• 8
  • 802.11 Massive Monitoring

    Andres Blanco, Andres Gazzoli
    Sat, 17:00 - 17:50
    Track Three
  • 802.11 Monitoring with PCAP2XML/SQLite

    Vivek Ramachandran
    Fri, 00:00 - 00:00
     
  • A
  • Abusing Adobe Reader’s JavaScript APIs

    Brian Gorenc, Abdul-Aziz Hariri, Jasiel Spelman
    Sun, 10:00 - 10:50
    Track One
  • Abusing native Shims for Post Exploitation

    Sean Pierce
    Sun, 10:00 - 10:50
    DEF CON 101
  • Abusing XSLT for Practical Attacks

    Fernando Arnaboldi
    Sat, 14:00 - 14:50
    DEF CON 101
  • Advanced SOHO Router Exploitation

    Lyon Yang
    Fri, 00:00 - 00:00
     
  • Advances in Linux Process Forensics Using ECFS

    Ryan O'Neill
    Sun, 14:00 - 14:50
    Track Three
  • A Hacker’s Guide to Risk

    Bruce Potter
    Sat, 10:00 - 10:50
    DEF CON 101
  • Alice and Bob are Really Confused

    David Huerta
    Thu, 13:00 - 13:50
    Track Four
  • And That's How I Lost My Other Eye: Further Explorations In Data Destruction

    Zoz
    Sat, 11:00 - 11:50
    DEF CON 101
  • Angry Hacking - the next generation of binary analysis

    Yan Shoshitaishvili, Fish Wang
    Sat, 13:00 - 13:50
    Track Two
  • A Peek Behind the Blue Mask: The Evolution of the SECTF

    Chris Hadnagy
    Fri, 00:00 - 00:00
     
  • Applied Intelligence: Using Information That's Not There

    Michael Schrenk
    Fri, 13:00 - 13:50
    DEF CON 101
  • Are We Really Safe? - Bypassing Access Control Systems

    Dennis Maldonado
    Sat, 12:00 - 12:50
    DEF CON 101
  • Ask the EFF: The Year in Digital Civil Liberties

    Nate Cardozo, Peter Eckersley, Mark Jaycox, Nadia Kayyali, Corynne McSherry, Kurt Opsahl
    Sat, 18:00 - 19:50
    Track Two
  • Attacking Hypervisors Using Firmware and Hardware

    Oleksandr Bazhaniuk, Yuriy Bulygin, Andrew Furtak, Mikhail Gorobets, Alexander Matrosov
    Sun, 13:00 - 13:50
    Track One
  • Automatic Live WPA/WPA2 Attacks and WPA_Supplicant

    Vivek Ramachandran
    Fri, 00:00 - 00:00
     
  • B
  • Backdooring Git

    John Menerick
    Thu, 17:00 - 17:50
    Track Four
  • Beginner Crypto for Application Developers

    Justin Engler
    Fri, 16:30 - 16:55
    Crypto and Privacy Village
  • Beyond the Scan: The Value Proposition of Vulnerability Assessment

    Damon Small
    Thu, 14:00 - 14:50
    DEF CON 101
  • Biohacking at home: Pragmatic DNA design, assembly, and transformation

    Keoni Gandall, Johan Sosa
    Fri, 00:00 - 00:00
     
  • Brain Waves Surfing - (In)security in EEG (Electroencephalography) Technologies

    Alejandro Hernández
    Fri, 00:00 - 00:00
     
  • Breaking CBC, or Randomness Never Was Happiness

    Dr. Albert H. Carlson, Patrick Doherty
    Fri, 00:00 - 00:00
     
  • Breaking in Bad! (I’m the one who doesn’t knock)

    Jayson E. Street
    Fri, 00:00 - 00:00
     
  • Breaking RSA - new cryptography for a post-quantum world

    Jennifer Katherine Fernick
    Fri, 17:00 - 17:25
    Crypto and Privacy Village
  • Breaking SSL Using Time Synchronisation Attacks

    Jose Selvi
    Fri, 18:00 - 18:50
    Track Four
  • Bruce Schneier Q&A

    Bruce Schneier
    Fri, 12:00 - 12:50
    DEF CON 101
  • Bugged Files: Is Your Document Telling on You?

