Speaker Index
DEF CON 101 (Thursday)
DEF CON 101
Hacking Management, from Operations to Command
The Ninjaneers: Getting Started in Building Your Own Robots for World Domination
Decrypting DEF CON: Foundations Behind Some of the Games Hackers Play
Intro to Web Application Hacking
Oil & Gas Infosec 101
Wireless Penetration Testing 101 & Wireless Contesting
Pentesters Toolkit
Meet Pentoo, the Longest Running Pen-testing Linux Distro
A
Alex Abdo
Bogdan Alecu
Chema Alonso
AlxRogan
Anch
James Arlen
Dan Auerbach
B
Mike Baker
Amber Baldet
Remy Baumgarten
Brent Bandelgar
Beaker
Scott Behrens
Sameer Bhalotra
Joe Bialek
Zak Blacher
Tobias Bluzmanis
Todd Bonnewell
Sam Bowne (1, 2)
Robert Brese
Francis Brown
bughardy
Eileen Burbridge
Daniel Burroughs
Eric Butler
C
Alejandro Caceres (1, 2)
Benjamin Caudill
Daniel Chechik
Ming Chow
Joseph Paul Cohen
Joshua Corman
Michael Costello
Robert Clark
Kade Crockford
Daniel "unicornFurnace" Crowley
Catherine Crump
Dinis Cruz
Ang Cui
D
DaKahuna
Anat (Fox) Davidi
Sherri Davidoff
Andy Davis
James Denaro
Doug DePerry
Ambassador Joseph R. DeTrani
Christie Dudley
Piotr Duszynski
E
Eagle1753
Lt. Gen. Robert Elder (1, 2)
Justin Engler
Melissa Elliott
Amir Etemadieh
Evilrob (Rob Bathurst)
F
Jaime Filson (WiK)
FirmWarez
Flipper (1, 2)
Pau Oliva Fora
Zac Franken
Scott Fretheim
Rob Fuller (Mubix)
Eric Fulton
G
Eva Galperin
Terrence "Tuna" Gareau
Tigran Gevorgyan
Brian Gorenc
Rob Graham
Joe Grand (1, 2)
Dan Griffin
H
David Harrison
Justin Hendricks
CJ Heres
HighWiz
Ricky Hill
Nick Hitchcock
Chris Hoff
Marcia Hofmann
Ryan Holeman
Josh Hoover (wishbone)
I
Alberto Garcia Illera
J
John M. Jack
Mark Jaycox
Deepak Jeevankumar
Robert Johnson
K
Abraham Kang
Tom Keenan
David Kennedy
Karl Koscher
Dan Kottmann
L
Zach Lanier
Adam "Major Malfunction" Laurie
David Lawrence
Kenneth Lee
Wai-leng Lee
Ping Li
James R. Lint
Lockheed (1, 2)
Drea London
LosT (1, 2, 3)
Rachel Lovinger
M
Sean Malone
Todd Manning
Marion Marschalek
Dave Maynor
Bruce McConnnell
Wesley McGrew
Eric Milam
Charlie Miller
Nikhil Mittal
Tony Miu
Rich Mogull
David Mortman
Peiter "Mudge" Zatko
N
Naifx
Hans Nielsen
O
Nicolas Oberli
Matt Ocko
Brendan O'Connor
Kyle O'Meara
Kurt Opsahl
John Ortiz
Fatih Ozavci
Nicole Ozer
P
Franz Payer
Nicholas J. Percoco
Michael Perklin (1, 2)
Larry Pesce
Phorkus (Mark Carey)
Gregory Pickett
Alexandre Pinto
Philip Polstra
Randi Price
Matthew Prince
pukingmonkey
R
RenderMan
Jim Rennie
Chris John Riley
Tom Ritter (1, 2)
RMellendick
Roamer (1, 2)
Eric Robi
Teal Rogers
Alex Rothman
S
Jaime Sanchez
Runa A. Sandvik
Paul Sanderson
Jennifer "savagejen" Savage
Noah Schiffman
Michael Schrenk
Jaeson Schultz
Hunter Scott
Jason Scott
Balint Seeber
Daniel Selifonov
Neil Sikka
SkyDog
Christopher Soghoian (1, 2)
Ryan W. Smith
Mark 'Smitty' Smith
James Snodgrass (PuNk1nPo0p)
soen
Jasiel Spelman
Jason Staggs
Alex Stamos
Tom Steele
Mitch Stoltz
Tim Strazzere
Robert Stucke
Chris Sumner
T
Amr Thabet
Richard Thieme
Josh 'm0nk' Thomas
Jacob Thompson
Marc Weber Tobias
Vaagn Toukharian
V
Eric Van Albert
Javier Vazquez Vidal
Paul Vines
W
Randall Wald
Mark Weatherford (1, 2)
Rebecca Wexler
Tillmann Werner
Brandon Wiley
Y
Josh Yavor
Craig Young
Z
ZeroChaos
Daniel Zolnikov
Zoz
Panels
Ask the EFF
DEF CON Comedy Jam Part VI
The ACLU Presents: NSA Surveillance and More
Hardware Hacking with Microcontrollers: A Panel Discussion
Meet the VCs
The Policy Wonk Lounge
Highlights
DEF CON 21 Program
Lost your program? Didn't pick one up? Couldn't make it to the con? Here it is!PDF (15MB)
DEF CON 21 Receipt
