• A
  • Abuse of Blind Automation in Security Tools

    Ruben Alejandro, Eric Davisson
    Fri, 11:00 - 11:50
    Track 3
  • Abusing Software Defined Networks

    Gregory Pickett
    Sat, 16:00 - 16:50
    Track 3
  • Acquire current user hashes without admin privileges

    Anton Sapozhnikov
    Fri, 16:00 - 16:50
    Track 3
  • Advanced Red Teaming: All Your Badges Are Belong To Us

    Josh Perrymon, Eric Smith
    Sat, 15:00 - 15:50
    Penn & Teller
  • A Journey to Protect Points-of-sale

    Nir Valtman
    Fri, 18:00 - 18:50
    Track 2
  • Am I Being Spied On? Low-tech Ways Of Detecting High-tech Surveillance

    Phil Polstra
    Fri, 15:00 - 15:50
    Penn & Teller
  • Anatomy of a Pentest; Poppin' Boxes like a Pro

    PushPin
    Thu, 14:00 - 14:50
    DEF CON 101
  • Android Hacker Protection Level 0

    Jon Sawyer, Tim Strazzere
    Sun, 14:00 - 14:50
    DEF CON 101
  • An Introduction to Back Dooring Operating Systems for Fun and Trolling

    Nemus
    Fri, 15:00 - 15:50
    DEF CON 101
  • Around the world in 80 cons - A Perspective

    Jayson E. Street
    Sun, 10:00 - 10:50
    DEF CON 101
  • Ask the EFF: The Year in Digital Civil Liberties

    Nate Cardozo, Eva Galperin, Mark Jaycox, Kurt Opsahl, Yan Zhu
    Sat, 16:00 - 17:50
    Track 2
  • A Survey of Remote Automotive Attack Surfaces

    Charlie Miller, Christopher Valasek
    Sat, 15:00 - 15:50
    Track 1
  • Attacking the Internet of Things using Time

    Paul McMillan
    Sat, 17:00 - 17:50
    Track 1
  • AWS for Hackers

    Seth van Ommen
    Thu, 13:00 - 13:50
    DEF CON 101
  • B
  • Bitcoin Barons

    Micon, Dave Perry, YTCracker
    Fri, 16:00 - 16:50
    Skytalks
  • Blinding The Surveillance State

    Christopher Soghoian
    Fri, 16:00 - 16:50
    DEF CON 101
  • Blowing up the Celly - Building Your Own SMS/MMS Fuzzer

    Brian Gorenc, Matt Molinyawe
    Sun, 13:00 - 13:20
    Track 1
  • Breaking MIFARE ULTRALIGHT... or how to get free rides and more

    Bug Hardy
    Sat, 15:00 - 15:50
    Skytalks
  • Bug Bounty Programs Evolution

    Nir Valtman
    Sat, 11:00 - 11:50
    DEF CON 101
  • Burner Phone DDOS 2 dollars a day : 70 Calls a Minute

    Weston Hecker
    Sun, 10:00 - 10:50
    Track 1
  • Bypass firewalls, application white lists, secure remote desktops under 20 seconds

    Zoltán Balázs
    Fri, 13:00 - 13:50
    Track 3
  • C
  • Catching Malware En Masse: DNS and IP Style

    Dhia Mahjoub, Thibault Reuille, Andree Toonk
    Sun, 12:00 - 12:50
    Track 3
  • Check Your Fingerprints: Cloning the Strong Set

    Richard Klafter, Eric Swanson
    Sat, 15:30 - 15:50
    Track 2
  • Civilianization of War - Paramilitarization of Cyberspace and Its Implications for Civilian Information Security Professionals

    Rod Soto
    Fri, 14:00 - 14:50
    Skytalks
  • Client-Side HTTP Cookie Security: Attack and Defense

    David Wyde
    Fri, 14:00 - 14:50
    DEF CON 101
  • Contests Awards Ceremony

     
    Sun, 15:00 - 16:30
    Track 2
  • ContradictionC2: A Takedown-Resistant Botnet Based on Dead Drops

    Michael George
    Fri, 09:00 - 09:50
    Skytalks
  • Custodiet - The Open Source MSSP Framework

    Quadling
    Fri, 10:00 - 10:50
    Skytalks
  • Cyberhijacking Airplanes: Truth or Fiction?