    Dan Crowley, Damon Smith
    Fri, 10:00 - 10:50
    Track Four
  • Build a free cellular traffic capture tool with a vxworks based femoto

    Haoqi Shan, Yuwei Zheng
    Fri, 14:00 - 14:50
    Track One
  • BurpKit - Using WebKit to Own the Web

    Nadeem Douba
    Sat, 14:00 - 14:50
    Track Four
  • C
  • Canary: Keeping Your Dick Pics Safe(r)

    Rob Bathurst, Jeff Thomas
    Sun, 11:00 - 11:50
    Track Two
  • CFSSL: the evolution of a PKI toolkit

    Nick Sullivan
    Fri, 15:00 - 16:25
    Crypto and Privacy Village
  • Chellam – a Wi-Fi IDS/Firewall for Windows

    Vivek Ramachandran
    Fri, 15:00 - 15:50
    DEF CON 101
  • Chigula — a framework for Wi-Fi Intrusion Detection and Forensics

    Vivek Ramachandran
    Sat, 12:00 - 12:50
    Track Four
  • Classify Targets to Make Social Engineering Easier to Achieve

    Heng Guan
    Fri, 20:00 - 20:50
    Social Engineering Village
  • Cloning Access Cards to Implants

    Alex Smith @CyberiseMe
    Fri, 00:00 - 00:00
     
  • Closing Ceremonies

     
    Sun, 16:30 - 18:00
    Track One
  • Confessions of a Professional Cyber Stalker

    Ken Westin
    Fri, 12:00 - 12:50
    Track Four
  • Contest Closing Ceremonies

     
    Sun, 14:00 - 16:20
    DEF CON 101
  • Covert Wireless: Practical Hacker LPI-LPD

    Wireless Warrior
    Fri, 16:00 - 16:50
    Wireless Village
  • Cracking Cryptocurrency Brainwallets

    Ryan Castellucci
    Fri, 14:00 - 14:50
    Track Four
  • Creating REAL Threat Intelligence With Evernote

    grecs
    Fri, 00:00 - 00:00
     
  • CrypTag: Building Encrypted, Taggable, Searchable Zero-knowledge Systems

    Steven Phillips
    Fri, 00:00 - 00:00
     
  • Crypto for Hackers

    Eijah
    Fri, 11:00 - 11:50
    DEF CON 101
  • D
  • Dark side of the ELF - leveraging dynamic loading to pwn noobs

    Alessandro Di Federico, Yan Shoshitaishvili
    Thu, 17:00 - 17:50
    DEF CON 101
  • DEF CON 101: The Panel.

    Nikita Kronenberg, Mike Petruzzi, Plug, PushPin, Russ Rogers
    Thu, 12:00 - 13:50
    DEF CON 101
  • DEF CON Comedy Inception: How many levels deep can we go?

    Amanda Berlin, Chris Blow, Adam Crain, Katie Moussouris, Larry Pesce, Chris Sistrunk, Dan Tentler
    Sat, 18:00 - 19:50
    Track Three
  • Detecting Randomly Generated Strings; A Language Based Approach

    Mahdi Namazifar
    Fri, 16:30 - 16:55
    DEF CON 101
  • Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities

    Aditya K. Sood
    Sat, 10:00 - 10:50
    Track Four
  • DIY Nukeproofing: a new dig at "data-mining"

    3AlarmLampscooter
    Sat, 18:00 - 18:50
    Track Four
  • '
  • 'DLL Hijacking' on OS X? #@%& Yeah!

    Patrick Wardle
    Sat, 11:00 - 11:50
    Track Three
  • D
  • DNS and the Future of Authenticity

    indolering
    Fri, 10:00 - 10:25
    Crypto and Privacy Village
  • dnstap - A Standard Interface to Real Time DNS Transaction Flows

    Paul Vixie
    Fri, 13:00 - 13:50
    Packet Capture Village
  • Docker, Docker, Give Me The News, I Got A Bad Case Of Securing You

    David Mortman
    Sun, 10:00 - 10:50
    Track Two
  • Do Export Controls on “Intrusion Software” Threaten Vulnerability Research?

