- DEF CON 13 - Alexey Smirnov & Tzi-cker Chiueh, DIRA: Automatic Detection
- DEF CON 13 - Alex Stamos & Scott Stender, Attacking Web Services
- DEF CON 13 - Ben Kurtz, A Linguistic Platform for Threat Development
- DEF CON 13 - Broward Horne, Meme Mining for Fun and Profit
- DEF CON 13 - Christian Grothoff, Lost In Translation
- DEF CON 13 - Chuck Willis, Trends in Licensing of Security Tools
- DEF CON 13 - CISO Q&A with Dark Tangent
- DEF CON 13 - Daniel Burroughs, Auto-adapting Stealth Communication Channels
- DEF CON 13 - Daniel Burroughs, Development of An Undergraduate Security Program
- DEF CON 13 - Dan Kaminsky, Black Ops of TCP 2005
- DEF CON 13 - David Cowan - The Information Security Industry: $3 Billion of Snake Oil
- DEF CON 13 - David Hulton, The Next Generation of Cryptanalytic Hardware
- DEF CON 13 - Dean Pierce, Brandon Edwards & Anthony Lineberry, Bypassing Authenticated Wireless
- DEF CON 13 - Defcon Panel Discussion of regional DC Groups
- DEF CON 13 - Deral Heiland, The Insecure Workstation II "Bob Reloaded"
- DEF CON 13 - Deviant Ollam, Introduction to Lockpicking and Physical Security
- DEF CON 13 - Elizabeth Stark & Fred Benenson, The Revolution Will Not Be Copyrighted
- DEF CON 13 - Elizabeth Stark and Fred Benenson - The Revolution Will Not Be Copyrighted
- DEF CON 13 - Fyodor, Hacking Nmap
- DEF CON 13 - Greg Conti, Countering Denial of Information Attacks
- DEF CON 13 - Ian Clarke & Oskar Sandberg, Routing in the Dark
- DEF CON 13 - Jason Scott, Why Tech Documentaries are Impossible
- DEF CON 13 - Jay Beale, Introducing the Bastille Hardening Assessment Tool
- DEF CON 13 - Jennifer Granick, Top Ten Legal Issues in Computer Security
- DEF CON 13 - Jim Christy and various other Feds, Meet the Fed
- DEF CON 13 - Jim "FalconRed" Rennie, Licensing Agreements 101: The Creative Commons License
- DEF CON 13 - jives, Passive Host Auditing
- DEF CON 13 - Johnny Long, Death of a Thousand cuts - Forensics
- DEF CON 13 - Johnny Long, Google Hacking for Penetration Testers
- DEF CON 13 - Jonathan Levin, The Dark side of Winsock
- DEF CON 13 - Julian Grizzard, Surgical Recovery from Kernel-Level Rootkit Installations
- DEF CON 13 - Kenneth Geers, Hacking in a Foreign Language: A Network Security Guide to Russia
- DEF CON 13 - Kevin McCarthy, The Six Year Old Hacker: No More Script Kiddies
- DEF CON 13 - Keynote: Dr. Linton Wells
- DEF CON 13 - Kristofer Erickson, The Power to Map: How Cyberspace Is Imagined Through Cartography
- DEF CON 13 - Leonard Gallion, A Safecracking Double Feature: Dial "B" For BackDialing
- DEF CON 13 - Major Malfunction, Old Skewl Hacking - InfraRed
- DEF CON 13 - Marc Weber Tobias & Matt Fiddler, Physical Security Bypass Techniques
- DEF CON 13 - Marshall Beddoe, Reverse Engineering Network Protocols using Bioinformatics
- DEF CON 13 - Matthew L. Shuchman ("Pilgrim") , Building WarDriving Hardware Workshop
- DEF CON 13 - Metalstorm, Trust Transience: Post Intrusion SSH Hijacking
- DEF CON 13 - Mystic, Hacking the Mind (Influence and NLP)
- DEF CON 13 - NMRC Collective,The NMRC Warez 2005 Extravaganza
- DEF CON 13 - Ofir Arkin, A New Hybrid Approach for Infrastructure Discovery, Monitoring and Control
- DEF CON 13 - Ofir Arkin, On the Current State of Remote Active OS Fingerprinting
- DEF CON 13 - Panel - Legal and Ethical Aspects of Wardriving
- DEF CON 13 - Patty L. Walsh, Muckraker, Hackers and the Media
- DEF CON 13 - Paul Graham, Inequality and Risk
- DEF CON 13 - Paul Vixie & Gadi Evron, Internet Survivability, Threats and Efforts
- DEF CON 13 - Paul Vixie, The Internets March of Folly
- DEF CON 13 - Philip R. Zimmermann, The Unveiling of My Next Big Project: ZPhone
- DEF CON 13 - Raffael Marty, Visual Security Event Analysis
- DEF CON 13 - Raven, Pen-testing the Backbone
- DEF CON 13 - Robert E. Lee & Jack C. Louis: Introducing Unicornscan - Riding the Unicorn
- DEF CON 13 - Robert Morris, ATM Network Vulnerabilities
- DEF CON 13 - Roberto Preatoni & Fabio Ghioni, Assymetric Digital Warfare
- DEF CON 13 - Robert "hack ajar" Imhoff-Dousharm,Credit Cards
- DEF CON 13 - RS, Forensic Data Acquisition Tools
- DEF CON 13 - Sam Thingpen - From Cyberspace to Hyperspace
- DEF CON 13 - Sensepost, Automation - Deus ex Machina or Rube Goldberg Machine?
- DEF CON 13 - Sherri Sparks & Jamie Butler, "Shadow Walker" - Raising The Bar For Rootkit Detection
- DEF CON 13 - StankDawg, Hacking Google AdWords
- DEF CON 13 - Steve Dunker Esq, The Hacker's Guide to Search and Arrest
- DEF CON 13 - Strom Carlson & Black Ratchet, Be Your Own Telephone Company... With Asterisk
- DEF CON 13 - The Dark Tangent, Award Ceremonies
- DEF CON 13 - The Hacker Foundation, Doing Not-For-Profit Tech: The Hacker Foundation Year in Review
- DEF CON 13 - Thomas J. Holt, No Women Allowed? Exploring Gender Differences In Hacking
- DEF CON 13 - Tony Howlett, GeoIP Blocking, A Controversial But (Sometimes) Effective Approach
- DEF CON 13 - Wes Brown & Scott Dunlop, Mosquito - Secure Remote Code Execution Framework
- DEF CON 13 - Wesley Tanner and Nick Lane-Smith: End-to-End Voice Encryption over GSM