Need to expense that trip to DEF CON 21? Here is a handy receipt for just such endeavors!PDF (901KB)
Contest Results
May be found on the DEF CON 21 Contest Results pageAudio/Video RSS Feeds
Speaker MaterialsDEF CON 21 Website
DEF CON 21 SitePress Coverage
General
- 5 Tips for surviving DEF CON 21 - C/NET
- 5 scariest cybersecurity threats at Black Hat, Defcon - CBS
- The five scariest hacks we saw last week - CNN
- Def Con 21: Hacks, Cracks und Edward Snowden - Computer Bild
- Black Hat, DEF CON Put Spotlight on Major Security Issues, Hacks - eWeek
- Hackers take over Las Vegas - FoxNews
- Democratizing the creep factor: Anyone can play NSA, "Ocean's 11″ and cyberstalker - Gigaom
- How to tell DEF CON and Black Hat Apart - Gigaom
- False sense of security: Your TV, car, neighborhood may be hackable - Gizmag
- Don't get pwned at Black Hat, DEF CON - Help Net Security
- DEF CON: Hacking for the Rest of Us - Huffington Post
- Al via Defcon: quando gli hacker esplorano i limiti della sicurezza informatica ("At the start Defcon: when hackers explore the limits of computer security") - Il Sole 24 Or
- Black Hat / Def Con 2013 - Zataz
- A DEF CON postscript: Said the FBI agent to the taxi driver - ZDNet
- DEF CON 21 in Pictures - ZDNet
- DEF CON 21: Best in Show - ZDNet
- Postcards from DEF CON 21 - ZDNet
- Tech Week That Was: Suspicious Searches, Def Con And Moto X - NPR
- What We're Watching As World's Big Hackers Meet In Las Vegas - NPR
- At Def Con, hackers join together to 'hack everything' - NPR/Marketplace
- An Inside Look At The Hacker Conferences - NPR/WGBH
- How Not to Get Hacked at Black Hat and DefCon - PCMagazine
- Surveillance drones and Uncle Sam: Hackers take on all at DefCon 21 - RT
- Slideshow: August 2013 threat stats - SC Magazine
- What Happens At DefCon Stays With Us All - TechCrunch
- Hack the mini bar, spot the feds, DEF CON is back - The Conversation
- Hackers gather—and mourn a big loss - The Economist
- The best of Black Hat and Def Con 2013 - The Verge
- The top 10 new reasons to be afraid of hackers - The Verge
- Tin tặc thế giới hội tụ ở Las Vegas ("Hackers world converged in Las Vegas") - tienphong online
- DEFCON 21: THINGS YOU MAY HAVE MISSED - Tripwire
- Def Con, Day One: Can I Use Your Wi-Fi Please? - Vice
- Def Con, Day Two: Def Con Is for Winners - Vice
- How To Get Hacked At Defcon - Vice
Car Hacking
- Car hacking code released at Defcon - C/NET
- White hat hackers to release software used to crack critical car systems at Def Con - Afterdawn
- Hackers Offer Advice To Automakers On How To Prevent Attacks - AOL
- Hackers break into cars, steer them with old game controllers - Calgary Herald
- Wireless Car Hacking Demonstrated in New Video - Carscoops
- Sleuths To Demo Car Hack Gone Steer-Crazy - CIO Today
- Hackers Control Car's Steering And Brakes - CNN Money
- Hackers hijack software in a CAR and remotely control the steering, brakes and horn using a laptop - Daily Mail UK
- Car Hackers Release Tools - Dark Reading
- Networked Cars Are Coming, But Their Hacks Are Already Here - Discover
- Car Hacking: Here's Code, Have at It - EETimes
- TI Illustrates Car Security Threats - EETimes
- Automotive takeover schemes to be detailed at Defcon hacker conference - Engadget
- Hackers Reveal Nasty New Car Attacks--With Me Behind The Wheel (Video) - Forbes
- Hackers plan to offer blueprint for taking over Prius, Escape - FoxNews
- Cisco's remedy for connected car security: Treat the car like an enterprise - Gigaom