    Collin Anderson, Tom Cross
    Sat, 10:00 - 10:50
    Track Three
  • Don't Whisper my Chips: Sidechannel and Glitching for Fun and Profit

    Colin O'Flynn
    Fri, 13:00 - 13:50
    Track Four
  • Drinking from LETHE: New methods of exploiting and mitigating memory corruption vulnerabilities

    Daniel Selifonov
    Fri, 18:00 - 18:50
    Track Two
  • Drive It Like You Hacked It: New Attacks and Tools to Wirelessly Steal Cars

    Samy Kamkar
    Fri, 13:00 - 13:50
    Track Two
  • DSP for SDR

    Karl Koscher
    Fri, 00:00 - 00:00
     
  • E
  • Examining the Robustness of the Brain Against a Malicious Adversary

    Avani Wildani
    Fri, 15:30 - 15:50
    BioHacking Village
  • Exploring Layer 2 Network Security in Virtualized Environments

    Ronny L. Bull, Dr. Jeanna N. Matthews
    Sat, 17:00 - 17:50
    Track One
  • Extending Fuzzing Grammars to Exploit Unexplored Code Paths in Modern Web Browsers

    Saif El-Sherei, Etienne Stalmans
    Sat, 15:00 - 15:50
    DEF CON 101
  • Extracting the Painful (blue)tooth

    Matteo Beccaro, Matteo Collura
    Sat, 14:00 - 14:50
    Track One
  • F
  • F*ck the attribution, show us your .idb!

    Claudio Guarnieri, Morgan Marquis-Boire, Marion Marschalek
    Sat, 12:00 - 12:50
    Track Two
  • Fighting Back in the War on General Purpose Computers

    Cory Doctorow
    Fri, 11:00 - 11:50
    Track Three
  • Fishing To Phishing: It's All About Slimy Creatures

    Wayne Crowder
    Fri, 00:00 - 00:00
     
  • Forensic Artifacts From a Pass the Hash Attack

    Gerard Laygui
    Thu, 15:00 - 15:50
    Track Four
  • From 0 To Secure In 1 Minute — Securing IAAS

    Moshe Ferber, Nir Valtman
    Sat, 13:00 - 13:50
    Track Four
  • From XSS to Root on Your NAS

    Tony Martin
    Fri, 00:00 - 00:00
     
  • Fun with Symboliks

    atlas
    Fri, 17:00 - 17:50
    Track Two
  • G
  • Game of Hacks: Play, Hack & Track

    Amit Ashbel, Maty Siman
    Sat, 18:00 - 18:50
    DEF CON 101
  • Getting into the Trust Store We Trust

    Ajit Hatti
    Fri, 10:30 - 11:55
    Crypto and Privacy Village
  • Global Honeypot Trends

    Elliot Brink
    Fri, 15:00 - 15:50
    Packet Capture Village
  • GNU Radio Tools for Radio Wrangling and Spectrum Domination

    Tim O’Shea
    Fri, 00:00 - 00:00
     
  • Goodbye Memory Scraping Malware: Hold Out Till "Chip And Pin”

    Weston Hecker
    Fri, 11:00 - 11:50
    Track Four
  • Guests N’ Goblins: Exposing Wi-Fi Exfiltration Risks and Mitigation techniques

    Joshua Brierton, Peter Desfigies, Naveed Ul Islam
    Thu, 16:00 - 16:50
    DEF CON 101
  • H
  • Hacker in the Wires

    Phil Polstra
    Thu, 14:00 - 14:50
    Track Four
  • Hackers Hiring Hackers - How to Do Things Better

    IrishMASMS, Tottenkoph
    Thu, 11:00 - 11:50
    DEF CON 101
  • Hacker's Practice Ground

    Lokesh Pidawekar
    Fri, 14:00 - 14:50
    Packet Capture Village
  • Hacking Electric Skateboards: Vehicle Research For Mortals

    Richo Healey, Mike Ryan
    Sat, 15:00 - 15:50
    Track Two
  • Hacking Quantum Cryptography

    Marina
    Fri, 00:00 - 00:00
     
  • Hacking Satellite TV Receivers

    Sofiane Talmat
    Fri, 00:00 - 00:00
     
  • Hacking Smart Safes: On the "Brink" of a Robbery

    Dan Petro, Oscar Salazar
    Sat, 12:00 - 12:50
    Track One
  • Hacking SQL Injection for Remote Code Execution on a LAMP stack

    Nemus
    Fri, 14:00 - 14:50
    DEF CON 101
  • Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0

    Richard Thieme
    Sat, 17:00 - 17:50
    Track Four
  • Hacking the Next Generation

    David Schwartzberg
    Fri, 00:00 - 00:00
     
  • Hacking Web Apps

    Brent White
    Thu, 11:00 - 11:50
    Track Four
  • Hacking You Fat: The FitBit Aria

    David Lodge, Ken Munro
    Fri, 00:00 - 00:00
     
  • Hack the Legacy! IBM i (aka AS/400) Revealed.

