- DEF CON 16 - Anthony Martinez & Thomas Bowen : Toasterkit, a modular NetBSD rootkit.
- DEF CON 16 - Anton Kapela & Alex Pilosov: Stealing The Internet
- DEF CON 16 - Blake Self, Durandal & Bitemytaco: Free Anonymous Internet Using Modified Cable Modems
- DEF CON 16 - Chris Eagle & Tim Vidas: Next Generation Collaborative Reversing
- DEF CON 16 - Christopher Tarnovsky: Inducing Momentary Faults Within Secure Smartcards
- DEF CON 16 - David Maynor & Robert Graham: Bringing Sexy Back: Breaking in with Style
- DEF CON 16 - David Scott Lewis: Fireside Chat
- DEF CON 16 - David Weston & Tiller Beauchamp : RE:Trace
- DEF CON 16 - D.J. Capelis: Building a Real Session Layer
- DEF CON 16 - Don M. Blumenthal: What To Do When Your Data Winds Up Where It Shouldn't
- DEF CON 16 - Don M. Blumenthal: Working with Law Enforcement
- DEF CON 16 - Doug Farre: Identification Card Security
- DEF CON 16 - Eric Schmiedl: Advanced Physical Attacks
- DEF CON 16 - Eric Smith & Dr. Shana Dardan: Medical Identity Theft
- DEF CON 16 - Fabian "Fabs" Yamaguchi & FX: New ideas for old practices - Port-Scanning improved
- DEF CON 16 - Ferdinand Schober: Gaming - the next overlooked security hole
- DEF CON 16 - Fouad Kiamilev & Ryan Hoover: Demonstration of Hardware Trojans
- DEF CON 16 - FX: Developments in Cisco IOS Forensics
- DEF CON 16 - FX: Toying with Barcodes
- DEF CON 16 - Fyodor: Nmap: Scanning the Internet
- DEF CON 16 - G. Mark Hardy: A Hacker Looks at 50
- DEF CON 16 - Greg Conti: Could Googling Take Down a President?
- DEF CON 16 - Guy Martin: Sniffing Cable Modems
- DEF CON 16 - Ian Angell: Digital Security, A Risky Business
- DEF CON 16 - Igor Muttik: Good Viruses. Evaluating the Risks.
- DEF CON 16 - James Shewmaker: StegoFS
- DEF CON 16 - Jan Newger: Anti-RE Techniques in DRM Code
- DEF CON 16 - Jay Beale: Owning the Users with Agent in the Middle
- DEF CON 16 - Jay Beale: They're Hacking Our Clients!
- DEF CON 16 - Jim O'Leary: Every Breath You Take
- DEF CON 16 - Joe Cicero &Michael Vieau: Hacking E.S.P.
- DEF CON 16 - Joe "Kingpin" Grand & Zoz: BSODomizer
- DEF CON 16 - John Fitzpatrick: Virtually Hacking
- DEF CON 16 - John "Jur1st" Benson: When Lawyers Attack!
- DEF CON 16 - JonM: Ham For Hackers- Take Back the Airwaves
- DEF CON 16 - Kevin Figueroa, Marco Figueroa & Anthony Williams: VLANs Layer 2 Attacks
- DEF CON 16 - Kolisar: WhiteSpace: A Different Approach to JavaScript Obfuscation
- DEF CON 16 - Lee Kushner & Mike Murray: Career Mythbusters
- DEF CON 16 - Lyn:Tuning Your Brain.