- DEFCON: Hackeando autos y vehículos no tripulados ("DEFCON: Hacking cars and unmanned vehicles") - el semanario
- Researchers reveal methods behind car hack at Defcon - IDG/Techworld
- DEF CON:黑客公布入侵汽车工具 ("DEF CON: Hackers publish invasion Automotive ") - China Byte
- Hacker safety risk for new cars - Motoring
- Tools, code to control Ford and Toyota test cars released - SC Magazine
- DefCon car hacking talk will detail how an outsider can "physically control" the vehicle - SCMagazine
- Defcon 21 : des explications sur le piratage de voitures ("Defcon 21: explanation of piracy Car") - IDG/Lemonde Informatique
- Hackers to detail methods used to overtake Prius, Escape at Def Con - TechSpot
- Duo hacks cars with '80s Nintendo controller - The Vancouver Sun
- Hackers Hijack Prius with Mac Laptop - Tom's Guide
- Defcon hackers release Ford and Toyota car hijack data - v3.co.uk
- How driverless cars will be wide open to hacking - VentureBeat
- How Easily Can a Moving Car Be Hacked? - Vice
- Defcon to deliver auto industry wake-up call - Japan Times/AFP JIJI
- Software experts attack cars, to release code as hackers meet - Reuters
- Hackers 'take control' of Toyota Prius - Telegraph UK
- Here's how hackers could crash your car - The Washington Post
Lock Security/Sport
- 'Do Not Duplicate' Means Nothing to the MIT Students Replicating High-Security Keys with a 3D Printer - BostInno
- No cameras! MIT students 3D print 'high security' keys — all they need is a photo - Boston.Com
- DEF CON Reminds Us of the Importance of Physical Security - eWeek
- US students plan to release program that will copy high-security keys - Metro
- Picking Locks and Hacking Servers at Defcon - The New York Times
- Why Are We Still Using Keys? - Vice
- Millions of Kwikset Smartkey Locks Vulnerable to Hacking, Say Researchers - Wired
Bitcoin
- Raspberry Pi-powered briefcase converts loose change into bitcoin - CoinDesk
- Bitcoin Suitcase Converts Spare Change Into Digital - PSFK
- Bitcoin suitcase eats your pocket change, spits out digital currency - The Verge
Rootz Kidcon
- DEF CON Kids To Get Badges That Hack - Dark Reading
- At Def Con, Kids Can Hack Too - The Wall Street Journal
Legal/Civil Rights
- ACLU at DEF CON 21! - ACLU Blog
- Even with EFF's Congressphone, activism is a hard sell - C/NET
- What Security Researchers Need to Know About the Law - eWeek
- NSA And Aaron Swartz Hot Topics At Hacking Conferences - NPR/WBUR
Feds
- Relatie NSA en 'goede' hackers sterk bekoeld ("Relationship NSA and "good" hackers strongly cooled") - AutomatiseringGids
- At hacker conferences, government surveillance takes center stage - CBS
- Gov't surveillance overshadows hacker conferences - CBS
- Leaker Snowden riles hacker conferences - CNBC
- Defcon founder's message to feds fair to some, hypocritical to others - Computerworld
- FBI turning to private sector to hack phones, exploit unknown security holes - Engadget
- Hackers Just Banned the Feds from Attending DEF CON This Year - Gizmodo India
- Agenten bitte draußen bleiben! ("agents please stay out!") - Golem
- Defcon no dejará entrar a los federales a la conferencia de hackers ("Defcon not the feds will let the hacker conference") - Fayerwayer
- DefCon Hacker Conference to Feds: 'We Need Some Time Apart' - Mashable
- FBI Spies on Suspected Criminals by Hacking Into Computers - Mashable
- NSA at Defcon? More like No Spooks Allowed - NBC
- There May Be Some Feds at Defcon After All - Nextgov (blog)
- Hackere kaster ut FBI ("Hackers throw out FBI") - NRK
- Ex-CIA official to address government-wary hackers - Reuters