    Phil Polstra
    Sat, 12:00 - 12:50
    Track 2
  • D
  • Dark Mail

    Ladar Levison, Stephen Watt
    Fri, 17:00 - 17:50
    Track 1
  • Data Protection 101 - Successes, Fails, and Fixes

    Peter Teoh
    Thu, 10:00 - 10:50
    DEF CON 101
  • Deconstructing the Circuit Board Sandwich: Effective Techniques for PCB Reverse Engineering

    Joe Grand
    Sun, 13:00 - 13:50
    Track 2
  • DEF CON 101 - The Talk

    HighWiz, Lockheed, LosT, Pyr0, Roamer
    Thu, 10:00 - 11:50
    Track 3
  • DEF CON Closing Ceremonies

     
    Sun, 16:30 - 17:30
    Track 2
  • DEF CON Comedy Jam Part VII, Is This The One With The Whales?

    James Arlen, Rob Graham, Christofer Hoff, David Maynor, Rich Mogull, David Mortman, Larry Pesce, Adam Shostack
    Fri, 14:00 - 15:50
    Track 2
  • DEF CON the Mystery, Myth and Legend

     
    Sat, 17:00 - 17:50
    DEF CON 101
  • Detecting and Defending Against a Surveillance State

    Robert Rowley
    Fri, 13:00 - 13:50
    Track 1
  • Detecting Bluetooth Surveillance Systems

    Grant Bugher
    Sat, 15:00 - 15:50
    DEF CON 101
  • Diversity in Information Security

    Sandy Clark, Jennifer Imhoff-Dousharm, Jolly, Scott Martin, Kristin Paget, Vyrus
    Fri, 17:00 - 17:50
    DEF CON 101
  • Domain Name Problems and Solutions

    Paul Vixie
    Fri, 10:00 - 10:50
    Track 2
  • Don't DDoS Me Bro: Practical DDoS Defense

    Shawn Burrell, Blake Self
    Sat, 12:00 - 12:50
    Track 3
  • Don't Fuck It Up!

    Zoz
    Sat, 11:00 - 11:50
    Penn & Teller
  • Dropping Docs on Darknets: How People Got Caught

    Adrian Crenshaw
    Sun, 12:00 - 12:50
    DEF CON 101
  • E
  • Elevator Hacking - From the Pit to the Penthouse

    Deviant Ollam, Howard Payne
    Sun, 15:00 - 15:50
    Track 1
  • Empowering Hackers to Create a Positive Impact

    Keren Elazari
    Sun, 14:00 - 14:50
    Track 1
  • Energy-efficient bcrypt cracking

    Katja Malvoni
    Sun, 12:00 - 12:50
    Skytalks
  • Ephemeral Communications: Why and How?

    Jon Callas, Ryan Lackey, Elissa Shevinsky
    Fri, 16:00 - 16:50
    Track 2
  • Extreme Privilege Escalation On Windows 8/UEFI Systems

    Corey Kallenberg, Xeno Kovah
    Fri, 14:00 - 14:50
    Track 3
  • F
  • For a good time, call....

    Algorythm
    Sat, 12:00 - 12:50
    Skytalks
  • From Raxacoricofallapatorius With Love: Case Studies In Insider Threat

    Tess Schrodinger
    Fri, 17:00 - 17:50
    Track 2
  • From root to SPECIAL: Pwning IBM Mainframes

    Philip Young
    Fri, 12:00 - 12:20
    Track 3
  • G
  • Generating ROP payloads from numbers

    Alexandre Moneger
    Sun, 14:00 - 14:50
    Track 3
  • Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse

    Brady Bloxham
    Sat, 17:00 - 17:50
    Track 3
  • Girl… Fault-Interrupted.

