• Amazon A, far end of back hall

  • Thursday, August 1
  • DEF CON 101

    HighWiz, Lockheed, LosT, Pyr0, Roamer
    Thu, 10:00 - 11:50
    Track 2 - Track 2
  • Hacking Management: From Operations to Command

    Lockheed, Naifx, Roamer
    Thu, 12:00 - 12:50
    Track 2 - Track 2
  • The Ninjaneers: Getting started in Building Your Own Robots for World Domination.

    Beaker, Flipper
    Thu, 13:00 - 13:50
    Track 2 - Track 2
  • Decrypting DEFCON: Foundations Behind Some of the Games Hackers Play

    LosT
    Thu, 14:00 - 14:50
    Track 2 - Track 2
  • Intro to Web Application Hacking

    Terrence Gareau
    Thu, 15:00 - 15:50
    Track 2 - Track 2
  • Friday, August 2
  • I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell

    Doug DePerry, Tom Ritter
    Fri, 10:00 - 10:45
    Track 2 - Track 2
  • The Secret Life of SIM Cards

    Eric Butler, Karl Koscher
    Fri, 11:00 - 11:45
    Track 2 - Track 2
  • DragonLady: An Investigation of SMS Fraud Operations in Russia

    Ryan Smith, Tim Strazzere
    Fri, 12:00 - 12:45
    Track 2 - Track 2
  • Offensive Forensics: CSI for the Bad Guy

    Benjamin Caudill
    Fri, 13:00 - 13:20
    Track 2 - Track 2
  • Pwn'ing You(r) Cyber Offenders

    Piotr Duszynski
    Fri, 13:30 - 13:50
    Track 2 - Track 2
  • MITM All The IPv6 Things

    Brent Bandelgar, Scott Behrens
    Fri, 14:00 - 14:20
    Track 2 - Track 2
  • HTTP Time Bandit

    Tigran Gevorgyan, Vaagn Toukharian
    Fri, 14:30 - 14:50
    Track 2 - Track 2
  • How to use CSP to stop XSS

    Kenneth Lee
    Fri, 15:00 - 15:20
    Track 2 - Track 2
  • So You Think Your Domain Controller is Secure?

    Justin Hendricks
    Fri, 15:30 - 15:50
    Track 2 - Track 2
  • Getting The Goods With smbexec

    Eric Milam
    Fri, 16:00 - 16:20
    Track 2 - Track 2
  • Abusing NoSQL Databases

    Ming
    Fri, 16:30 - 16:50
    Track 2 - Track 2
  • Examining the Bitsquatting Attack Surface

    Jaeson Schultz
    Fri, 17:00 - 17:20
    Track 2 - Track 2
  • Please Insert^W Inject More Coins

    Nicolas Oberli
    Fri, 17:30 - 17:50
    Track 2 - Track 2
  • Saturday, August 3
  • Do-It-Yourself Cellular IDS

    Sherri Davidoff, Scott Fretheim, David Harrison, Randi Price
    Sat, 10:00 - 11:45
    Track 2 - Track 2
  • BoutiqueKit: Playing WarGames with expensive rootkits and malware

    Josh Thomas
    Sat, 12:00 - 12:45
    Track 2 - Track 2
  • Android WebLogin: Google's Skeleton Key

    Craig Young
    Sat, 13:00 - 13:20
    Track 2 - Track 2
  • Building an Android IDS on Network Level

    Jaime Sanchez
    Sat, 13:30 - 13:50
    Track 2 - Track 2
  • Defeating SEAndroid

    Pau Oliva
    Sat, 14:00 - 14:20
    Track 2 - Track 2
  • Doing Bad Things to 'Good' Security Appliances

    Rob Bathurst, Mark Carey
    Sat, 14:30 - 15:20
    Track 2 - Track 2
  • How to Hack Your Mini Cooper: Reverse Engineering Controller Area Network (CAN) Messages on Passenger Automobiles

    Jason Staggs
    Sat, 15:30 - 15:50
    Track 2 - Track 2
  • Electromechanical PIN Cracking with Robotic Reconfigurable Button Basher (and C3BO)

    Justin Engler, Paul Vines
    Sat, 16:00 - 16:20
    Track 2 - Track 2
  • Data Evaporation from SSDs

    Sam Bowne
    Sat, 16:30 - 16:50
    Track 2 - Track 2
  • GoPro or GTFO: A Tale of Reversing an Embedded System

    Zach Lanier, Todd Manning
    Sat, 17:00 - 17:20
    Track 2 - Track 2
  • JTAGulator: Assisted Discovery Of On-Chip Debug Interfaces

    Joe Grand
    Sat, 17:30 - 17:50
    Track 2 - Track 2
  • Reality Hackers

    Rebecca Wexler
    Sat, 20:00 - 21:00
    Track 2 - Track 2
  • Sunday, August 4
  • gitDigger: Creating useful wordlists from public GitHub repositories

    Jaime Filson, Rob Fuller
    Sun, 10:00 - 10:20
    Track 2 - Track 2
  • Made Open: Hacking Capitalism

    Todd Bonnewell
    Sun, 10:30 - 11:20
    Track 2 - Track 2
  • The dawn of Web 3.0: website mapping and vulnerability scanning in 3D, just like you saw in the movies

    Alejandro Caceres, Teal Rogers
    Sun, 11:30 - 11:50
    Track 2 - Track 2
  • Combatting Mac OSX/iOS Malware with Data Visualization

    Remy Baumgarten
    Sun, 12:00 - 12:20
    Track 2 - Track 2
  • A Thorny Piece Of Malware (And Me): The Nastiness of SEH, VFTables & Multi-Threading

    Marion Marschalek
    Sun, 12:30 - 12:50
    Track 2 - Track 2
  • Transcending Cloud Limitations by Obtaining Inner Piece

    Zak Blacher
    Sun, 13:00 - 13:20
    Track 2 - Track 2
  • Utilizing Popular Websites for Malicious Purposes Using RDI

    Daniel Chechik, Anat Davidi
    Sun, 13:30 - 13:50
    Track 2 - Track 2
  • Open Public Sensors, Trend Monitoring and Data Fusion

    Daniel Burroughs
    Sun, 14:00 - 14:20
    Track 2 - Track 2
  • Collaborative Penetration Testing With Lair

    Dan Kottmann, Tom Steele
    Sun, 14:30 - 14:50
    Track 2 - Track 2
  • PowerPwning: Post-Exploiting By Overpowering PowerShell

    Joe Bialek
    Sun, 15:00 - 15:20
    Track 2 - Track 2
  • Evolving Exploits Through Genetic Algorithms

    soen
    Sun, 15:30 - 15:50
    Track 2 - Track 2
  • Closing Ceremonies

     
    Sun, 17:00 - 19:00
    Track 2