- NSA revelations could hurt collaboration with 'betrayed' hackers - Reuters
- Feds asked not to attend Def Con hacker meeting over NSA scandal - RT
- DefCon: Former DHS cyber official to private sector: Gov't can't help you with intelligence - SCMagazine
- At a Hacker Conference, Plenty of Friendly Federal Agents - The New York Times
- Security bods boycott DEF CON over closed door for feds - The Register
- After Snowden leaks, feds lose their hacker cred at Def Con - The Verge
- Def Con founder asks feds to skip hacker conference, citing high tensions after NSA leaks - The Verge
- FBI Taps Hacker Tactics to Spy on Suspects - The Wall Street Journal
- Obama: Technologies Can Block Snooping - The Wall Street Journal
- Where Hackers and Spooks Mingle - The Wall Street Journal
- FBI Tor exploit appears on Metasploit penetration tester forum - v3.co.uk
- The Big Def Con Question: Would You Work for the NSA? - Vice
- The NSA Is Not Spying on You, Claims NSA Official at DefCon - Vice
- Without Def Con, the Feds Have a Hacker Recruitment Problem - Vice
- Правительство США впервые не пригласили на конференцию хакеров DefCon ("The U.S. government is not the first time invited to the DefCon hacker conference") - VZ.ru
- NSA SPY SCANDAL SPARKS HACKER REBELLION - WND
- NSA shows how to really screw up a PR campaign - VentureBeat
- Hacker community Ripped by Surveillance scandal - spyghana.com
- US Government War On Hackers Backfires: Now Top Hackers Won't Work With US Government - Techdirt
Smart Devices and Homes
- Can your "smart TV" watch you? - CBS
- Smart TV camera hack creates a window into your home - CBS
- Samsung's Smart TV can spy on you - Channel 24
- 'Smart homes' are vulnerable, say hackers - CNN
- With the Rise of Malware, Your Dumb Home May Be Safer Than a Smart Home - Gotta Be Mobile
- TVs to toilets: What will hackers target next? - MSN News
- If you think cybercrime is scary now, just wait until hackers can control and monitor every object in your environment - Quartz
- Consumer Device Hacking Concerns Getting Lost In Translation - Slashdot
- How to Spy on Your Neighbors With a USB TV Tuner - Tom's Guide
- Das Internet der gehackten Dinge ("The Internet of things chopped") - Zeit Online
Mobile Security/Malware
- Can you hear me now? Yeah, hacked Verizon device can nab your texts and photos too - Computerworld
- Femtocell hack reveals mobile phones' calls, texts and photos - CNN Money
- Fake charger lets hackers infect iPhones - CBS
- This Fake Charger Will Hide A Trojan In Your iPhone's Facebook App - Forbes
- PIN-punching $200 robot can brute force every Android numeric screen-password in 19 hours - Boingboing
- PIN-Punching Robot Can Crack Your Phone's Security Code In Less Than 24 Hours (Video) - Forbes
- Russia home to text fraud 'cottage industry' - AFP/GloabalTimes
- Russia home to text message fraud "cottage industry" - AFP/Phys . ORG
- Anatomy Of A Russian Cybercrime Ecosystem Targeting Android - Dark Reading
- DIY Total Information Awareness spying for cheap with CreepyDOL - Computerworld
- 'Creepy' spy computer turns your real big brother into the NSA - Digital Trends
- One Hacked Android User Can Lead To An Enterprise Breach - Dark Reading
- Hacker's Tiny Spy Computers Aim To Track Targets Around Entire Neighborhoods And Cities - Forbes
- One third of all mobile malware is produced by just 10 Russian companies - Gigaom
- Android's One-Click Google Auth Is a Buffet for Hackers - Gizmodo
- Disposable Spy Computers Are Disturbingly Easy And Cheap To Make - Gizmodo AU
