- Skip to DEF CON:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- CN B
- 26
- CN 1
- 27
- 28
- NYE21
- CN P
- 29
- 30
- 31
- 32
was August 3-5, 2007 at the Riviera Hotel and Casino.
Speakers & Presentations
44 Lines about 22 Things that keep me up at Night
atlas : UPDATED :
Remedial Heap Overflows: dlmalloc style
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
Andrea Barisani & Daniele Bianco
Injecting RDS-TMC Traffic Information Signals
a.k.a. How to freak out your Satellite Navigation
Read It! (Slides | White Paper) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
Bridging the Gap Between Technology and the Law
A Journalist's Perspective on Security Research
Entropy-based data organization tricks for log and packet capture browsing
Intranet Invasion With Anti-DNS Pinning
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)
Panel: Meet the Fed
Computer and Internet Security Law - A Year in Review 2006 - 2007
Securing Linux Applications With AppArmor
LAN Protocol Attacks Part 1 - Arp Reloaded
Hacking Social Lives: MySpace.com
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
Picking up the Zero Day; An Everyones Guide to Unexpected Disclosures
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
Jared DeMott, Dr. Richard Enbody, Dr. Bill Punch : UPDATED :
Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)
Deviant Ollam, Noid, Frank Thornton (a.k.a. Thorn), jur1st
Boomstick Fu: The Fundamentals of Physical Security at its Most Basic Level
Tor and blocking-resistance
Toralv Dirro, Dirk Kollberg : UPDATED :
Trojans: A Reality Check
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
I)ruid : UPDATED :
Real-time Steganography with RTP
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
Everything you ever wanted to know about Police Procedure in 50 minutes
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
The Hacker Society around the (corporate) world
Joel Eriksson, Karl Janmar, Claes Nyberg, Christer Öberg : UPDATED :
Kernel Wars
Read It! (Slides | White Paper) Extras (ZIP) Code (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
Nathan S. Evans, Christian Grothoff
Routing in The Dark: Pitch Black
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)
Estonia: Information Warfare and Strategic Lessons
Gadi Evron, Andrew Fried, Thomas Grasso, Dan Hubbard, Dan Kaminsky, Randy Vaughn, Paul Vixie
Panel: Internet Wars 2007
Biometric and token based access control systems: Are you protected by two screws and a plastic cover? Probably.
Kenneth Geers : UPDATED :
Greetz from Room 101
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)
Intelligent debugging for VulnDev
K.N. Gopinath : UPDATED :
Multipot: A More Potent Variant of Evil Twin
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)
Disclosure and Intellectual Property Law: Case Studies
Security by Politics - Why it will never work
Hardware Hacking for Software Geeks
The Commercial Malware Industry
INTERSTATE: A Stateful Protocol Fuzzer for SIP
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)
Hacking the Extensible Firmware Interface
Hack Your Car for Boost and Power!
GeoLocation of Wireless Access Points and "Wireless GeoCaching"
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
Click Fraud Detection with Practical Memetics
Faster PwninG Assured: New adventures with FPGAs
One Token to Rule Them All: Post-Exploitation Fun in Windows Environments
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
Homeless Vikings, (short-lived bgp prefix hijacking and the spamwars)
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)
Black Ops 2007: Design Reviewing The Web
IPv6 is Bad for Your Privacy
Read It! (Slides | White paper) See It! (m4v Video) Hear it! (m4b Audio)
Myles Long, Rob "Flack" O'Hara, Christian "RaDMan" Wirth : UPDATED :
Self-Publishing and the Computer Underground
Haroon Meer, Marco Slaviero : UPDATED :
It's All About the Timing
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)
Charlie Miller : UPDATED :
How smart is Intelligent Fuzzing
- or -
How stupid is Dumb Fuzzing?
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)
The Next Wireless Frontier - TV White Spaces
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
H.D. Moore, Valsmith : UPDATED :
Tactical Exploitation
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)
David Mortman, Paul Proctor,
Window Snyder, Ian Robertson, David Maynor,
Dave Goldsmith
Disclosure Panel
Re-Animating Drives & Advanced Data Recovery
Read It! (White Paper) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
(un)Smashing the Stack: Overflows, Countermeasures, and the Real World
Read It! (White Paper) See It! (m4v Video) Hear it! (m4b Audio)
Alexander Muentz : UPDATED :
Protecting your IT infrastructure from legal attacks- Subpoenas, Warrants and Transitive Trust
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)
Creating and Managing Your Security Career
The Science of Social Engineering: NLP, Hypnosis and the science of persuasion
Brett Neilson, Taylor Brinton : UPDATED :
Being in the know... Listening to and understanding modern radio systems
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
Hack your brain with video games
Digital Rights Worldwide: Or How to Build a Global Hacker Conspiracy
Greater than 1: Defeating "strong" Authentication in Web Applications
Kurt Opsahl, Kevin Bankston, Marcia Hofmann, Matt Zimmerman, Danny O'Brien, Peter Eckersley
Panel: Ask the EFF
OpenBSD remote Exploit and another IPv6 vulnerabilities
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)
Breaking Forensics Software: Weaknesses in Critical Evidence Collection
Read It! (White Paper) See It! (m4v Video) Hear it! (m4b Audio)
CaffeineMonkey: Automated Collection, Detection and Analysis of Malicious JavaScript
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)
Mike Perry : UPDATED :
Securing the Tor Network
Read It! (Slides | White Paper) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
Covert Debugging: Circumventing Software Armoring Techniques
The Inherent Insecurity of Widgets and Gadgets
Vivek Ramachandran : UPDATED :
The Emperor Has No Cloak - WEP Cloaking Exposed
Read It! (Slides | White Paper) See It! (m4v Video)
Matt Richard, Fred Doyle : UPDATED :
Beyond Vulnerability Scanning - Extrusion and Exploitability Scanning
Billy Rios, Nathan McFeters : UPDATED :
Biting the Hand that Feeds You - Storing and Serving Malicous Content >From Well Known Web Servers
Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)
Vulnerabilities and The Information Assurance Directorate
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)
The Church of WiFi Presents: Hacking Iraq
Ari Schwartz, Ben Edelman, Eileen Harrington, Mario Vuksan
Panel: Center for Democracy & Technology Anti-Spyware Coalition
THE EDGE OF FOREVER - MAKING COMPUTER HISTORY
Cool stuff learned from competing in the DC3 digital forensic challenge
Squidly1 : UPDATED :
Thinking Outside the Console (box)
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
Robert Stoudt : UPDATED :
When Tapes Go Missing
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
Tom Stracener, Marce Luck : UPDATED :
Hacking the EULA: Reverse Benchmarking Web Application Security Scanners
Fingerprinting and Cracking Java Obfuscated Code
Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
The Church of WiFi's Wireless Extravaganza
Hacking UFOlogy: Thirty Years in the Wilderness of Mirrors
Read It! (White Paper) See It! (m4v Video) Hear it! (m4b Audio)