    Bart Kulach
    Fri, 17:00 - 17:50
    Track Four
  • HamSammich – long distance proxying over radio

    Rob Graham, David Maynor
    Fri, 16:00 - 16:25
    Track One
  • Hardware and Trust Security: Explain it like I’m 5

    Nick Anderson, Ted Reed
    Thu, 10:00 - 10:50
    Track Four
  • Harness: Powershell Weaponization Made Easy (or at least easier)

    Rich Kelley
    Fri, 16:00 - 16:25
    Track Two
  • High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC

    Joshua Smith
    Sat, 15:00 - 15:50
    Track Three
  • Hijacking Arbitrary .NET Application Control Flow

    Topher Timzen
    Sun, 12:00 - 12:50
    DEF CON 101
  • Hooked Browser Meshed-Networks with WebRTC and BeEF

    Christian Frichot
    Fri, 18:00 - 18:50
    Track Three
  • How Machine Learning Finds Malware Needles in an AppStore Haystack

    Theodora Titonis
    Fri, 00:00 - 00:00
     
  • How to Engineer a Cryptographic 'Front Door'

    Karl Koscher
    Fri, 14:30 - 14:55
    Crypto and Privacy Village
  • How to Hack a Tesla Model S

    Kevin Mahaffey, Marc Rogers
    Fri, 14:00 - 14:50
    Track Two
  • How to Hack Government: Technologists as Policy Makers

    Terrell McSweeny, Ashkan Soltani
    Sun, 10:00 - 10:50
    Track Three
  • How to hack your way out of home detention

    AmmonRa
    Fri, 15:00 - 15:50
    Track One
  • How to secure the keyboard chain

    Paul Amicelli, Baptiste David
    Fri, 16:30 - 16:55
    Track One
  • How to Shot Web: Web and mobile hacking in 2015

    Jason Haddix
    Sat, 16:00 - 16:50
    DEF CON 101
  • How to Train Your RFID Hacking Tools

    Craig Young
    Fri, 18:00 - 18:50
    Track One
  • I
  • I Am Not What I Am: Shakespeare and Social Engineering

    John Ridpath
    Fri, 19:00 - 19:50
    Social Engineering Village
  • I Am Packer And So Can You

    Mike Sconzo
    Fri, 17:00 - 17:50
    DEF CON 101
  • "
  • "I Didn’t Think it was Loaded" and Other Mental Derps

    Michele Fincher
    Fri, 17:00 - 17:50
    Social Engineering Village
  • I
  • I Hunt Penetration Testers: More Weaknesses in Tools and Procedures

    Wesley McGrew
    Sat, 12:00 - 12:50
    Track Three
  • I’m A Newbie Yet I Can Hack ZigBee – Take Unauthorized Control Over ZigBee Devices

    LI Jun, YANG Qing
    Sat, 19:00 - 19:50
    Track Four
  • IMSI Catcher Counter-Surveillance

    Freddy Martinez
    Fri, 16:30 - 16:55
    Crypto and Privacy Village
  • Insteon' False Security And Deceptive Documentation

    Ryan Gooler, Peter Shipley
    Fri, 13:00 - 13:50
    Track One
  • Inter-VM data exfiltration: The art of cache timing covert channel on x86 multi-core

    Etienne Martineau
    Sun, 14:00 - 14:50
    Track One
  • Introduction to SDR and the Wireless Village

    DaKahuna, satanklawz
    Thu, 10:00 - 10:50
    DEF CON 101
  • Investigating the Practicality and Cost of Abusing Memory Errors with DNS

    Luke Young
    Sat, 16:00 - 16:50
    Track Three
  • I See You

    Andrew Beard, Brian Wohlwinder
    Fri, 00:00 - 00:00
     
  • Is Your Android App Secure?

    Sam Bowne
    Fri, 00:00 - 00:00
     
  • It's The Only Way To Be Sure: Obtaining and Detecting Domain Persistence

    Grant Bugher
    Sat, 13:00 - 13:50
    DEF CON 101
  • I want these * bugs off my * Internet

    Dan Kaminsky
    Sat, 16:00 - 16:50
    Track Two
  • I Will Kill You

    Chris Rock
    Fri, 16:30 - 16:55
    Track Two
  • K
  • Key-Logger, Video, Mouse — How To Turn Your KVM Into a Raging Key-logging Monster

    Yaniv Balmas, Lior Oppenheim
    Sat, 11:00 - 11:50
    Track One
  • Keynote: Crypto & Privacy Village

    Tony Arcieri, Justin Culbertson, Nadia Kayyali, Jorge Lacoste, Whitney Merrill, Peter Teoh
    Fri, 12:00 - 12:25
    Crypto and Privacy Village
  • Keynote: Underhanded Crypto Contest

