacker Jeopardy - Saturday Night

DEF CON 19 Closing Ceremonies

DEF CON 19 DVD

Download original ISO
DEF CON 19 Original DVD (~1.6 GB)
Download updated ISO
DEF CON 19 Updated DVD

DEF CON 19 Website

DEF CON 19 Site

Press Coverage



Was August 4-7, 2011 at the Rio Hotel & Casino




Speakers & Presentations


Dark Tangent and LosTboY

Welcome and The Making of the DEF CON 19 Badge

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Panel

Network Security Podcast

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

Panel

Meet the Federal Agent 2.0

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Abstrct

When Space Elephants Attack: A DEFCON Challenge for Database Geeks

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Chema Alonso, Juan Garrido "Silverhack"

Bosses love Excel, Hackers too.

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Chema Alonso, Juan Garrido "Silverhack"

Dust: Your Feed RSS Belongs To You! Avoid Censorship!

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Sterling Archer, Freaksworth

IP4 TRUTH: The IPocalypse is a LIE

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


James "Myrcurial" Arlen

Security When Nano Seconds Count

Read It! (Slides | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Mike Arpaia, Ted Reed

Beat to 1337: Creating A Successful University Cyber Defense Organization

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Adam Baldwin

Pillaging DVCS Repos For Fun And Profit

Read It! (Slides | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Andrea Barisani, Adam Laurie, Zac Franken & Daniele Bianco

Chip & PIN is Definitely Broken

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Bruce "Grymoire" Barnett

Deceptive Hacking: How Misdirection Can Be Used To Steal Information Without Being Detected

Read It! (Slides | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Olivier Bilodeau

Fingerbank — Open DHCP Fingerprints Database

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Olivier Bilodeau

PacketFence, The Open Source Nac: What We've Done In The Last Two Years

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Emmanuel Bouillon UPDATED

Federation and Empire

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Sam Bowne

Three Generations of DoS Attacks (with Audience Participation, as Victims)

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


David M. N. Bryan, Luiz Eduardo

Building The DEF CON Network, Making A Sandbox For 10,000 Hackers

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jeff Bryner

Kinectasploit: Metasploit Meets Kinect

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jamie Butler

Physical Memory Forensics for Cache

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Marcus J. Carey, David Rude & Will Vandevanter

Metasploit vSploit Modules

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


George Chamales

Lives On The Line: Securing Crisis Maps In Libya, Sudan, And Pakistan

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Ming Chow

Abusing HTML5

Read It! (PDF | PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top

return to top


Christopher Cleary

Operational Use of Offensive Cyber

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Tyler Cohen

Look At What My Car Can Do

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Kees Cook

Kernel Exploitation Via Uninitialized Stack

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Greg Conti

The Art and Science of Security Research

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Paul Craig

Internet Kiosk Terminals: The Redux

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Adrian Crenshaw "Irongeek"

Cipherspaces/Darknets: An Overview Of Attack Strategies

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Daniel Crowley

Speaking with Cryptographic Oracles

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Phil Cryer

Taking Your Ball And Going Home; Building Your Own Secure Storage Space That Mirrors Dropbox's Functionality

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jack Daniel, James Arlen, Joshua Corman, Alex Hutton, Martin McKeay & Dave Shackleford

PCI 2.0: Still Compromising Controls and Compromising Security

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top

return to top


datagram

Introduction to Tamper Evident Devices

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Ganesh Devarajan, Don LeBert

VDLDS — All Your Voice Are Belong To Us

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Deviant Ollam

Safe to Armed in Seconds: A Study of Epic Fails of Popular Gun Safes

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Whitfield Diffie and Moxie Marlinspike

Whitfield Diffie and Moxie Marlinspike

See it! (Slides Video| Speaker & Slides Video) Hear it! (m4b audio)

return to top


Artem Dinaburg

Bit-squatting: DNS Hijacking Without Exploitation

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Alva 'Skip' Duckwall

A Bridge Too Far: Defeating Wired 802.1x with a Transparent Bridge Using Linux

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Nelson Elhage

Virtualization under attack: Breaking out of KVM

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Tim Elrod, Stefan Morris

I Am Not a Doctor but I Play One on Your Network

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Dr. Patrick Engebretson, Dr. Josh Pauli

