- DEF CON 18 - Fyodor & David Fifield - Mastering the Nmap Scripting Engine
- DEF CON 18 - Garry Pejski - My Life as a Spyware Developer
- DEF CON 18 - G. Mark Hardy - Tales from the Crypto
- DEF CON 18 - Greg Conti - Our Instrumented Lives: Sensors, Sensors, Everywhere...
- DEF CON 18 - Honey - Ripping Media Off Of the Wire
- DEF CON 18 - Iftach Ian Amit - Cyber[Crime|War] Charting Dangerous Waters
- DEF CON 18 - Itzhak "zuk" Avraham - Exploitation on ARM - Technique and Bypassing Defense Mechanisms
- DEF CON 18 - Jack Daniel & Panel - PCI, Compromising Controls and Compromising Security
- DEF CON 18 - James Arlen - SCADA and ICS for Security Experts: How to Avoid Cyberdouchery
- DEF CON 18 - James Shewmaker - Rip Your Browser for x06 days
- DEF CON 18 - Jason Scott - You're Stealing It Wrong! 30 Years of Inter-Pirate Battles
- DEF CON 18 - Jayson E. Street - Deceiving the Heavens to Cross the Sea
- DEF CON 18 - Jeff Bryner - Google Toolbar: The NARC Within
- DEF CON 18 - Jennifer Granick & Matt Zimmerman - Legal Developments in Hardware Hacking
- DEF CON 18 - Jeongwook Oh - ExploitSpotting: Locating Vulnerabilities Out of Vendor Patches
- DEF CON 18 - Jeremy Brown - Exploiting SCADA Systems
- DEF CON 18 - Jimi Fiekert - The Anatomy of Drug Testing
- DEF CON 18 - Jim Rennie & Eric Rachner - Search & Seizure & Golfballs
- DEF CON 18 - Joe Damato - Function Hooking for Mac OSX and Linux
- DEF CON 18 - John Curran - IPv6: No Longer Optional
- DEF CON 18 - John McNabb - Cyberterrorism and the Security of the National Drinking Water
- DEF CON 18 - Jon McCoy - Hacking .Net Applications: A Dynamic Attack
- DEF CON 18 - Jon Oberheide - Antique Exploitation (aka Terminator 3.1.1 for Workgroups)
- DEF CON 18 - Joseph McCray - You Spent All That Money and You Still Got Owned...
- DEF CON 18 - Josh Pyorre & Chris McKenney - Build Your Own Security Operations Center
- DEF CON 18 - Joshua Marpet - Facial Recognition: Facts, Fiction; and Fcsk-Ups!
- DEF CON 18 - Joshua Wise - From "No Way" to 0-day: Weaponizing the Unweaponizable
- DEF CON 18 - JP Dunning - Breaking Bluetooth by Being Bored
- DEF CON 18 - JP Dunning - Katana: Portable Multi-Boot Security Suite
- DEF CON 18 - Justin Morehouse & Tony Flick - Getting Social with the Smart Grid
- DEF CON 18 - Kenneth Geers - Live Fire Exercise: Baltic Cyber Shield 2010
- DEF CON 18 - Kevin Mahaffey & John Hering - App Attack
- DEF CON 18 - Lai, Appelbaum, and Oberheide - The Power of Chinese Security
- DEF CON 18 - Leigh Honeywell & follower - Physical Computing, Virtual Security
- DEF CON 18 - Lineberry, Richardson, and Wyatt - These Aren't the Permissions You're Looking For
- DEF CON 18 - Luiz "effffn" Eduardo - Your Boss is a Douchebag... How About You?
- DEF CON 18 - Mage2 - Electronic Weaponry or How to Rule the World While Shopping at Radio Shack
- DEF CON 18 - Marcia Hofmann - How To Get Your FBI File
- DEF CON 18 - Marco Bonetti - Mobile Privacy: Tor on the iPhone and Other Unusual Devices
- DEF CON 18 - Marisa Fagan - Be a Mentor!
- DEF CON 18 - Matias Madou & Jacob West - Repelling the Wily Insider
- DEF CON 18 - Matt Krick - DCFluX in: Moon-Bouncer
- DEF CON 18 - Matt Ryanczak - Implementing IPv6 at ARIN
- DEF CON 18 - Max Kelly - Perspectives in Cybersecurity and Cyberwarfare
- DEF CON 18 - Md Sohail Ahmad - WPA Too!
