• 1
  • 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans

    Ang Cui, Richard Housley, Jatin Kataria
    Fri, 15:00 - 15:45
    Track 3
  • A
  • Adventures In Smart Buttplug Penetration (testing)

    smea
    Sun, 10:00 - 10:45
    Track 2
  • A Hacker Guide To Deep-Learning Based Side Channel Attacks

    Elie Bursztein, Jean-Michel Picod
    Fri, 14:00 - 14:45
    Track 3
  • All the 4G modules Could be Hacked

    Zheng Huang, Xiao Hui Hui, Ye Zhang
    Fri, 11:00 - 11:45
    Track 3
  • Apache Solr Injection

    Michael Stepankin
    Sat, 16:30 - 16:50
    Track 4
  • API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web

    Joshua Maddux
    Fri, 12:00 - 12:45
    Track 4
  • Are Quantum Computers Really A Threat To Cryptography? A Practical Overview Of Current State-Of-The-Art Techniques With Some Interesting Surprises

    Andreas Baumhof
    Thu, 12:00 - 12:45
    Paris Theatre
  • Are Your Child's Records at Risk? The Current State of School Infosec

    Bill Demirkapi
    Fri, 14:00 - 14:45
    Track 2
  • B
  • Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers

    Sheila A. Berta
    Sun, 10:00 - 10:45
    Track 1
  • Behind the Scenes of the DEF CON 27 Badge

    Joe Grand
    Fri, 10:00 - 10:45
    Track 1
  • Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware

    Oliver Bilodeau, Masarah Paquet-Clouston
    Fri, 10:00 - 10:45
    Track 3
  • Breaking Google Home: Exploit It with SQLite(Magellan)

    YuXiang Li, Wenxiang Qian, HuiYu Wu
    Thu, 11:00 - 11:45
    Paris Theatre
  • Breaking The Back End! It Is Not Always A Bug. Sometimes, It Is Just Bad Design!

    Gregory Pickett
    Fri, 16:30 - 16:50
    Track 3
  • C
  • Can You Track Me Now? Why The Phone Companies Are Such A Privacy Disaster

    Senator Ron Wyden
    Fri, 16:30 - 16:50
    Track 2
  • Change the World, cDc Style: Cow tips from the first 35 years

    Joseph Menn, Omega, Christien Rioux, Deth Vegetable, Peiter Zatko
    Fri, 15:00 - 15:45
    Track 2
  • Cheating in eSports: How to Cheat at Virtual Cycling Using USB Hacks

    Brad Dixon
    Sun, 14:00 - 14:45
    Track 2
  • Closing Ceremonies

    Dark Tangent
    Sun, 16:00 - 18:00
    Paris Ballroom
  • Confessions of an Nespresso Money Mule: Free Stuff & Triangulation Fraud

    Nina Kollars
    Sat, 16:00 - 16:20
    Track 3
  • Contests Awards Ceremony

     
    Sun, 14:00 - 15:30
    Track 4
  • D
  • D0 N0 H4RM: A Healthcare Security Conversation

    Christian Dameff, Marie Moe, PhD, Jay Radcliffe, Billy Rios, Suzanne Schwartz, MD, Jeff Tully, MD
    Fri, 20:00 - 22:00
    Firesides Lounge
  • DEF CON 101 Panel

    Highwiz, Erin Jacobs, n00bz, Nikita, Shaggy, Tottenkoph, Will
    Thu, 15:00 - 16:45
    Paris Theatre
  • Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming

    Damien Cauquil
    Sat, 12:00 - 12:45
    Track 2
  • Don't Red-Team AI Like a Chump

    Ariel Herbert-Voss
    Fri, 11:00 - 11:45
    Track 1
  • Duplicating Restricted Mechanical Keys

    Bill Graydon, Robert Graydon
    Fri, 10:00 - 10:45
    Track 4
  • E
  • EDR Is Coming; Hide Yo Sh!t