Mamma Don't Let Your Babies Grow Up to be Pen Testers - (a.k.a. Everything Your Guidance Counselor Forgot to Tell You About Pen Testing)

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


eskimo

Steganography and Cryptography 101

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Tom Eston, Josh Abraham & Kevin Johnson

Don't Drop the SOAP: Real World Web Service Testing for Web Hackers

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Ben Feinstein, Jeff Jarmoc

"Get Off of My Cloud": Cloud Credential Compromise and Exposure

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Foofus

Handicapping the US Supreme Court: Can We Get Rich by Forceful Browsing?

Read It! (White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Gus Fritschie, Mike Wright

Getting F***** On the River

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Eric Fulton

Cellular Privacy: A Forensic Analysis of Android Network Traffic

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Daniel Garcia

UPnP Mapping

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Andrew Gavin

Gone in 60 Minutes: Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Kenneth Geers UPDATED

Strategic Cyber Security: An Evaluation of Nation-State Cyber Attack Mitigation Strategies

Read It! (Slides | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Ramon Gomez

Bulletproofing The Cloud: Are We Any Closer To Security?

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Vlad Gostom, Joshua Marpet

Smile for the Grenade! "Camera Go Bang!"

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Anch, blakdayz, Anarchy Angel, ngharo, Itzik Kotler, Jake "GenericSuperhero" & converge

Represent! Defcon Groups, Hackerspaces, and You.

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Nathan Hamiel, Gregory Fleischer, Justin Engler & Seth Law

Smartfuzzing The Web: Carpe Vestra Foramina

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Rob Havelt, Wendel Guglielmetti Henrique

Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration Tests

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Deral Heiland

From Printer To Pwnd: Leveraging Multifunction Printers During Penetration Testing

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Thomas J. Holt, Max Kilger

Assessing Civilian Willingness to Participate in On-Line Political and Social Conflict

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Rick Howard

An Insider's Look at International Cyber Security Threats and Trends

Read It! (PDF | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Hubris and a5h3r4h

Anonymous Cyber War

See it! (Slides Video)

return to top


Mikko Hypponen

The History and the Evolution of Computer Viruses

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Robert "Hackajar" Imhoff-Dousharm

Economics of Password Cracking in the GPU Era

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Aseem "@" Jakhar

Jugaad – Linux Thread Injection Kit

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Matt 'openfly' Joyce

The Art of Trolling

Read It! (PNG) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Dan Kaminsky

Black Ops of TCP/IP 2011

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Dave Kennedy (ReL1K)

Hacking Your Victims Over Power Lines

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Brian Kennish

Tracking the Trackers: How Our Browsing History Is Leaking into the Cloud

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top

return to top


Itzik Kotler, Iftach Ian Amit

Sounds Like Botnet

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Matt Krick "DCFluX"

DCFluX in: License to Transmit

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Anthony Lai, Benson Wu, Jeremy Chiu & PK

Balancing The Pwn Trade Deficit – APT Secrets in Asia

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Shane Lawson, Bruce Potter & Deviant Ollam

And That's How I Lost My Eye: Exploring Emergency Data Destruction

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Grayson Lenik

I'm Your MAC(b)Daddy

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Katy Levinson

Don't Fix It In Software

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Steven Levy

We Owe it All to the Hackers

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Ryan Linn

PIG: Finding Truffles Without Leaving A Trace

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


David Litchfield

Hacking and Forensicating an Oracle Database Server

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Johnny Long

Johnny Long and Hackers for Charity

return to top


William Manning

Pervasive Cloaking

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Joey Maresca

We're (The Government) Here To Help: A Look At How FIPS 140 Helps (And Hurts) Security

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Moxie Marlinspike

SSL And The Future Of Authenticity

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jon McCoy

Hacking .Net Applications: The Black Arts

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Wesley McGrew

Covert Post-Exploitation Forensics With Metasploit

Read It! (PDF | White Paper | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


John McNabb

Vulnerabilities of Wireless Water Meter Networks

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Charlie Miller

Battery Firmware Hacking

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top

return to top


Steve Ocepek

Blinkie Lights: Network Monitoring with Arduino

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top

return to top


Kyle 'Kos' Osborn, Matt Johanson

Hacking Google Chrome OS

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jason Ostrom

VoIP Hopping the Hotel: Attacking the Crown Jewels through VoIP

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Nicole Ozer

Big Brother on the Big Screen: Fact/Fiction?