    Maggie Jauregui
    Sat, 11:00 - 11:50
    Track 2
  • H
  • Hack All The Things: 20 Devices in 45 Minutes

    Mike Baker, Amir Etemadieh, CJ Heres, Hans Nielsen
    Sat, 10:00 - 10:50
    Track 1
  • Hacking 911: Adventures in Disruption, Destruction, and Death

    Christian Dameff, Peter Hefley, Jeff Tully
    Sat, 10:00 - 10:50
    Track 2
  • Hacking the FBI: How & Why to Liberate Government Records

    Ryan Noah Shapiro
    Fri, 14:00 - 14:50
    Track 1
  • Hacking US (and UK, Australia, France, etc.) traffic control systems

    Cesar Cerrudo
    Fri, 13:00 - 13:50
    Penn & Teller
  • Home Alone with localhost: Automating Home Defense

    Chris Littlebury
    Sun, 13:00 - 13:50
    DEF CON 101
  • How to Disclose an Exploit Without Getting in Trouble

    Tod Beardsley, James Denaro
    Sat, 12:00 - 12:50
    DEF CON 101
  • How To Get Phone Companies To Just Say No To Wiretapping

    Phil Zimmermann
    Fri, 12:00 - 12:50
    Track 1
  • How To Make Money Fast Using A Pwned PBX

    Patrick McNeil
    Sat, 11:00 - 11:50
    Skytalks
  • I
  • I am a legend: Hacking Hearthstone with machine learning

    Celine Bursztein, Elie Bursztein
    Sun, 10:00 - 10:50
    Track 3
  • I Hunt TR-069 Admins: Pwning ISPs Like a Boss

    Shahar Tal
    Sat, 11:00 - 11:50
    Track 3
  • Impostor — Polluting Tor Metadata

    Mike Larsen, Charlie Vedaa
    Sat, 15:00 - 15:20
    Track 2
  • Instrumenting Point-of-Sale Malware: A Case Study in Communicating Malware Analysis More Effectively

    Wesley McGrew
    Sat, 13:00 - 13:50
    DEF CON 101
  • In the forest of knowledge with 1o57

     
    Thu, 15:00 - 15:50
    Track 3
  • Investigating PowerShell Attacks

    Matt Hastings, Ryan Kazanciyan
    Fri, 13:00 - 13:50
    DEF CON 101
  • Is This Your Pipe? Hijacking the Build Pipeline.

    Greg Anderson, Kyle Kelley
    Sun, 15:00 - 15:50
    DEF CON 101
  • J
  • Just What The Doctor Ordered?

    Scott Erven, Shawn Merdinger
    Sat, 13:00 - 14:50
    Track 2
  • K
  • Keynote

    John McAfee
    Fri, 17:00 - 17:50
    Skytalks
  • L
  • Learn how to control every room at a luxury hotel remotely: the dangers of insecure home automation deployment

    Jesus Molina
    Sat, 16:00 - 16:20
    Track 1
  • Logging ALL THE THINGS Without All The Cost With Open Source Big Data Tools </buzzwords>

    Zack Fasel
    Sat, 12:00 - 12:00
    Track 1
  • M
  • Manna from Heaven: Improving the state of wireless rogue AP attacks

    Ian de Villiers, Dominic White
    Sat, 16:00 - 16:50
    Penn & Teller
  • Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring.

    The Grugq, Ryan Lackey, Marc Rogers
    Sat, 14:00 - 14:50
    Track 3
  • Mass Scanning the Internet: Tips, Tricks, Results

    Rob Graham, Paul McMillan, Dan Tentler
    Sat, 10:00 - 10:50
    Track 3
  • Measuring the IQ of your Threat Intelligence feeds

    Kyle Maxwell, Alex Pinto
    Fri, 11:00 - 11:50
    Track 2
  • Meddle: Framework for Piggy-back Fuzzing and Tool Development

    Geoff McDonald
    Fri, 10:00 - 10:50
    DEF CON 101
  • N
  • NinjaTV - Increasing Your Smart TV’s IQ Without Bricking It

    Flix Leder
    Sat, 14:00 - 14:50
    Track 1
  • NSA Playset: DIY WAGONBED Hardware Implant over I2C

    Josh Datko, Ted Reed
    Sun, 11:00 - 11:50
    Track 1
  • NSA Playset: GSM Sniffing

    Loki, Pierce, Phil Polstra
    Sun, 12:00 - 12:50
    Track 1
  • NSA Playset: PCIe

    Miles Crabill, Joe FitzPatrick
    Sun, 14:00 - 14:50
    Track 2
  • NSA Playset: RF Retroreflectors

    Michael Ossmann
    Fri, 12:00 - 12:50
    Penn & Teller
  • O
  • Oh Bother, Cruising The Internet With Your Honeys, Creating Honeynets For Tracking Criminal Organizations

    Terrence Gareau, Mike Thompson
    Thu, 16:00 - 16:50
    Track 3
  • Old Skewl Hacking: Porn Free!

