-
Skip to DEF CON:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- CN B
- 26
- CN 1
- 27
- 28
- NYE21
- CN P
- 29
- 30
- 31
- 32
Was July 30 - August 1, 2010 at the Riviera Hotel & Casino
Speakers & Presentations
Chema Alonso, José Palazón "Palako"
FOCA2: The FOCA Strikes Back
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Chema Alonso, José Palazón "Palako"
Connection String Parameter Attacks
Read It! (Slides | White Paper)
See it! (Slide Video | Speaker and Slide Video )
Hear it! (m4b Audio)
WPA Too!
Read It! (Slides | White Paper)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Francisco Amato, Federico Kirschbaum
Evilgrade, "You Still Have
Pending Upgrades?"
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Cyber[Crime | War] Charting Dangerous Waters
Read It! (Slides | White Paper)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
James Arlen : UPDATED :
SCADA and ICS for Security Experts: How to avoid Cyberdouchery
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Itzhak "Zuk" Avraham : UPDATED :
Exploitation on ARM - Technique and Bypassing Defense Mechanisms
Read It! (Slides | White Paper)
See it! (Speaker and Slide Video)
Hear it! (m4b Audio)
Web Services We Just Don't Need
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Mobile Privacy: Tor on the iPhone and Other Unusual Devices
Read It! (Slides | White Paper)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Who Cares About IPv6?
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Frank Breedijk : UPDATED :
Seccubus – Analyzing vulnerability assessment data the easy way...
Read It! (Slides | White Paper)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Michael Brooks : UPDATED :
mas*****ploitation
Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Resilient Botnet Command and Control with Tor
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
How Hackers Won the Zombie Apocalypse
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Jeremy Brown : UPDATED :
Exploiting SCADA Systems
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
David "VideoMan" M. N. Bryan, Michael Anderson
Cloud Computing, a Weapon of Mass Destruction?
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
David "VideoMan" M. N. Bryan, Jared Bird
The keys to running a successful Def con Group by DC612
See it! (Slide Video)
Hear it! (m4b Audio)
Google Toolbar: The NARC Within
Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Open Public Sensors and Trend Monitoring
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Elie Bursztein, Baptiste Gourdin, Gustav Rydstedt
Bad Memories
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Elie Bursztein, Jocelyn Lagarenne, Dan Boneh : UPDATED :
Kartograph : Finding a Needle in a Haystack or How to Apply Reverse Engineering Techniques to Cheat at
Video Games
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video )
Hear it! (m4b Audio)
Token Kidnapping's Revenge
Read It! (Slides | White Paper | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Greg Conti : UPDATED :
Our Instrumented Lives: Sensors, Sensors, Everywhere...
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Programmable HID USB Keystroke Dongle: Using the *****sy as a pen testing device
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
John Curran : UPDATED :
IPv6: No Longer Optional
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Joe Damato : UPDATED :
Function Hooking for Mac OSX and Linux
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Exploiting Internet Surveillance Systems
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Physical Security : You're Doing It Wrong!
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
The Search for Perfect Handcuffs...
and the Perfect Handcuff Key
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Katana: Portable Multi-Boot Security Suite
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Breaking Bluetooth By Being Bored
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
An Observatory for the SSLiverse
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
How Unique Is Your Browser?
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Your Boss is a Douchebag... How About You?
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Hacking with Hardware: Introducing the Universal RF USB Keyboard Emulation Device - URFUKED
Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Hacking and Protecting
Oracle Database Vault
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Trolling Reverse-Engineers with Math: Ness... It hurts...
Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
The Anatomy of Drug Testing
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Mastering the Nmap Scripting Engine
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Kenneth Geers : UPDATED :
Live Fire Exercise: Baltic Cyber Shield 2010
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Making the DEF CON 18 Badge
Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Jennifer Granick, Matt Zimmerman
Legal Developments in Hardware Hacking
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Jennifer Granick, Kevin Bankston, Marcia Hofmann, Kurt Opsahl
The Law of Laptop Search and Seizure
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Advanced Format String Attacks
Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Tales from the Crypto
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Nathan Hamiel, Marcin Wielgoszewski
Constricting the Web: Offensive Python for Web Hackers
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
How to Hack Millions of Routers
Read It! (Slides | White Paper | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
FOE‚ The Release of Feed Over Email, a Solution to Feed Controversial News to Censored Countries
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
How To Get Your FBI File (and Other Information You Want From the Federal Government)
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
HONEY : UPDATED :
Ripping Media Off Of the Wire
Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Physical Computing, Virtual Security: Adding the Arduino Microcontroller Development Environment to Your Security Toolbox
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
0box Analyzer: AfterDark Runtime Forensics for Automated Malware Analysis and Clustering
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Oren Isacson, Alfredo Ortega : UPDATED :
Exploiting Digital Cameras
Read It! (Slides | White Paper)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Jackpotting Automated Teller Machines Redux
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Black Ops Of Fundamental Defense: Web Edition
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
David Kennedy (ReL1K), Josh Kelley (Winfang)
Powershell...omfg
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Perspectives on Cyber Security and Cyber Warfare
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Dr. Fouad Kiamilev, Corey 'c0re' Lange, Stephen 'afterburn' Janansky
Hardware Black Magic: Designing Printed Circuit Boards
Read It! (Slides)
Ki-Chan Ahn, Dong-Joo Ha : UPDATED :
Malware Migrating to Gaming Consoles: Embedded Devices, an AntiVirus-free Safe Hideout for Malware
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Hardware Hacking for Software Guys
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Training the Next Generation of Hardware Hackers -- Teaching Computer Organization and Assembly Language Hands-on with Embedded Systems
Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
DCFluX in: Moon-bouncer
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Like a Boss: Attacking JBoss
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Air Traffic Control Insecurity 2.0
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Anthony Lai, Jake Appelbaum, Jon Oberheide
The Power of Chinese Security
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Bypassing Smart-card Authentication
and Blocking Debiting: Vulnerabilities
in Atmel Cryptomemory-based
Stored-value Systems
Read It! (Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Blitzableiter - the Release
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Anthony Lineberry, David Richardson, Sr., Tim Wyatt : UPDATED :
These Aren't the Permissions
You're Looking For
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Multiplayer Metasploit: Tag-Team Penetration and Information Gathering
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Repelling the Wily Insider
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
App Attack: Surviving the Mobile Application Explosion
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Changing Threats To Privacy: From TIA To Google
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Facial Recognition: Facts, Fiction, and Fsck-ups
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Searching for Malware: A Review of Attackers' Use of Search Engines to Lure Victims
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Hacking .NET Applications at Runtime: A Dynamic Attack
Read It! (Slides | White Paper | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Joseph McCray : UPDATED :
You Spent All That Money And You Still Got Owned...
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
A ChaosVPN for Playing Capture The Flag
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
John McNabb : UPDATED :
Cyberterrorism and the Security of the National Drinking Water Infrastructure
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
We Don't Need No Stinkin' Badges: Hacking Electronic Door Access Controllers
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Securing MMOs: A Security Professional's View From the Inside
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Letting the Air Out of Tire Pressure Monitoring Systems
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Charlie Miller : UPDATED :
Kim Jong-il and Me: How to Build a Cyber Army to Defeat the U.S.
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
HD Voice - The Overdue Revolution
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Getting Social with the Smart Grid
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
David Mortman, Rich Mogull, Chris Hoff, Rob Graham, Erratta, Dave Maynor, Larry Pesce
Defcon Security Jam III: Now in 3-D?
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Wardriving the Smart Grid: Practical Approaches to Attacking Utility Packet Radios
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Patrick Mullen, Ryan Pentney : UPDATED :
Open Source Framework for Advanced Intrusion Detection Solutions
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Antique Exploitation (aka Terminator 3: Point One One for Workgroups)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
TW "Mage2" Otto : UPDATED :
Electronic Weaponry or How to Rule
the World While Shopping at Radio Shack
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Big Brother on the Big Screen: Fact/Fiction?
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
My Life As A Spyware Developer
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Nicholas J. Percoco, Christian Papathanasiou : UPDATED :
"This is not the droid you're looking for..."
Read It! (Slides | White Paper)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Nicholas J. Percoco, Jibran - : UPDATED :
Malware Freak Show 2: The Client-Side Boogaloo
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
WiMAX Hacking 2010
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Christopher E. Pogue A.K.A "Big Poppa ReverShell"
Sniper Forensics - One Shot, One Kill
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Wade Polk, Paul Malkewicz, J.Novak
Industrial Cyber Security
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
"This Needs to be Fixed" and Other Jokes in Commit Statements
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Adam Pridgen, Matthew Wollenweber
Toolsmithing an IDA Bridge, Case Study For Building A Reverse Engineering Tool
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Build Your Own Security Operations Center for Little or No Money
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Operating System Fingerprinting for Virtual Machines
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Lord of the Bing: Taking Back Search Engine Hacking from Google and Bing
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Build a Lie Detector/Beat a Lie Detector
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Enough Cyber Talk Already! Help get this Collaboration Engine Running!