- Compromising Google Accounts and enterprises via flaw in Android SSO - Help Net Security
- Researchers create DIY IDS for identifying hacked smartphones - Help Net Security
- Android Malware Will Hit One Million Mark in 2013 - IBTimes
- Android one-click Google authentication method puts users, businesses at risk - IDG/Computerworld
- Android One-Click Google Apps Access Cracked - InformationWeek
- Hackers Convert Verizon Device Into Mobile Spy Stations - Mashable
- Operation 'Dragon Lady' Uncovers Huge Russian Android SMS Fraud Network - Mashable
- Malware-as-a-service blossoms in Russia, vendor research finds - Network World
- Def Con conference: Android phone bug allows hackers to read texts and email - New York Daily News
- How hackers tapped into my cellphone for less than $300 - NPR
- Hack this: Researchers turn Verizon device into 'mobile spy station' - RT
- Creativity in the cloud and traps of Russian malware - Russia Beyond the Headlines
- Android hack opens access to users' email - T3
- DEF CON: 30 Percent Of Mobile Malware Made By 10 Russian Firms - Techweek Europe
- 3D-printed 'Robotic Button Basher' cracks phones' PINs using persistence, luck - The Independent
- A Cheap Spying Tool With a High Creepy Factor - The New York Times
- Earn £8,000 a MONTH with bogus apps from Russian malware factories - The Register
- Android mobile frauds: Russian malware leads - The Times of India/AFP
- Inexpensive Cellular IDS Allows for Inspection of Cell Traffic - Threatpost
- Researchers Hack Verizon Device, Turn it Into Mobile Spy Station - Voice of America
- Researchers Develop DIY System to Detect Malware on Mobile Phones - Wired
Badge/Badge Challenge
- Gutting and solving the heart of the cards at Def Con 21 - C/NET
- Hidden Circuits and Handmade Clockwork: The Striking Intricacies of Def Con Badges - Wired
Will Smith
- Will Smith makes unexpected appearance at Defcon hacker conference - IDG/TechHive
- Actor Will Smith Hangs Out With Hackers - Infopackets
- Will Smith hace aparición sorpresa en la conferencia de hackers Defcon - PYSN Noticias
- Will Smith faz aparição inesperada na conferência hacker Defcon - IDG Now
Social Engineering
- Dating guru resurrects Robin Sage by social engineering TS/SCI holders on LinkedIn - CSO
- DEF CON attendees demonstrate social engineering prowess in CTF contest - CSO
- How to avoid a social engineering attack at Black Hat and Def Con - CSO
- Hacking people - ITWeb
- Dating coach 'hacks people' to find sensitive defence secrets - News.com.au
- Dating coach shows how to get classified military intel using social engineering - The Verge
EFF Crypto Shirt
- Decrypting EFF's DEFCON crypto-challenge tee - Boingboing
- Can You Solve the Encryption Puzzle In the EFF's Def Con T-Shirt? (Updated) - Gizmodo
- EFFのDefConシャツ、解読できる人?("DefCon shirt EFF, somebody who can decipher?") - Gizmodo Japan
Documentary
- DEFCON: A Documentary About the World's Largest Hacking Conference - Gizmodo
- DEFCON: The Documentary, a record of the 20th annual conference - Metafilter
- Hacker-Doku online: "Defcon: The Documentary" - Zeit Online
- Watch this: 'Def Con: The Documentary' covers two decades of a giant hacker meetup - The Verge
IPV6
- Researchers release tool to pickup the SLAAC in Man-In-The-Middle attacks using IPv6 - CSO
- Easy-to-use attack exploits IPv6 traffic on IPv4 networks - GCN
- DEFCON: Ataques al protocolo IPv6 ("DEFCON: Attacks to IPv6") - el semanario
- What is Facebook doing at a hacker convention in Vegas? - The Verge