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Nicholas J. Percoco, Paul Kehrer

Getting SSLizzard

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Nicholas J. Percoco, Jibran Ilyas

Malware Freak Show 3: They're pwning er'body out there!

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Nicholas J. Percoco, Sean Schulte

This is REALLY not the droid you're looking for...

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Josh Phillips

Hacking MMORPGs for Fun and Mostly Profit

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Gregory Pickett

Port Scanning Without Sending Packets

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jason M. Pittman

My password is: #FullOfFail! — The Core Problem with Authentication and How We Can Overcome It

Read It! (PDF)

return to top

return to top


Semon Rezchikov, Morgan Wang & Joshua Engelman

Why Airport Security Can't Be Done FAST

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Paul Roberts, Aaron Barr, Joshua Corman & Jericho

"Whoever Fights Monsters..." Aaron Barr, Anonymous, and Ourselves

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Michael Robinson

What Time Are You Anyway?

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top

return to top


Dan Rosenberg

Owned Over Amateur Radio: Remote Kernel Exploitation in 2011

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Michael Scarito

Build your own Synthetic Aperture Radar

See it! (Slides Video| Speaker & Slides Video) Hear it! (m4b audio)

return to top

return to top


Michael "theprez98" Schearer

WTF Happened to the Constitution?! The Right to Privacy in the Digital Age

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jason Scott

Archive Team: A Distributed Preservation of Service Attack

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Justin Searle

Attacking and Defending the Smart Grid

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jimmy Shah

Mobile App Moolah: Profit taking with Mobile Malware

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Shrdlu

Are You In Yet? The CISO's View of Pentesting

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Skunkworks

Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Reeves Smith

How Haunters Void Warranties

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


John J. Strauchs, Tiffany Rad, Teague Newman & Dora The SCADA Explorer

SCADA & PLCs in Correctional Facilities: The Nightmare Before Christmas

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jayson E. Street

Steal Everything, Kill Everyone, Cause Total Financial Ruin! (Or How I Walked In And Misbehaved)

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Chris "TheSuggmeister" Sumner, alien & Alison B UPDATED

Weaponizing Cyberpsychology and Subverting Cybervetting for Fun, Profit and Subterfuge

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Bruce Sutherland

How To Get Your Message Out When Your Government Turns Off The Internet

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Martin Holst Swende, Patrik Karlsson

Web Application Analysis With Owasp Hatkit

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Mike Tassey, Rich Perkins

Wireless Aerial Surveillance Platform

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Richard Thieme

Staring into the Abyss: The Dark Side of Crime-fighting, Security, and Professional Intelligence

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Marc Weber Tobias, Matt Fiddler & Tobias Bluzmanis

Insecurity: An Analysis Of Current Commercial And Government Security Lock Designs

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Schuyler Towne

DIY Non-Destructive Entry

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Marketa Trimble

The Future of Cybertravel: Legal Implications of the Evasion of Geolocation

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Shawn Webb

Runtime Process Insemination

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Matt "scriptjunkie" Weeks

Network Nightmare: Ruling The Nightlife Between Shutdown And Boot With Pxesploit

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Yekaterina Tsipenyuk O'Neil, Erika Chin

Seven Ways to Hang Yourself with Google Android

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jos Weyers UPDATED

Key Impressioning

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Thomas Wilhelm

Staying Connected during a Revolution or Disaster

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Andrew Wilson, Michael Brooks

Traps of Gold

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Brad Woodberg

Network Application Firewalls: Exploits and Defense

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Joey Zhu

Phishing and Online Scam in China

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Zoz, Andrea Bianchi

Vanquishing Voyeurs: Secure Ways To Authenticate Insecurely

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top

Panels




return to top