Tropical room, back hall on right beyond contests
All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio
Making Of The DEF CON Documentary
Ask the EFF: The Year in Digital Civil Liberties
Decapping Chips the Easy^W Hard Way
Insecurity - A Failure of Imagination
Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock
DEF CON Comedy Jam Part VI, Return of the Fail
Hardware Hacking with Microcontrollers: A Panel Discussion
An Open Letter - The White Hat's Dilemma: Professional Ethics in the Age of Swartz, PRISM and Stuxnet
Suicide Risk Assessment and Intervention Tactics
OTP, It won't save you from free rides!
How to Disclose or Sell an Exploit Without Getting in Trouble
The Policy Wonk Lounge
Defense by numbers: Making problems for script kiddies and scanner monkeys
Resting on Your Laurels will get you Pwned: Effectively Code Reviewing REST Applications to avoid getting powned
This presentation will self-destruct in 45 minutes: A forensic deep dive into self-destructing message apps
Fast Forensics Using Simple Statistics and Cool Tools
Forensic Fails - Shift + Delete won't help you here
Let's screw with nmap
C.R.E.A.M. Cache Rules Evidently Ambiguous, Misunderstood