• 10:00
  • Behind the Scenes of the DEF CON 27 Badge

    Joe Grand
    Fri, 10:00 - 10:45
    Track 1
  • Hacking Congress: The Enemy Of My Enemy Is My Friend

    Jen Ellis, Jane Harman, Rep. James Langevin (D-RI), Representative Ted Lieu, Cris Thomas
    Fri, 10:00 - 10:45
    Track 2
  • Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware

    Oliver Bilodeau, Masarah Paquet-Clouston
    Fri, 10:00 - 10:45
    Track 3
  • Duplicating Restricted Mechanical Keys

    Bill Graydon, Robert Graydon
    Fri, 10:00 - 10:45
    Track 4
  • 11:00
  • Don't Red-Team AI Like a Chump

    Ariel Herbert-Voss
    Fri, 11:00 - 11:45
    Track 1
  • The Tor Censorship Arms Race: The Next Chapter

    Roger Dingledine
    Fri, 11:00 - 11:45
    Track 2
  • All the 4G modules Could be Hacked

    Zheng Huang, Xiao Hui Hui, Ye Zhang
    Fri, 11:00 - 11:45
    Track 3
  • Evil eBPF In-Depth: Practical Abuses of an In-Kernel Bytecode Runtime

    Jeff Dileo
    Fri, 11:00 - 11:45
    Track 4
  • 12:00
  • Process Injection Techniques - Gotta Catch Them All

    Amit Klein, Itzik Kotler
    Fri, 12:00 - 12:45
    Track 1
  • Phreaking Elevators

    WillC
    Fri, 12:00 - 12:45
    Track 2
  • Infiltrating Corporate Intranet Like NSA ̶Pre-auth RCE on Leading SSL VPNs

    Meh Chang, Orange Tsai
    Fri, 12:00 - 12:45
    Track 3
  • API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web

    Joshua Maddux
    Fri, 12:00 - 12:45
    Track 4
  • 13:00
  • HackPac: Hacking Pointer Authentication in iOS User Space

    Xiaolong Bai, Min Zheng
    Fri, 13:00 - 13:45
    Track 1
  • HVACking: Understand the Difference Between Security and Reality!

    Mark Bereza, Douglas McKee
    Fri, 13:00 - 13:45
    Track 2
  • No Mas – How One Side-Channel Flaw Opens Atm, Pharmacies and Government Secrets Up to Attack

    Mike Davis
    Fri, 13:00 - 13:45
    Track 3
  • More Keys Than A Piano: Finding Secrets In Publicly Exposed Ebs Volumes

    Ben Morris
    Fri, 13:00 - 13:45
    Track 4
  • 14:00
  • Harnessing Weapons of Mac Destruction

    Patrick Wardle
    Fri, 14:00 - 14:45
    Track 1
  • Are Your Child's Records at Risk? The Current State of School Infosec

    Bill Demirkapi
    Fri, 14:00 - 14:45
    Track 2
  • A Hacker Guide To Deep-Learning Based Side Channel Attacks

    Elie Bursztein, Jean-Michel Picod
    Fri, 14:00 - 14:45
    Track 3
  • Practical Key Search Attacks Against Modern Symmetric Ciphers

    Dan Crowley, Daniel Pagan
    Fri, 14:00 - 14:45
    Track 4
  • 15:00
  • MOSE: Using Configuration Management for Evil

    Jayson Grace
    Fri, 15:00 - 15:45
    Track 1
  • Change the World, cDc Style: Cow tips from the first 35 years

    Joseph Menn, Omega, Christien Rioux, Deth Vegetable, Peiter Zatko
    Fri, 15:00 - 15:45
    Track 2
  • 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans

    Ang Cui, Richard Housley, Jatin Kataria
    Fri, 15:00 - 15:45
    Track 3
  • Relaying Credentials Has Never Been Easier: How to Easily Bypass the Latest NTLM Relay Mitigations

    Marina Simakov, Yaron Zinar
    Fri, 15:00 - 15:45
    Track 4
  • 16:00
  • Please Inject Me, a x64 Code Injection

    Alon Weinberg
    Fri, 16:00 - 16:20
    Track 1
  • I Know What You Did Last Summer: 3 Years of Wireless Monitoring at DEF CON

    Mike Spicer
    Fri, 16:00 - 16:20
    Track 2
  • Surveillance Detection Scout - Your Lookout on Autopilot

    Truman Kain
    Fri, 16:00 - 16:20
    Track 3
  • The JOP ROCKET: A Supremely Wicked Tool for JOP Gadget Discovery, or What to Do If ROP Is Too Easy

    Dr. Bramwell Brizendine, Dr. Joshua Stroschien
    Fri, 16:00 - 16:20
    Track 4
  • 16:30
  • Poking the S in SD cards

    Nicolas Oberli
    Fri, 16:30 - 16:50
    Track 1
  • Can You Track Me Now? Why The Phone Companies Are Such A Privacy Disaster

    Senator Ron Wyden
    Fri, 16:30 - 16:50
    Track 2
  • Breaking The Back End! It Is Not Always A Bug. Sometimes, It Is Just Bad Design!

    Gregory Pickett
    Fri, 16:30 - 16:50
    Track 3
  • Re: What's up Johnny? – Covert Content Attacks on Email End-to-End Encryption

    Jens Müller
    Fri, 16:30 - 16:50
    Track 4
  • 20:00
  • D0 N0 H4RM: A Healthcare Security Conversation

    Christian Dameff, Marie Moe, PhD, Jay Radcliffe, Billy Rios, Suzanne Schwartz, MD, Jeff Tully, MD
    Fri, 20:00 - 22:00
    Firesides Lounge
  • 22:15
  • Panel: DEF CON Groups

    Casey Bourbonnais, Darington, Tim Roberts, s0ups, Jayson E. Street, Brent White, April C. Wright
    Fri, 22:15 - 23:00
    Firesides Lounge