- DEF CON 12 - Adam Bresson, Identification Evasion: Knowledge and Countermeasures
- DEF CON 12 - Adam Laurie and Martin Herfurt, Bluesnarfing:The Risk From Digital Pickpockets
- DEF CON 12 - Bev Harris & Rebecca Mercuri, Part 1 - Hack the Vote: Election 2004
- DEF CON 12 - Bev Harris & Rebecca Mercuri, Part 2 - Hack the Vote: Election 2004
- DEF CON 12 - Brett Moore, Shoot the Messenger Using Window Messages to Exploit Local win32
- DEF CON 12 - Brett Neilson,The Advantages of Being an Amateur
- DEF CON 12 - Cameron nummish Hotchkies,Blind SQL Injection Automation Techniques
- DEF CON 12 - Chris Eagle - Attacking Obfuscated Code
- DEF CON 12 - CrimethInc, Electronic Civil Disobedience and the Republican National Convention
- DEF CON 12 - Dan Kaminsky, Black Ops of TCP/IP 2004
- DEF CON 12 - Dark Tangent, Award Ceremonies
- DEF CON 12 - Dead Addict, Hacking the Media, and Avoiding Being Hacked by the Media
- DEF CON 12 - Deral Heiland,The Insecure Workstation
- DEF CON 12 - Doug Mohney, DIGEX At the Dawn of the Commercial Internet
- DEF CON 12 - Elonka Dunin,Kryptos and the Cracking of the Cyrillic Projector Cipher
- DEF CON 12 - Fingerprinting with Morph
- DEF CON 12 - Foofus, Old Tricks
- DEF CON 12 - FX and Halvar - Take it from here
- DEF CON 12 - Gene Cronk, IPv6 Primer
- DEF CON 12 - Greg Conti, Network Attack Visualization
- DEF CON 12 - Grifter, Russ Rogers and Tierra, Project Prometheus
- DEF CON 12 - h1kari,Smart Card Security: From GSM to Parking Meters
- DEF CON 12 - Ian Clarke, Freenet: Taming the World's Largest Tamagotchi
- DEF CON 12 - Ian Vitek, Exploring Terminal Services, The Last 12 Month of Research.
- DEF CON 12 - IcE tRe, Virus, Worms and Trojans: Where are we going?
- DEF CON 12 - j0hnny long, Google Hacking- The Return of the Googledorks
- DEF CON 12 - Jamie Butler - VICE
- DEF CON 12 - Jesee Krembs and Nicholas Farr, The Hacker Foundation: An Introduction
- DEF CON 12 - Jon Callas, How Do We Get The World To Use Message Security
- DEF CON 12 - Joshua Teitelbaum and Peter Leung, CryptoMail Encrypted E-Mail for All
- DEF CON 12 - Kevin Mahaffey, Smile, You're on Candid Camera
- DEF CON 12 - Len Sassaman, Mixmaster vs. Reliable: A Comparison of Two Anonymous Remailers
- DEF CON 12 - Lucky 225, Phreaking in the Age of Voice Over IP
- DEF CON 12 - Lukas Grunwald, RF-ID and Smart-Labes: Myth, Technology and Attacks
- DEF CON 12 - Maximillian Dornseif, Far More Than You Ever Wanted To Tell
- DEF CON 12 - Max Mullen - Hack Your Car
- DEF CON 12 - Michael Davis, The Open-Source Security Myth and How to Make It A Reality
- DEF CON 12 - Michael Rash, Advanced Netfilter; Content Replacement (ala Snort_inline)
- DEF CON 12 - Michael T. Raggo , Steganography, Steganalysis and Cryptanalysis
- DEF CON 12 - n0namehere, Real World Privacy, How to Leave Less of A Trail in Life
- DEF CON 12 - Nathan Hamiel (Ichabod Ver7),Down with the RIAA
- DEF CON 12 - Ne0nRa1n - Better than Life - Manipulation of The Human Brain With The Use of Machines
- DEF CON 12 -Nick Mathewson, Snake Oil Anonymity: How To Spot It, And How Not To Write It
- DEF CON 12 - Nothingface, Automotive Networks
- DEF CON 12 - Panel, Ask EFF: Discussion and Q/A on the State of Digital Liberties
- DEF CON 12 - Panel - Meet the Feds
- DEF CON 12 - Peter D. Feaver and Kenneth Geers, The First International Cyber War
- DEF CON 12 - Rakan El-Khalil, Information Hiding in Executable Binaries
- DEF CON 12 - Richard Thieme,Quantum Hacking: In Search of a Unified Theory
- DEF CON 12 - Sarah Gordon,What Do You Mean, Privacy?
- DEF CON 12 - Scott Fullam, Introduction to Hardware Hacking
- DEF CON 12 - Sean O'Toole, Mutating the Mutators
- DEF CON 12 - Sensepost, When the Tables Turn
- DEF CON 12 - spoonm and HD Moore, Bubonic Buffer Overflow
- DEF CON 12 -Thorsten Holz and Others - NoSEBrEaK Defeating Honeynets
- DEF CON 12 - Todd Moore, Cracking Net2Phone
- DEF CON 12 - Tony Arcieri, PDTP :The Peer Distributed Transfer Protocol
- DEF CON 12 - Tzi-cker Chiueh, Program Semantics Aware Intrusion Detection
- DEF CON 12 - Wavyhill and Andre Goldman,Toward a Private Digital Economy
- DEF CON 12 - Wendy Seltzer and Seth Schoen, Hacking the Spectrum