    Adam Laurie
    Sat, 18:00 - 18:50
    Track 2
  • One Man Shop: Building an effective security program all by yourself

    Tim McGuffin
    Thu, 14:00 - 14:50
    Track 3
  • Open Source Fairy Dust

    John Menerick
    Sun, 12:00 - 12:50
    Track 2
  • Optical Surgery; Implanting a DropCam

    Colby Moore, Patrick Wardle
    Sun, 11:00 - 11:50
    Track 2
  • Oracle Data Redaction is Broken

    David Litchfield
    Fri, 10:00 - 10:50
    Track 3
  • P
  • Paging SDR... Why should the NSA have all the fun?

    Jason Malley, Jeff Thomas
    Thu, 12:00 - 12:50
    Track 3
  • Password Topology Histogram Wear-Leveling, aka PathWell

    Minga
    Sun, 13:00 - 13:50
    Skytalks
  • Penetrate your OWA

    Nate Power
    Sun, 09:00 - 09:50
    Skytalks
  • Playing with Car Firmware or How to Brick your Car

    Agix, Paul Such
    Sun, 13:30 - 13:50
    Track 1
  • PoS Attacking the Traveling Salesman

    Tsagkarakis Nikolaos, Alex Zacharis
    Fri, 13:00 - 13:50
    Track 2
  • Practical Aerial Hacking & Surveillance

    Glenn Wilkinson
    Fri, 16:00 - 16:50
    Penn & Teller
  • Practical Foxhunting 101

    Adam Wirth
    Thu, 11:00 - 11:50
    DEF CON 101
  • PropLANE: Kind of keeping the NSA from watching you pee

    Rob Bathurst, Mark Carey, Ryan Clarke, Russ Rogers
    Sat, 13:00 - 13:50
    Track 1
  • Protecting SCADA From the Ground Up

    Aaron Bayles
    Thu, 13:00 - 13:50
    Track 3
  • R
  • Raspberry MoCA - A recipe for compromise

    Andrew Hunt
    Sat, 16:30 - 16:50
    Track 1
  • Reverse Engineering Mac Malware

    Sarah Edwards
    Thu, 16:00 - 16:50
    DEF CON 101
  • RFIDler: SDR.RFID.FTW

    Zac Franken, Adam Laurie
    Thu, 17:00 - 17:50
    Track 3
  • RF Penetration Testing, Your Air Stinks

    John Fulmer
    Thu, 12:00 - 12:50
    DEF CON 101
  • S
  • Saving Cyberspace by Reinventing File Sharing

    Eijah
    Fri, 15:00 - 15:50
    Track 1
  • Saving the Internet (for the Future)

    Jason Healey
    Fri, 10:00 - 10:50
    Track 1
  • Screw Becoming A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter!

    Carsten Eiram, Jake Kouns
    Sat, 10:00 - 10:50
    DEF CON 101
  • Secure Because Math: A Deep Dive On Machine Learning-Based Monitoring

    Alex Pinto
    Sat, 13:00 - 13:50
    Track 3
  • Secure Random By Default

    Dan Kaminsky
    Sat, 13:00 - 14:50
    Penn & Teller
  • Security's in your DNA: Using Genomics & Big Data for Security

    Rob Bird
    Sat, 17:00 - 17:50
    Skytalks
  • Security with Anch: Another Talk, Another Drink.

