- Shmoocon 2013 0wn The Con
- Shmoocon 2013 - Apple iOS Certificate Tomfoolery
- Shmoocon 2013 - Armoring Your Android Apps
- Shmoocon 2013 - Attacking SCADA Wireless Systems
- Shmoocon 2013 - Beyond Nymwars - Online Identity Battle
- Shmoocon 2013 - Bright Shiny Things Intelligent DA Control
- Shmoocon 2013 - C10M Defending The Internet At Scale
- Shmoocon 2013 - Chopshop Busting the Gh0st
- Shmoocon 2013 - Crypto - You're Doing It Wrong
- Shmoocon 2013 - DIY Using Trust to Secure Embedded Projects
- Shmoocon 2013 - Forensics - ExFat Bastardized for Cameras
- Shmoocon 2013 - Friday Fire Talks
- Shmoocon 2013 - From Shotgun Parsers to Better Software Stacks
- Shmoocon 2013 - Generalized Single Packet Auth for Cloud Envions
- Shmoocon 2013 - Hackers get Schooled Learning Lessons from Academia
- Shmoocon 2013 - Hacking as an Act of War
- Shmoocon 2013 - Hide and Seek, Post-Exploitation Style
- Shmoocon 2013 - How Smart Is BlueTooth Smart
- Shmoocon 2013 - How to Own a Building BacNET Attack Framework
- Shmoocon 2013 - Identity Based Internet Protocol
- Shmoocon 2013 - Is Practical Info Sharing Possible
- Shmoocon 2013 - Ka-Ching - How to Make Real Money
- Shmoocon 2013 - Mainframed The Secrets Inside that Black Box
- Shmoocon 2013 - Malware Analysis Collaboration Automation & Training
- Shmoocon 2013 - MASTIFF - Automated Static Analysis Framework
- Shmoocon 2013 - Moloch A New And Free Way To Index Your Packet Capture Repository-1
- Shmoocon 2013 - NSM and more with Bro Network Monitor
- Shmoocon 2013 - Opening Remarks & Rants
- Shmoocon 2013 - OpenStack Security Brief
- Shmoocon 2013 - Page Fault Liberation Army or Better Security Through Trapping
- Shmoocon 2013 - Paparazzi Over IP
- Shmoocon 2013 - Protecting Sensitive Information on iOS Devices
- Shmoocon 2013 - PunkSPIDER Open Source Fuzzing Proj Tgting the Internet
- Shmoocon 2013 - Running a CTF - Panel on the Art of Hacker Gaming
- Shmoocon 2013 - Strategies of a World Class Security Inciden
- Shmoocon 2013 - The Cloud - Storms on the Horizon
- Shmoocon 2013 - The Computer Fraud and Abuse Act Swartz, Auernheimer, and Beyond
- Shmoocon 2013 - These Go To Eleven - When the Law Goes Too Far
- Shmoocon 2013 - WIPE THE DRIVE - Techniques for Malware Persistence