- DEF CON 16 - Magnus Brading: Generic, Decentralized, Unstoppable Anonymity: The Phantom Protocol
- DEF CON 16 - Major Malfunction: Feed my Sat Monkey
- DEF CON 16 - Marc Weber Tobias & Matt Fiddler: Open in 30 Seconds
- DEF CON 16 - Mark Bristow: ModScan: A SCADA MODBUS Network Scanner
- DEF CON 16 - Mati Aharoni: BackTrack Foo - From bug to 0day
- DEF CON 16 - Matt "DCFLuX" Krick: Flux on: EAS (Emergency Alert System)
- DEF CON 16 - Matt Weir & Sudhir Aggarwal: Password Cracking on a Budget
- DEF CON 16 - Matt Yoder: The Death Envelope: A Medieval Solution to a 21st Century Problem
- DEF CON 16 - Michael Brooks: CSRF Bouncing
- DEF CON 16 - Michael Brooks: Deciphering Captcha
- DEF CON 16 - Michael Ligh & Greg Sinclair: Malware RCE: Debuggers and Decryptor Development
- DEF CON 16 - Mike Perry: 365-Day: Active https cookie hijacking
- DEF CON 16 - Mike Renlund: The Big Picture: Digital Cinema Technology and Security
- DEF CON 16 - Mike Spindel & Scott Torborg: CAPTCHAs: Are they really hopeless? (Yes)
- DEF CON 16 - Morgan Marquise-Boire: Fear, Uncertainty and the Digital Armageddon
- DEF CON 16 - Nathan Evans & Christian Grothoff: de-Tor-iorate Anonymity
- DEF CON 16 - Nathan Hamiel & Shawn Moyer: Satan is on my Friends list
- DEF CON 16 - Ne0nRa1n & Kingpin: Brain Games: Make your own Biofeedback Video Game
- DEF CON 16 - Nelson Murilo & Luiz Eduardo: Beholder: New wifi monitor tool
- DEF CON 16 - Nick Harbour: Advanced Software Armoring and Polymorphic Kung Fu
- DEF CON 16 - N.N.P: VoIPER: Smashing the VoIP stack while you sleep
- DEF CON 16 - NYCMIKE:The World of Pager Sniffing/Interception
- DEF CON 16 - Panel: All Your Sploits (and Servers) Are Belong To Us
- DEF CON 16 - Panel: Ask EFF: The Year in Digital Civil Liberties
- DEF CON 16 - Panel: Autoimmunity Disorder in Wireless LAN's
- DEF CON 16 - Panel: Black Vs. White: The Complete Life Cycle of a Real World Breach
- DEF CON 16 - Panel: Commission on Cyber Security for the 44th Presidency
- DEF CON 16 - Panel: Exploiting A Hundred-Million Hosts Before Brunch
- DEF CON 16 - Panel: Hacking in the Name of Science
- DEF CON 16 - Panel: Hacking OpenVMS
- DEF CON 16 - Panel: Internet Wars
- DEF CON 16 - Panel: Living in the RIA World
- DEF CON 16 - Panel: Meet the Feds
- DEF CON 16 - Paul Craig: Compromising Windows Based Internet Kiosks
- DEF CON 16 - Paul F Renda: The true story of the Radioactive Boyscout
- DEF CON 16 - Peter Berghammer: The emergence (and use) of Open Source Warfare
- DEF CON 16 - Phil Zimmerman: Z-Phone
- DEF CON 16 - Phreakmonkey and mutantMandias: Urban Exploration
- DEF CON 16 - Renderman:How can I pwn thee? Let me count the ways
- DEF CON 16 - Rick Hill: War Ballooning-Kismet Wireless "Eye in the Sky"
- DEF CON 16 - Robert Ricks: New Tool for SQL Injection with DNS Exfiltration
- DEF CON 16 - Roger Dingledine: Security Anonymity Vulnerablities in Tor
- DEF CON 16 - Ryan Trost: Evade IDS/IPS Systems using Geospatial Threat Detection
- DEF CON 16 - Sandy "Mouse" Clark: Climbing Everest: An Insider's Look at one state's Voting Systems
- DEF CON 16 - Schuyler Towne & Jon King: How to make Friends & Influence Lock Manufacturers
- DEF CON 16 - Scott Moulton: Forensics is ONLY for Private Investigators
- DEF CON 16 - Scott Moulton: Solid Stated Drives Destroy Forensic & Data Recovery Jobs: Animated!
- DEF CON 16 - SensePost: Pushing the Camel through the eye of a needle
- DEF CON 16 - Simon Howard: Race-2-Zero Unpacked
- DEF CON 16 - The Dark Tangent & Joe "Kingpin" Grand: Welcome & Making of the Badge Talk
- DEF CON 16 - Thomas Wilhelm: Mobile Hacker Space
- DEF CON 16 - Tom Stracener & Robert Hansen: Xploiting Google Gadgets: Gmalware and Beyond
- DEF CON 16 - Tony Howlett: The Death of Cash
- DEF CON 16 - Tottenkoph, Rev, & Philosopher: Hijacking the Outdoor Digital Billboard Network
- DEF CON 16 - Travis Goodspeed - Journey to the center of the HP28
- DEF CON 16 - Valsmith & Colin Ames: MetaPost-Exploitation
- DEF CON 16 - Vic Vandal: Keeping Secret Secrets Secret and Sharing Secret Secrets Secretly
- DEF CON 16 - Weasel: Compliance: The Enterprise Vulnerability Roadmap
- DEF CON 16 - Wendel Guglielmetti Henrique: Playing with Web Application Firewalls
- DEF CON 16 - Workshop: Davix Workshop
- DEF CON 16 - Zac Franken: Is that a unique credential in your pocket?