- Facebook Makes Friends With Hackers - The Wall Street Journal
Wireless
- Wi-Fi routers: More security risks than ever - C/NET
- WiFi Pineapple Penetration-Testing Tool Sparks Interest at DEF CON - eWeek
- The WiFi Pineapple makes it easy to hack wireless devices - FierceCIO
Misc
- U of C prof heads to hackers' conference in Vegas - Calgary Herald
- 10 Sci-Fi Hacks That Are Now a Reality - Huffington Post
- Researchers demo new IPv6 attack against Windows 8 PCs - ComputerWorldUK/Techworld
- Criminal minds in the channel - CRN
- Def Con 'Crack Me if You Can' Contest Picks Apart Passwords - eWeek
- 5 Top Targets for Today's Hackers - Forbes
- The Type Of People Who Get Suckered By A Twitter Bot - Forbes
- Wall Of Sheep Hacker Group Exposes NFC's Risks At Def Con 2013 - Forbes
- Researcher builds botnet-powered distributed file storage system using JavaScript - IDG/Javaworld
- "安全宝蓝莲花"盛放全球黑客海天盛筵 (" "Safe Treasure Blue Lotus" bloom global hacker Rendez-Vous ") - CCTV
- Le botnet utilisé pour le stockage de fichier ("The botnet used for file storage") - ICT Journal
- Q+A: Ralph 'The Ethical Hacker' Echemendia talks Snowden, Feds and DefCon - Las Vegas Sun
- HOW DOES A VEGAS CASINO STAY SAFE DURING DEF CON? - Las Vegas Weekly
- McAfee CTO Expected to Join Department of Homeland Security - Law.com
- Defcon 21 : l'accès simplifié aux services Google pointé du doigt ("Defcon 21: simplified access to Google services fingered") - Lemonde Informatique
- The 26-Year-Old Montana Legislator Fighting for Your Online Privacy - Mashable
- DEF CON 21大会 那些跌破眼球的创意 ("DEF CON 21 meeting those below the eye of the creative") - Zol . COM . cn
- 图片报道:全球最大黑客大会DEF CON 21 ("Photo Report: the world's largest hacker conference DEF CON 21") - Enet . com . cn
- Forensic Experts Poke Holes in Snapchat and Facebook - Mashable
- Def Con und Black Hat: Hacker und Geheimdienste treffen sich in Las Vegas - Netzpolitik
- DEF CON Hackers Unveil a New Way of Visualizing Web Vulnerabilities - Slashdot
- How should you protect yourself from cyber surveillance? - The Guardian
- How should you protect yourself from cyber surveillance? - Raw Story
- Convenient Google WebLogin Tokens Can Expose User Accounts, Data - Threatpost
- Why making 'consent' the center of privacy law is important - VentureBeat
Was August 1st-4th, 2013 at the Rio Hotel & Casino
Speakers & Presentations
Alex Abdo, Catherine Crump, Christopher Soghoian, Kade Crockford, Nicole Ozer
The ACLU Presents: NSA Surveillance and More
Kurt Opsahl, Marcia Hoffmann, Dan Auerbach, Eva Galperin, Marc Jaycox, Mitch Stoltz
Ask the EFF: The Year in Digital Civil Liberties
David Mortman, Rich Mogull, Chris Hoff, Dave Maynor, Larry Pesce, James Arlen, Rob Graham, Alex Rothman
DEF CON Comedy Jam Part VI, Return of the Fail
Joe Grand, Mark 'Smitty' Smith, LosT, RenderMan, FirmWarez
Hardware Hacking with Microcontrollers: A Panel Discussion
Sameer Bhalotra, Robert Brese, Lt. Gen. Robert Elder, Bruce McConnell, Mark Weatherford, Professor James R. Lint
The Policy Wonk Lounge
bughardy, Eagle1753 UPDATED
OTP, It won't save you from free rides!
Read It! (PDF | White Paper | Extras)Daniel Chechik, Anat (Fox) Davidi UPDATED
Utilizing Popular Websites for Malicious Purposes Using RDI
Read It! (PDF)Daniel "unicornFurnace" Crowley, Jennifer "savagejen" Savage, David "videoman" Bryan
Home Invasion 2.0 - Attacking Network-Controlled Consumer Devices
Read It! (PDF | White Paper | Extras)Ang Cui, Michael Costello UPDATED
Stepping P3wns: Adventures in full spectrum embedded exploitation (and defense!)