    Michael Leibowitz, Topher Timzen
    Sat, 10:00 - 10:45
    Track 4
  • Evil eBPF In-Depth: Practical Abuses of an In-Kernel Bytecode Runtime

    Jeff Dileo
    Fri, 11:00 - 11:45
    Track 4
  • Exploiting Qualcomm WLAN and Modem Over The Air

    Xiling Gong, Peter Pi
    Sun, 11:00 - 11:45
    Track 3
  • Exploiting Windows Exploit Mitigation for ROP Exploits

    Omer Yair
    Thu, 10:00 - 10:45
    Paris Theatre
  • F
  • Firmware Slap: Automating Discovery of Exploitable Vulnerabilities in Firmware

    Christopher Roberts
    Sun, 14:00 - 14:45
    Track 1
  • G
  • Get off the Kernel if you can’t Drive

    Jesse Michael, Mickey Shkatov
    Sat, 15:00 - 15:45
    Track 1
  • Go NULL Yourself or: How I Learned to Start Worrying While Getting Fined for Other’s Auto Infractions

    droogie
    Sat, 16:30 - 16:50
    Track 3
  • GSM: We Can Hear Everyone Now!

    Eoin Buckley, James Kulikowski, Campbell Murray
    Sat, 13:00 - 13:45
    Track 2
  • H
  • Hacking Congress: The Enemy Of My Enemy Is My Friend

    Jen Ellis, Jane Harman, Rep. James Langevin (D-RI), Representative Ted Lieu, Cris Thomas
    Fri, 10:00 - 10:45
    Track 2
  • Hacking WebAssembly Games with Binary Instrumentation

    Jack Baker
    Sun, 10:00 - 10:45
    Track 3
  • Hacking Your Thoughts - Batman Forever meets Black Mirror

    Katherine Pratt
    Sat, 11:00 - 11:45
    Track 3
  • HackPac: Hacking Pointer Authentication in iOS User Space

    Xiaolong Bai, Min Zheng
    Fri, 13:00 - 13:45
    Track 1
  • HAKC THE POLICE

    Bill Swearingen
    Sat, 11:00 - 11:45
    Track 2
  • Harnessing Weapons of Mac Destruction

    Patrick Wardle
    Fri, 14:00 - 14:45
    Track 1
  • Help Me, Vulnerabilities. You're My Only Hope

    Jacob Baines
    Sun, 12:00 - 12:45
    Track 4
  • How You Can Buy AT&T, T-Mobile, and Sprint Real-Time Location Data on the Black Market

    Joseph Cox
    Sat, 12:00 - 12:45
    Track 1
  • HTTP Desync Attacks: Smashing into the Cell Next Door

    James Kettle
    Sun, 12:00 - 12:45
    Track 3
  • HVACking: Understand the Difference Between Security and Reality!

    Mark Bereza, Douglas McKee
    Fri, 13:00 - 13:45
    Track 2
  • I
  • I Know What You Did Last Summer: 3 Years of Wireless Monitoring at DEF CON

    Mike Spicer
    Fri, 16:00 - 16:20
    Track 2
  • I'm In Your Cloud... Pwning Your Azure Environement

    Dirk-jan Mollema
    Sun, 12:00 - 12:45
    Track 1
  • I'm on your phone, listening - Attacking VoIP Configuration Interfaces

    Stephan Huber, Philipp Roskosch
    Sat, 14:00 - 14:45
    Track 2
  • Infiltrating Corporate Intranet Like NSA ̶Pre-auth RCE on Leading SSL VPNs

    Meh Chang, Orange Tsai
    Fri, 12:00 - 12:45
    Track 3
  • Information Security in the Public Interest

    Bruce Schneier
    Sat, 10:00 - 10:45
    Track 3
  • Intro to Embedded Hacking—How you too can find a decade old bug in widely deployed devices. [REDACTED] Deskphones, a case study.

