- DEF CON 20 - Adam "EvilPacket" Baldwin - Blind XSS
- DEF CON 20 - Aditya K. Sood and Richard J. Enbody - Botnets Die Hard
- DEF CON 20 - Alberto Garcia Illera - How to Hack All the Transport Networks of a Country
- DEF CON 20 - Alexander Minozhenko - How to Hack VMware vCenter Server in 60 Seconds
- DEF CON 20 - Amber Lyon and Panel - Anonymous and the Online Fight for Justice
- DEF CON 20 - Anch and Omega - The Darknet of Things, Building Sensor Networks That Do Your Bidding
- DEF CON 20 - Andrew King - Detecting Reflective Injection
- DEF CON 20 - Ang Cui - Embedded Device Firmware Vulnerability Hunting Using FRAK
- DEF CON 20 - atlas - ghz or bust
- DEF CON 20 - Bankston Blaze and Granick - Should the Wall of Sheep Be Illegal
- DEF CON 20 - Ben Toews and Scott Behrens - Rapid Blind SQL Injection Exploitation with BBQSQL
- DEF CON 20 - Bitweasil - Cryptohaze Cloud Cracking
- DEF CON 20 - Bob Pan - APK File Infection on an Android System
- DEF CON 20 - Branco, Oakley and Bratus - Overwriting the Exception Handling Cache
- DEF CON 20 - Bruce Schneier - Answers Your Questions
- DEF CON 20 - Charlie Miller - Don't Stand So Close To Me: An Analysis of the NFC Attack Surface
- DEF CON 20 - Chema Alonso and Manu "The Sur"- Owning Bad Guys {And Mafia} With Javascript Botnets
- DEF CON 20 - Chris Anderson - Drones!
- DEF CON 20 - Chris Conley - Bad (and Sometimes Good) Tech Policy: It's Not Just a DC Thing
- DEF CON 20 - Chris "TheSuggmeister" Sumner and Randall Wald - Can Twitter Expose Psychopath Killers?
- DEF CON 20 - Chris Tarnovsky - Attacking TPM Part 2 A Look at the ST19WP18 TPM Device
- DEF CON 20 - Christopher Soghoian - Can you track me now?
- DEF CON 20 - Conti, Shay and Hartzog - Life Inside a Skinner Box
- DEF CON 20 - Conti, Shay and Hartzog - Life Inside a Skinner Box
- DEF CON 20 - Cory Docotorow - Beyond the War on General Purpose Computing Whats Inside the Box
- DEF CON 20 - Cutaway - Looking Into The Eye Of The Meter
- DEF CON 20 - Dan Griffin - Hacking Measured Boot and UEFI
- DEF CON 20 - Dan Kaminsky - Black Ops
- DEF CON 20 - Dan Zulla - Improving Web Vulnerability Scanning
- DEF CON 20 - Darkred - Not-So-Limited Warranty: Target Attacks on Warranties for Fun and Profit
- DEF CON 20 - Dave Brown - DIY Electric Car
- DEF CON 20 - David "thelightcosine" Maloney - Weaponizing the Windows API
- DEF CON 20 - Dead Addict and Gail Thackeray - Before, During, and After
- DEF CON 20 - Dustin Hoffman and Semon Rezchikov - Busting the BARR
- DEF CON 20 - Eddie Lee - NFC Hacking: The Easy Way
- DEF CON 20 - egypt - Post Metasploitation Improving Accuracy and Efficiency
- DEF CON 20 - Elie Bursztein and Patrick Samy - Fuzzing Online Games
- DEF CON 20 - esden and Panel - The Paparazzi Platform
- DEF CON 20 - Etemadieh and Panel: Hacking the Google TV
- DEF CON 20 - Fergus Noble and Colin Beighley - Making Sense of Static - New Tools for Hacking GPS
- DEF CON 20 - Francis Brown and Rob Ragan - Tenacious Diggity Skinny Dippin in a Sea of Bing
- DEF CON 20 - FX and Greg - Hacking [Redacted] Routers
- DEF CON 20 - General Keith B. Alexander - Shared Values, Shared Responsibility
- DEF CON 20 - Jaffer Binney Bamford and Abdo - Bigger Monster Weaker Chains
- DEF CON 20 - James Kirk - An Inside Look Into Defense Industrial Base Technical Security Controls
- DEF CON 20 - Jason A. Novak and Andrea (Drea) London - SQL ReInjector
- DEF CON 20 - Jason Ostrom, Karl Feinauer, William Borskey - The End of the PSTN As You Know It
- DEF CON 20 - Jayson E. Street - How to Channel Your Inner Henry Rollins
- DEF CON 20 - Jeff Bryner - KinectasploitV2: Kinect Meets 20 Security Tools
- DEF CON 20 - Jim Christy and Panel - Meet the Feds 1: Law Enforcement
- DEF CON 20 - Jim Christy and Panel Meet the Feds 2: Policy R&D
- DEF CON 20 - Jim Rennie, Jennifer Granick - MegaUpload: Guilty or Not Guilty
- DEF CON 20 - Joe Grand and Zoz More Projects of Prototype This!