- DEF CON 18 - metr0 - Securing MMOs: A Security Professional's View from the Inside
- DEF CON 18 - Michael Brooks "The Rook" - masSEXploitation
- DEF CON 18 - Michael Schearer - SHODAN for Penetration Testers
- DEF CON 18 - Michael Weigand, Renderman & Mike Kershaw - Build your own UAV 2.0
- DEF CON 18 - Mike Metzger - Letting the Air Out of Tire Pressure Monitoring Systems
- DEF CON 18 - Mike "mckt" Bailey - Web Services We Just Don't Need
- DEF CON 18 - Monta Elkins - Hacking with Hardware - URFUKED
- DEF CON 18 - Moxie Marlinspike - Changing Threats To Privacy: From TIA to Google
- DEF CON 18 - Nathan Hamiel & Marcin Wielgoszewski - Constricting the Web
- DEF CON 18 - Nguyen Anh Quynh - Operating System Fingerprinting for Virtual Machines
- DEF CON 18 - Nicholas J. Percoco & Jibran Ilyas - Malware Freak Show 2: The Client-Side Boogaloo
- DEF CON 18 - Nicole Ozer & Kevin Bankston - Big Brother on the Big Screen: Fact/Fiction?
- DEF CON 18 - Oren Isacson & Alfredo Ortega - Exploiting Digital Cameras
- DEF CON 18 - Panel - ChaosVPN for Playing CTFs
- DEF CON 18 - Panel - DNS Systemic Vulnerabilities and Risk Management: A Discussion
- DEF CON 18 - Panel - Insecurity Engineering of Physical Security Systems: Locks, Lies, and Videotape
- DEF CON 18 - Panel - Meet the EFF
- DEF CON 18 - Panel - Meet the Feds - CSI:TCP/IP
- DEF CON 18 - Panel - Meet the Feds - Policy, Privacy, Deterrence and Cyber War
- DEF CON 18 - Panel - oCTF: 5 years in 50 minutes
- DEF CON 18 - Panel - Of Bytes and Bullets
- DEF CON 18 - Panel - Open Letter - Call to Action
- DEF CON 18 - Panel - The Law of Laptop Search and Seizure
- DEF CON 18 - Patrick Mullen & Ryan Pentney - Open Source Framework
- DEF CON 18 - Paul Haas - Advanced Format String Attacks
- DEF CON 18 - Percoco & Papathanasiou - This is Not the Droid You're Looking For...
- DEF CON 18 - Peter Eckersley & Jesse Burns - An Observatory for the SSLiverse
- DEF CON 18 - Peter Eckersley - How Unique Is Your Browser?
- DEF CON 18 - Pierce, Goldy, aSmig & sanitybit - WiMAX Hacking 2010
- DEF CON 18 - Rain & urbanmonkey - Build a Lie Detector/Beat a Lie Detector
- DEF CON 18 - Richard Thieme - Getting Root
- DEF CON 18 - Rich Smith - pyREtic - In-memory Reverse Engineering for Obfuscated Python Bytecode
- DEF CON 18 - Righter Kunkel - Air Traffic Control Insecurity 2.0
- DEF CON 18 - Riley Repko - Enough Cyber Talk Already!
- DEF CON 18 - Robert Edmonds & Paul Vixie - Passive DNS Hardening
- DEF CON 18 - Rob Ragan & Francis Brown - Lord of the Bing
- DEF CON 18 - Ryan Linn - Multiplayer Metasploit: Tag-Team Penetration and Information Gathering
- DEF CON 18 - Sam Bowne - Who Cares About IPv6?
- DEF CON 18 - Samy Kamkar - How I Met Your Girlfriend
- DEF CON 18 - Schuyler Towne & datagram - Attack the Key, Own the Lock
- DEF CON 18 - Scott Wolchok - Crawling BitTorrent DHTs for Fun
- DEF CON 18 - Shawn Merdinger - We Don't Need No Stinkin' Badges
- DEF CON 18 - Shawn Moyer & Nathan Keltner - Wardriving the Smart Grid
- DEF CON 18 - Sho Ho - FOE The Release of Feed Over Email
- DEF CON 18 - Sumit Siddharth - Hacking Oracle From Web Apps
- DEF CON 18 - The Suggmeister - Social Networking Special Ops
- DEF CON 18 - Tom Stracener "Strace", Sean Barnum & Chris Peterson - So Many Ways to Slap A Yo-Ho
- DEF CON 18 - Tottenkoph - VirGraff101: An Introduction to Virtual Graffiti
- DEF CON 18 - Tyler Krpata - Like a Boss: Attacking JBoss
- DEF CON 18 - Val Smith, Colin Ames & Anthony Lai - Balancing the Pwn Trade Deficit
- DEF CON 18 - Wade Polk, Paul Malkewicz & J. Novak - Industrial Cyber Security
- DEF CON 18 - Wayne Huang & Kuon Ding - NoSQL, No Injection !?
- DEF CON 18 - Wayne Huang - Drivesploit
- DEF CON 18 - Wayne Huang, Jeremy Chiu & Benson Wu - 0box Analyzer
- DEF CON 18 - Zoz - Pwned By The Owner: What Happens When You Steal A Hacker's Computer