    Philippe Laulheret
    Thu, 13:00 - 13:45
    Paris Theatre
  • M
  • Malproxying: Leave Your Malware at Home

    Hila Cohen, Amit Waisel
    Sun, 12:00 - 12:45
    Track 2
  • Meet the EFF - Meetup Panel

    Shabid Buttar, Bennett Cyphers, Camille Fischer, Kurt Opsahl, Nathan Sheard
    Sat, 20:00 - 22:00
    Firesides Lounge
  • Meticulously Modern Mobile Manipulations

    Leon Jacobs
    Sat, 11:00 - 11:45
    Track 4
  • [
  • [ MI CASA-SU CASA ] My 192.168.1.1 is Your 192.168.1.1

    Elliott Thompson
    Sun, 13:00 - 13:45
    Track 1
  • M
  • More Keys Than A Piano: Finding Secrets In Publicly Exposed Ebs Volumes

    Ben Morris
    Fri, 13:00 - 13:45
    Track 4
  • MOSE: Using Configuration Management for Evil

    Jayson Grace
    Fri, 15:00 - 15:45
    Track 1
  • .
  • .NET Malware Threats: Internals And Reversing

    Alexandre Borges
    Sat, 15:00 - 15:45
    Track 4
  • N
  • Next Generation Process Emulation with Binee

    Kyle Gwinnup, John Holowczak
    Sat, 14:00 - 14:45
    Track 4
  • NOC NOC. Who's there? All. All who? All the things you wanted to know about the DEF CON NOC and we won't tell you about

     
    Sat, 16:00 - 17:45
    Track 2
  • No Mas – How One Side-Channel Flaw Opens Atm, Pharmacies and Government Secrets Up to Attack

    Mike Davis
    Fri, 13:00 - 13:45
    Track 3
  • O
  • Owning The Cloud Through Server-Side Request Forgery

    Cody Brocious, Ben Sadeghipour
    Sun, 13:00 - 13:45
    Track 3
  • P
  • Panel: DEF CON Groups

    Casey Bourbonnais, Darington, Tim Roberts, s0ups, Jayson E. Street, Brent White, April C. Wright
    Fri, 22:15 - 23:00
    Firesides Lounge
  • Phreaking Elevators

    WillC
    Fri, 12:00 - 12:45
    Track 2
  • Please Inject Me, a x64 Code Injection

    Alon Weinberg
    Fri, 16:00 - 16:20
    Track 1
  • Poking the S in SD cards

    Nicolas Oberli
    Fri, 16:30 - 16:50
    Track 1
  • Practical Key Search Attacks Against Modern Symmetric Ciphers

    Dan Crowley, Daniel Pagan
    Fri, 14:00 - 14:45
    Track 4
  • Process Injection Techniques - Gotta Catch Them All

    Amit Klein, Itzik Kotler
    Fri, 12:00 - 12:45
    Track 1
  • R
  • RACE - Minimal Rights and ACE for Active Directory Dominance

    Nikhil Mittal
    Sat, 13:00 - 13:45
    Track 1
  • Relaying Credentials Has Never Been Easier: How to Easily Bypass the Latest NTLM Relay Mitigations

    Marina Simakov, Yaron Zinar
    Fri, 15:00 - 15:45
    Track 4
  • Reverse Engineering 17+ Cars in Less Than 10 Minutes

    Brent Stone
    Sat, 16:00 - 16:20
    Track 1
  • Reverse-Engineering 4g Hotspots for Fun, Bugs and Net Financial Loss

    g richter
    Sat, 15:00 - 15:45
    Track 2
  • Re: What's up Johnny? – Covert Content Attacks on Email End-to-End Encryption

    Jens Müller
    Fri, 16:30 - 16:50
    Track 4
  • Rise of the Hypebots: Scripting Streetwear

    finalphoenix
    Sat, 10:00 - 10:45
    Track 2
  • S
  • Say Cheese - How I Ransomwared Your DSLR Camera