Read It! (PDF)Andy Davis UPDATED
Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions
Read It! (PDF | White Paper)Doug DePerry, Tom Ritter UPDATED
I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell
Read It! (PDF | Extras)Lt. Gen. Robert Elder
From Nukes to Cyber – Alternative Approaches for Proactive Defense and Mission Assurance
Justin Engler, Paul Vines
Electromechanical PIN Cracking with Robotic Reconfigurable Button Basher (and C3BO)
Read It! (PDF | White Paper | Extras)Amir Etemadieh, CJ Heres, Mike Baker, Hans Nielsen
Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot
Read It! (PDF)Jaime Filson (WiK), Rob Fuller (Mubix)
gitDigger: Creating useful wordlists from public GitHub repositories
Read It! (PDF)Eric Fulton, Daniel Zolnikov
The Politics of Privacy and Technology: Fighting an Uphill Battle
Read It! (PDF)Brian Gorenc, Jasiel Spelman
Java Every-Days: Exploiting Software Running on 3 Billion Devices
Read It! (PDF | White Paper)Dan Griffin UPDATED
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Read It! (PDF)Abraham Kang, Dinis Cruz UPDATED
Resting on Your Laurels will get you Pwned: Effectively Code Reviewing REST Applications to avoid getting powned
Read It! (PDF)David Lawrence, Eric Van Albert, Robert Johnson UPDATED
Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock
Read It! (PDF | Extras)Drea London, Kyle O'Meara
This presentation will self-destruct in 45 minutes: A forensic deep dive into self-destructing message apps
Todd Manning, Zach Lanier UPDATED
GoPro or GTFO: A Tale of Reversing
an Embedded System
Read It! (PDF)
Marion Marschalek
A Thorny Piece Of Malware (And Me): The Nastiness of SEH, VFTables & Multi-Threading
Read It! (PDF | Extras)Wesley McGrew
Pwn The Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices
Read It! (PDF | White Paper | Extras)Tony Miu, Wai-leng Lee UPDATED
Kill 'em All — DDoS Protection Total Annihilation!
Read It! (PDF | White Paper | Extras)Nicholas J. Percoco, Joshua Corman
The Cavalry Isn't Coming: Starting the Revolution to Fsck it All!
Phorkus (Mark Carey), Evilrob (Rob Bathurst)
Doing Bad Things to 'Good' Security Appliances
Read It! (PDF)Alexandre Pinto UPDATED
Defending Networks with Incomplete Information: A Machine Learning Approach
Read It! (PDF | White Paper)Dr. Philip Polstra
We are Legion: Pentesting with an Army of Low-power Low-cost Devices
Read It! (PDF | Extras)Chris John Riley UPDATED
Defense by numbers: Making problems for script kiddies and scanner monkeys
Read It! (PDF)Eric Robi, Michael Perklin UPDATED
Forensic Fails - Shift + Delete won't help you here
Read It! (PDF)Teal Rogers, Alejandro Caceres
The dawn of Web 3.0: website mapping and vulnerability scanning in 3D, just like you saw in the movies
Read It! (PDF)Runa A. Sandvik
Safety of the Tor network: a look at network diversity, relay operators, and malicious relays
Read It! (PDF)Michael Schrenk
How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers
Read It! (PDF)Hunter Scott UPDATED
Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks
Read It! (PDF)Balint Seeber
All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio
Read It! (PDF)Daniel Selifonov
A Password is Not Enough: Why disk encryption is broken and how we might fix it
Read It! (PDF)James Snodgrass (PuNk1nPo0p), Josh Hoover (wishbone) UPDATED
BYO-Disaster and Why Corporate Wireless Security Still Sucks
Read It! (PDF | Extras)Jason Staggs UPDATED
How to Hack Your Mini Cooper: Reverse Engineering Controller Area Network (CAN) Messages on Passenger Automobiles
Read It! (PDF | White Paper | Extras)Alex Stamos
An Open Letter - The White Hat's Dilemma: Professional Ethics in the Age of Swartz, PRISM and Stuxnet
Chris Sumner, Randall Wald UPDATED
Predicting Susceptibility to Social Bots on Twitter
Read It! (PDF)Richard Thieme
The Government and UFOs: A Historical Analysis by Richard Thieme
Read It! (PDF | Extras)Josh 'm0nk' Thomas UPDATED

