#
Title
1

Panel: Disclosure Panel

2

Panel: Meet the VCs

3

Panel: Meet the Fed

4

Luke Jennings:One Token to Rule Them All: Post-Exploitation Fun in Windows Environments

5

Lukas Grunwald: Security by Politics - Why it will never work

6

Fred Doyle & Matt Richard: "Beyond Vulnerability Scanning - Extrusion and Exploitability Scanning

7

Iftach Ian Amit: The Inherent Insecurity of Widgets and Gadgets

8

Ofir Arkin: kNAC!

9

Ask EFF: The Year in Digital Civil Liberties

10

Atlas: Remedial Heap Overflows: dlmalloc style

11

Andrea Barisani & Daniele Bianco: Injecting RDS-TMC Traffic Information Signals a.k.a. How to freak out your Satellite Navigation.

12

Geoffrey Bennett: The Completion Backward Principle

13

John "jur1st" Benson: Bridging the Gap Between Technology and the Law

14

Peter Berghammer: A Journalist's Perspective on Security Research

15

Sean M. Bodmer: Analyzing Intrusions & Intruders

16

Sam Bowne: Teaching Hacking at College

17

Sergey Bratus: Entropy-based data organization tricks for log and packet capture browsing.

18

Taylor Brinton & Brett Neilson: Being in the know... Listening to and understanding modern radio systems

19

David Byrne: Intranet Invasion With Anti-DNS Pinning

20

D.J. Capelis: Virtualization: Enough holes to work Vegas

21

Anton Chuvakin & Mike Murray: The Science Of Social engineering: NLP

22

Robert Clark: Computer and Internet Security Law?A Year in Review 2006?2007

23

Greg Conti: Satellite Imagery Analysis

24

Crispin Cowan: Securing Linux Applications With AppArmor

25

Lee Kushner & Mike Murray: Creating and Managing your Security Career

26

Jesse 'x30n' D'Aguanno: LAN Protocol Attacks Part 1 - Arp Reloaded

27

Rick Deacon: Hacking Social Lives: MySpace.com

28

Dead Addict: Picking up the Zero Day; An Everyones Guide to Unexpected Disclosures

29

Delchi & Valsmith: Malware Secrets

30

Jared DeMott & Panel: Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing

31

Ganesh Devarajan: Unraveling SCADA Protocols: Using Sulley Fuzzer

32

Roger Dingledine: Tor and blocking-resistance

33

Toralv Dirro & Dirk Kollberg: Trojans, A Reality Check

34

Steve Dunker: Every thing you ever wanted to know about Police Procedure in 50 minutes.

35

Luiz Eduardo: The Hacker Society around the (corporate) world.

36

Joel Eriksson & Panel: Kernel Wars

37

Nathan S. Evans & Christian Grothoff: Routing in The Dark: Pitch Black

38

Gadi Evron: Estonia and Information Warefare

39

Gadi Evron: Webserver Botnets and Hosting Farms as Attack Platforms

40

Matt Fiddler & Marc Weber Tobias: High Insecurity: Locks, Lies, and Liability

41

Zac Franken: Biometric and token based access control systems: Are you protected by two screws and a plastic cover?

42

Terrence "king tuna" Gareau: Hacking EvDO

43

Kenneth Geers: Greetz from Room 101

44

Damian Gomez: Intelligent debugging for vuln-dev

45

K N Gopinath: Multipot: A More Potent Variant of Evil Twin

46

Joe Grand: Making of the DEFCON 15 Badge

47

Jennifer Granick: Disclosure and Intellectual Property Law: Case Studies

48

David Gustin "nonsequitor" & Abraham "AbEnd" Shultz: Hardware Hacking for Software Geeks

49

Peter Gutmann: The Commercial Malware Industry

50

Nathan "Sysmin" Hamiel & Marklar: Creating Unreliable Systems "Attacking the Systems That Attack You"

51

Ian G. Harris: INTERSTATE: A Stateful Protocol Fuzzer for SIP

52

John Heasman: Hacking the Extensible Firmware Interface

53

Aaron Higbee: Hack Your Car for Boost and Power!

54

Ricky Hill: GeoLocation of Wireless Access Points and "Wireless GeoCaching"

55

Greg Hoglund: VIRTUAL WORLD, REAL HACKING

56

Dr. Thomas J. Holt: The Market for Malware

57

Broward Horne: Click Fraud Detection with Practical Memetics

58

Dan Hubbard: HoneyJax (AKA Web Security Monitoring and Intelligence 2.0)

59

David Hulton: Faster PwninG Assured: New adventures with FPGAs

60

Dave Josephsen: Homeless Vikings, (short-lived bgp prefix hijacking and the spamwars)

61

Dan Kaminsky: Black Ops 2007: Design Reviewing The Web

62

Vitaliy Kamlyuk: Fighting Malware on your own.