    Eyal Itkin
    Sun, 11:00 - 11:45
    Track 4
  • SDR Against Smart TVs: URL and Channel Injection Attacks

    Pedro Cabrera Camara
    Sun, 11:00 - 11:45
    Track 2
  • SELECT code_execution FROM * USING SQLite;—Gaining code execution using a malicious SQLite database

    Omer Gull
    Sat, 14:00 - 14:45
    Track 1
  • Sound Effects: Exploring Acoustic Cyber-weapons

    Matt Wixey
    Sun, 13:00 - 13:45
    Track 2
  • SSO Wars: The Token Menace

    Oleksandr Mirosh, Alvaro Muñoz
    Sat, 13:00 - 13:45
    Track 4
  • State of DNS Rebinding - Attack & Prevention Techniques and the Singularity of Origin

    Gerald Doussot, Roger Meyer
    Sat, 15:00 - 15:45
    Track 3
  • Surveillance Detection Scout - Your Lookout on Autopilot

    Truman Kain
    Fri, 16:00 - 16:20
    Track 3
  • T
  • Tag-side attacks against NFC

    Christopher Wade
    Sat, 13:00 - 13:45
    Track 3
  • The ABC of Next-Gen Shellcoding

    Hadrien Barral, Rémi Géraud-Stewart, Georges-Axel Jaloyan
    Sun, 11:00 - 11:45
    Track 1
  • The Ether Wars: Exploits, counter-exploits and honeypots on Ethereum

    Daniel Luca, Bernhard Mueller
    Sun, 14:00 - 14:45
    Track 3
  • The JOP ROCKET: A Supremely Wicked Tool for JOP Gadget Discovery, or What to Do If ROP Is Too Easy

    Dr. Bramwell Brizendine, Dr. Joshua Stroschien
    Fri, 16:00 - 16:20
    Track 4
  • The Tor Censorship Arms Race: The Next Chapter

    Roger Dingledine
    Fri, 11:00 - 11:45
    Track 2
  • U
  • Unpacking Pkgs: A Look Inside Macos Installer Packages And Common Security Flaws

    Andy Grant
    Sat, 16:30 - 16:50
    Track 1
  • V
  • Vacuum Cleaning Security—Pinky and the Brain Edition

    jiska, Fabian Ullrich
    Sat, 16:00 - 16:20
    Track 4
  • W
  • Want Strong Isolation? Just Reset Your Processor

    Anish Athalye
    Sun, 13:00 - 13:45
    Track 4
  • Weaponizing Hypervisors to Fight and Beat Car and Medical Devices Attacks

    Ali Islam, Daniel Regalado
    Sat, 10:00 - 10:45
    Track 1
  • Web2Own: Attacking Desktop Apps From Web Security's Perspective

    Ce Qin, Jianing Wang, Junyu Zhou
    Thu, 14:00 - 14:45
    Paris Theatre
  • We Hacked Twitter… And the World Lost Their Sh*t Over It!

    Matthew Carr, Mike Godfrey
    Sat, 22:15 - 23:00
    Firesides Lounge
  • Why You Should Fear Your “mundane” Office Equipment

    Mario Rivas, Daniel Romero
    Sat, 12:00 - 12:45
    Track 3
  • Y
  • Your Car is My Car

    Jmaxxz
    Sat, 11:00 - 11:45
    Track 1
  • Your Secret Files Are Mine: Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors

    Huiming Liu, Xiangqian Zhang
    Sun, 10:00 - 10:45
    Track 4
  • Z
  • Zero bugs found? Hold my Beer AFL! How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets

    Maksim Shudrak
    Sat, 14:00 - 14:45
    Track 3
  • Zombie Ant Farm: Practical Tips for Playing Hide and Seek with Linux EDRs

    Dimitry Snezhkov
    Sat, 12:00 - 12:45
    Track 4