- DEF CON 20 - John Floren - Hellaphone: Replacing the Java in Android
- DEF CON 20 - Jonathan Brossard - Hardware Backdooring is Practical
- DEF CON 20 - Josh Brashars - Exploit Archaeology: Raiders of the Lost Payphones
- DEF CON 20 - Josh "m0nk" Thomas and Jeff "stoker" Robble - Off-Grid Communications with Android
- DEF CON 20 - Katy Levinson - Robots You're Doing It Wrong 2
- DEF CON 20 - Kenneth Geers - The Art of Cyberwar
- DEF CON 20 - Kevin Poulsen - Answers Your Questions
- DEF CON 20 - Linda C Butler - The Open Cyber Challenge Platform
- DEF CON 20 - LosT - Making the DEF CON 20 Badge
- DEF CON 20 - Marc Weber Tobias, Matt Fiddler, and Tobias Bluzmanis - Safes and Containers
- DEF CON 20 - Mark Weatherford - The Christopher Columbus Rule and DHS
- DEF CON 20 - Marlinspike Hulton and Ray - Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2
- DEF CON 20 - Martin Gallo - Uncovering SAP Vulnerabilities: Reversing and Breaking the Diag Protocol
- DEF CON 20 - Matthew Duggan - Not So Super Notes
- DEF CON 20 - Matthew Toussain and Christopher Shields - Subterfuge
- DEF CON 20 - Michael Coppola - Owning the Network: Adventures in Router Rootkits
- DEF CON 20 - Michael Perklin - Anti-Forensics and Anti-Anti-Forensics
- DEF CON 20 - Michael Robinson and Chris Taylor - Spy vs Spy: Spying on Mobile Device Spyware
- DEF CON 20 - Mickey Shkatov and Toby Kohlenberg - We Have You by the Gadgets
- DEF CON 20 - Nadeem Douba - Sploitego - Maltego's (Local) Partner in Crime
- DEF CON 20 - Nick Galbreath - New Techniques in SQLi Obfuscation
- DEF CON 20 - Panel: Corman - World War 3.0: Chaos, Control & the Battle
- DEF CON 20 - Panel - DEF CON Comedy Jam V, V for Vendetta
- DEF CON 20 - Panel: DT Jericho and Russ Rogers - DC RECOGNIZE Awards
- DEF CON 20 - Panel - Meet the EFF
- DEF CON 20 - Panel - The Making of DEF CON 20
- DEF CON 20 - Paul Vixie and Andrew Fried - The DCWG Debriefing
- DEF CON 20 - Paul Wilson - The Art of the Con
- DEF CON 20 - Peter Hannay - Exchanging Demands
- DEF CON 20 - Phil Polstra - Bypassing Endpoint Security for $20 or Less
- DEF CON 20 - Priest - QA with the Men (and Women) in Black
- DEF CON 20 - Raphael Mudge - Cortana: Rise of the Automated Red Team
- DEF CON 20 - Rebecca "bx" Shapiro and Sergey Bratus - Programming Weird Machines with ELF Metadata
- DEF CON 20 - RenderMan - Hacker + Airplanes = No Good Can Come Of This
- DEF CON 20 - Richard Thieme - Twenty Years Back Twenty Years Ahead
- DEF CON 20 - Robert Deaton - DivaShark - Monitor your Flow
- DEF CON 20 - Robert Portvliet and Brad Antoniewicz - The Safety Dance
- DEF CON 20 - Ryan Holeman - Passive Bluetooth Monitoring in Scapy
- DEF CON 20 - Ryan Reynolds and Jonathan Claudius - Stamp Out Hash Corruption! Crack All The Things!
- DEF CON 20 - Sandy Clark and Matt Blaze - SIGINT and Traffic Analysis for the Rest of Us
- DEF CON 20 - Sergio 'flacman' Valderrama and Carlos Alberto Rodriguez - Scylla
- DEF CON 20 - Shawn Henry - Changing the Security Paradigm
- DEF CON 20 - Svetlana Gaivoronski and Dennis Gamayunov - Demorpheus
- DEF CON 20 - Thomas Cannon - Into the Droid: Gaining Access to Android User Data
- DEF CON 20 - Thor - Socialized Data Using Social Media as a Cyber Mule
- DEF CON 20 - Tim Maletic and Christopher Pogue - OPFOR 4Ever
- DEF CON 20 - Tom Perrine - Creating an A1 Security Kernel in the 1980s