63

Patrik Karlsson: SQL injection and out-of-band channeling

64

Benjamin Kurtz: Functional Fuzzing with Funk

65

Mickey Lasky & David C. Smith: Cool stuff learned from competing in the DC3 digital forensic challenge.

66

Edward Lee: Comparing Application Security Tools

67

Janne Lindquist: IPV6 Is bad for your privacy.

68

Johhny Long: No-tech Hacking

69

Marce Luck & Tom Stracener: Hacking the EULA: Reverse Benchmarking Web Application Security Scanners

70

Nick Mathewson: SOCIAL ATTACKS ON ANONYMITY NETWORKS

71

Nick Mathewson: TECHNICAL CHANGES SINCE YOU LAST HEARD ABOUT TOR

72

Nate McFeters & Billy Rios: Biting the Hand that Feeds You - Storing and Serving Malicious Content From Well Known Web Servers

73

Haroon Meer & Marco Slaviero: It's All About the Timing

74

Charlie Miller: How smart is Intelligent Fuzzing - or - how stupid is Dumb Fuzzing?"

75

Doug Mohney: The Next Wireless Frontier - TV White Spaces

76

HD Moore & Valsmith: Tactical Exploitation

77

Dark Tangent Moss: CiscoGate

78

Scott Moulton: Re-Animating Drives - Advanced Data Recovery

79

Shawn Moyer: (un)Smashing the Stack: Overflows, Countermeasures, and the Real World

80

Alexander Muentz: Protecting your IT infrastructure from legal attacks- Subpoenas, Warrants and Transitive Trust. "

81

Rich Murphey, PhD: Windows Vista Log Forensics

82

Ne0nRa1n & Julian Spillane: Hack your brain with video games

83

Danny O'Brien: Digital Rights Worldwide: Or How to Build a Global Hacker Conspiracy

84

Brendan O'connor: Greater than 1: Defeating "strong" Authentication in Web Applications

85

STEVE ORRIN: The SOA/XML Threat Model and New XML/SOA/Web 2.0 Attacks & Threats

86

Alfredo Ortega: OpenBSD remote Exploit and another IPv6 vulnerabilities

87

Chris Palmer & Alex Stamos: Breaking Forensics Software: Weaknesses in Critical Evidence Collection

88

Gadi Evron & Panel: Internet Wars 2007

89

RenderMan & Panel: The Church of WiFi's Wireless Extravaganza

90

Myles Long & Panel: Self-Publishing and the Computer Underground

91

Deviant Ollam & Panel: Boomstick Fu: The Fundamentals of Physical Security at its Most Basic Level

92

Daniel Peck & Ben Feinstein: CaffeineMonkey: Automated Collection, Detection and Analysis of Malicious JavaScript

93

Mike Perry: Securing the Tor Network

94

Aaron Peterson: Pen-testing Wi-Fi

95

Plet: Stealing Identity Management Systems

96

Bruce Potter: Dirty Secrets of the Security Industry

97

Danny Quist & Valsmith: Covert Debugging: Circumventing Software Armoring Techniques

98

Aviv Raff: The Inherent Insecurity of Widgets and Gadgets

99

Vivek Ramachandran: The Emperor Has No Cloak ? WEP Cloaking Exposed

100

Matt Richard: Beyond Vulnerability Scanning - Extrusion and Exploitability Scanning

101

Billy Rios: Biting the Hand that Feeds You - Storing and Serving Malicous Content From Well Known Web Servers

102

Martyn Ruks: MQ Jumping

103

Oskar Sandberg: Network Mathematics: Why is it a Small World?

104

Michael Schearer : The Church of WiFi Presents: Hacking Iraq

105

Bruce Schneier: Q&A with Bruce Schneier

106

Michael Schrenk: The Executable Image Exploit

107

Jason Scott: THE EDGE OF FOREVER - MAKING COMPUTER HISTORY

108

Dror Shalev: A Crazy Toaster: Can Home Devices turn against us?

109

Zed A. Shaw: Saving The Internet With Hate

110

Matthew "Pilgrim" Shuchman: How to be a WiFi Ninja

111

Robert Stoudt: When Tapes Go Missing

112

Subere: Fingerprinting and Cracking Java Obfuscated Code

113

Richard Thieme: Hacking UFOlogy: Thirty Years in the Wilderness of Mirrors

114

Steve "Arrakis" Topletz: Portable Privacy

115

Schuyler Towne: Locksport: An emerging subculture

116

I)ruidm: Real-time Steganography with RTP

117

Squidly1- Theresa Verity: Thinking Outside the Console (box)

118

Jacob West: How I Learned to Stop Fuzzing and Find More Bugs

119

Thomas Wilhelm: Turn-Key PenTest Labs

120

Agent X: 44 Lines about 22 Things that keep me up at Night

121

Paul Sebastian Ziegler: Multiplatform malware within the .NET-Framework

122

Philip R. Zimmermann: ZFONE