    Anch
    Sat, 16:00 - 16:50
    Skytalks
  • SHA1 backdooring and exploitation

    Jean-Philippe Aumasson
    Sat, 10:00 - 10:50
    Skytalks
  • ShareEnum: We Wrapped Samba So You Don’t Have To

    Michael McAtee, Lucas Morris
    Fri, 12:00 - 12:50
    DEF CON 101
  • Shellcodes for ARM: Your Pills Don't Work on Me, x86

    Svetlana Gaivoronski, Ivan Petrov
    Sun, 15:00 - 15:50
    Track 3
  • SQL-Gestalt: A MS-SQL Rootkit Framework

    Rob Beck
    Sun, 14:00 - 14:50
    Skytalks
  • Standing Up an Effective Penetration Testing Team

    Mike Petruzzi
    Thu, 15:00 - 15:50
    DEF CON 101
  • Steganography in Commonly Used HF Radio Protocols

    Paul Drapeau, Brent Dukes
    Fri, 11:00 - 11:50
    Penn & Teller
  • Stolen Data Markets: An Economic and Organizational Assessment

    Yi-Ting Chua, Dr. Thomas J. Holt, Olga Smirnova
    Fri, 12:00 - 12:50
    Track 2
  • Summary of Attacks Against BIOS and Secure Boot

    Oleksandr Bazhaniuk, Yuriy Bulygin, Andrew Furtak, John Loucaides
    Sat, 12:00 - 12:50
    Penn & Teller
  • Surveillance on the Silver Screen- Fact or Fiction?

    Kevin Bankston, Timothy Edgar, Nicole Ozer
    Sat, 18:00 - 18:50
    Track 3
  • T
  • The Cavalry Year[0] & a Path Forward for Public Safety

    Joshua Corman, Nicholas J. Percoco
    Sat, 10:00 - 10:50
    Penn & Teller
  • The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns

    Christopher Campbell
    Fri, 12:30 - 12:50
    Track 3
  • The Internet of Fails: Where IoT Has Gone Wrong and How We're Making It Right

    Zach Lanier, Mark Stanislav
    Sat, 11:00 - 11:50
    Track 1
  • The Making of DEFCOIN

    Mike Guthrie, Jeff Thomas, Seth van Ommen
    Thu, 17:00 - 17:50
    DEF CON 101
  • The Monkey in the Middle: A pentesters guide to playing in traffic.

    Mike Guthrie
    Sat, 14:00 - 14:50
    DEF CON 101
  • The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State

    Richard Thieme
    Fri, 11:00 - 11:50
    Track 1
  • The Open Crypto Audit Project

    Matthew Green, Kenneth White
    Fri, 16:00 - 16:50
    Track 1
  • The Secret Life of Krbtgt

    Christopher Campbell
    Fri, 17:30 - 17:50
    Track 3
  • Through the Looking-Glass, and What Eve Found There

    Luca Bruno, Mariano Graziano
    Sun, 11:00 - 11:50
    Track 3
  • Touring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin

    Metacortex
    Sat, 16:00 - 16:50
    DEF CON 101
  • Trojan banker turned DDoS - The bug that brought a Bank down

     
    Sun, 11:00 - 11:50
    Skytalks
  • U
  • USB for all!

    Jesse Michael
    Fri, 11:00 - 11:50
    DEF CON 101
  • V
  • Veil-Pillage: Post-exploitation 2.0

    Will Schroeder
    Fri, 15:00 - 15:50
    Track 3
  • VoIP Wars: Attack of the Cisco Phones

    Fatih Ozavci
    Sat, 15:00 - 15:50
    Track 3
  • W
  • Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog

    Gene Bransfield
    Sun, 10:00 - 10:50
    Track 2
  • Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System

    Shane Macaulay
    Sun, 13:00 - 13:50
    Track 3
  • Welcome & Making of the DEF CON Badge

    LosT
    Fri, 10:00 - 10:50
    Penn & Teller
  • What the Watchers See: Eavesdropping on Municipal Mesh Cameras for Giggles (or Pure Evil)

    Dustin Hoffman, Thomas Kinsey
    Fri, 14:00 - 14:50
    Penn & Teller
  • Why Don’t You Just Tell Me Where The ROP Isn’t Supposed To Go

    David Dorsey
    Fri, 17:00 - 17:20
    Track 3
  • Y
  • Y3t1's mobile uberpwn drop unit -- or how I learned to love the tab

    Y3t1
    Fri, 13:00 - 13:50
    Skytalks
  • You Are Not A Soldier, and This Is Not A War

    Brendan O'Connor
    Fri, 15:00 - 15:50
    Skytalks
  • You're Leaking Trade Secrets

    Michael Schrenk
    Sun, 11:00 - 11:50
    DEF CON 101