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Matt Ryanczak : UPDATED :
Implementing IPv6 at ARIN
Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Exploiting WebSphere Application Server's JSP Engine
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
SHODAN for Penetration Testers
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Ferdinand Schober : UPDATED :
Gaming in the Glass Safe - Games
DRM & Privacy
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
You're Stealing It Wrong! 30 Years of
Inter-Pirate Battles
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Blake Self, Wayne Zage, Dolores Zage
SMART Project: Applying Reliability Metrics to Security Vulnerabilities
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Hacking DOCSIS For Fun and Profit
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Rip Your Browser for x06 days
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Hacking Oracle From Web Apps
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Weaponizing Lady GaGa, Psychosonic Attacks
Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
David C. Smith, Samuel Petreski
A New Approach to Forensic Methodology - !!BUSTED!! case studies
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Rich Smith : UPDATED :
pyREtic - In memory reverse engineering for obfuscated Python bytecode
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Your ISP and the Government: Best Friends Forever.
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
strace, Sean Barnum, EvilAdamSmith, Kanen, Joey Tyson,
So Many Ways to Slap A Yo-Ho:: Xploiting Yoville and Facebook for Fun and Profit
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Deceiving the Heavens to Cross the Sea: Using the the 36 stratagems for Social Engineering
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
The Suggmeister : UPDATED :
Social Networking Special Ops:
Extending Data Visualization Tools for Faster Pwnage
Read It! (Slides | White Paper)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Getting Root: Remote Viewing, Non-local Consciousness, Big Picture Hacking, and Knowing Who You Are
Read It! (Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Web Application Fingerprinting with Static Files
VirGraff101: An Introduction to
Virtual Graffiti
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Marc Weber Tobias, Tobias Bluzmanis, Matt Fiddler
INSECURITY ENGINEERING OF PHYSICAL SECURITY SYSTEMS: Locks, Lies, and Videotape
Read It! (Slides)
See it! (Slide Video
Hear it! (m4b Audio)
Attack the Key, Own the Lock
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Valsmith, Colin Ames, Anthony Lai
Balancing the Pwn Trade Deficit
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Paul Vixie, Robert Edmonds : UPDATED :
SIE Passive DNS and the ISC DNS Database
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Michael Weigand, Renderman, Mike Kershaw
Build your own UAV 2.0 - Wireless Mayhem from the Heavens!
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Barrett Weisshaar, Garret Picchioni
The Night The Lights Went Out In Vegas: Demystifying Smartmeter Networks
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Dondi "SpookDoctor06" West : UPDATED :
An Examination of the Adequacy of the Laws Related to Cyber Warfare
Read It! (Slides | White paper)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Joshua Wise : UPDATED :
From "No Way" to 0-day: Weaponizing the Unweaponizable
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Crawling BitTorrent DHTs for Fun and Profit
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Pwned By The Owner: What Happens When You Steal A Hacker's Computer
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Jeffrey Carr, Robert Knake, Joseph Menn, Robert Vamosi
Panel: Of Bytes and Bullets
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Rod Beckstrom, Dan Kaminsky, Paul Mockapetris, Ken Silva, Mark Weatherford
Panel:DNS Systemic Vulnerabilities and Risk Management: A Discussion
with the Experts
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
James Arlen, James Costello, Leigh Honeywell, Tim Krabec, Tiffany Rad
Panel: Hacking The Future: Weaponizing the Next Generation
Read It! (Slides)
Panel: Internet Wars
Kevin Bankston, Eva Galperin, Jennifer Granick, Marcia Hofmann, Kurt Opsahl
Meet the EFF
See it! (Slide Video)
Hear it! (m4b Audio)
Adam, *****, Frank^2, Jeffball, Merlin, Vyrus
oCTF: 5 years in 50 minutes
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
Meet the Feds - Policy, Privacy, Deterrence and Cyber War
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)
PCI, Compromising Controls and Compromising Security
Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)