    Adam Caudill, Taylor Hornby
    Fri, 12:30 - 12:55
    Crypto and Privacy Village
  • Knocking my neighbor’s kid’s cruddy drone offline

    Michael Robinson
    Sun, 12:00 - 12:50
    Track One
  • L
  • Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web

    Peter Eckersley, James Kasten, Yan Zhu
    Sat, 15:00 - 15:50
    Track Four
  • Let's Talk about Let's Encrypt

    Bill Budindgton
    Fri, 15:00 - 15:55
    Crypto and Privacy Village
  • Let's Talk About SOAP, Baby. Let's Talk About UPNP

    Ricky Lawshae
    Sun, 14:00 - 14:50
    Track Two
  • Licensed to Pwn: The Weaponization and Regulation of Security Research

    Dave Aitel, Matt Blaze, Nate Cardozo, James Denaro, Mara Tam
    Fri, 11:00 - 12:50
    Track Two
  • Life of PII: A Day in the Life of Your Personally Identifiable Information

    Alisha Kloc
    Fri, 13:00 - 13:55
    Crypto and Privacy Village
  • Linux Containers: Future or Fantasy?

    Aaron Grattafiori
    Sat, 19:00 - 19:50
    DEF CON 101
  • Looping Surveillance Cameras through Live Editing of Network Streams

    Eric Van Albert, Zach Banks
    Sat, 15:00 - 15:50
    Track One
  • Low-cost GPS simulator – GPS spoofing by SDR

    Lin Huang, Qing Yang
    Fri, 15:00 - 15:50
    Track Two
  • LTE Recon and Tracking with RTLSDR

    Ian Kline
    Fri, 16:00 - 16:25
    DEF CON 101
  • M
  • Machine Learning and Manipulation

    Jennifer Helsby
    Fri, 16:00 - 16:25
    Crypto and Privacy Village
  • Machine vs. Machine: Inside DARPA’s Fully Automated CTF

    Mike Walker, Jordan Wiens
    Sat, 11:00 - 11:50
    Track Two
  • Making Email Dark

    Chris Brown, Ladar Levison, Fred Nixon
    Fri, 00:00 - 00:00
     
  • Malware in the Gaming Micro-economy

    Zack Allen, Rusty Bower
    Fri, 12:00 - 12:50
    Track One
  • Medical Devices: Pwnage and Honeypots

    Mark Collao, Scott Erven
    Thu, 18:00 - 18:50
    DEF CON 101
  • Meeting People Over WiFi

    JoshInGeneral
    Fri, 00:00 - 00:00
     
  • MITM 101: Easy Traffic Interception Techniques Using Scapy

    Bob Simpson
    Fri, 00:00 - 00:00
     
  • Mobile Data Loss - Threats & Countermeasures

    Michael Raggo
    Fri, 11:00 - 11:50
    Packet Capture Village
  • Modern Crypto: 15 Years of Advancement in Cryptography

    Steve Weis
    Fri, 11:00 - 11:25
    Crypto and Privacy Village
  • N
  • NetRipper - Smart traffic sniffing for penetration testers

    Ionut Popescu
    Fri, 17:00 - 17:50
    Track Three
  • NSA Playset: JTAG Implants

    Joe FitzPatrick, Matt King
    Sat, 16:00 - 16:50
    Track Four
  • NSM 101 for ICS

    Chris Sistrunk
    Fri, 10:00 - 10:50
    DEF CON 101
  • O
  • One Device to Pwn Them All

    Phil Polstra
    Fri, 19:00 - 19:50
    Track Two
  • Opening Backdoors: The Importance of Backdoor Research

    Adam Caudill
    Fri, 14:00 - 14:25
    Crypto and Privacy Village
  • P
  • Parallels in BioSec and InfoSec

    Walter Powell
    Fri, 10:00 - 10:15
    BioHacking Village
  • Peerio: Productivity with end-to-end encryption

    Nadim Kobeissi
    Fri, 11:30 - 11:55
    Crypto and Privacy Village
  • Phishing: Recon to Creds with the SpeedPhishing Framework

    Adam Compton, Eric Gershman
    Fri, 00:00 - 00:00
     
  • Physiology from the Perspective of Control: A Bio-hacker's Guide

    Jasmina Aganovic, Christian Dameff, Peter Hefley, Jeff Tully, David Whitlock
    Fri, 15:00 - 15:20
    BioHacking Village
  • Pivoting Without Rights – Introducing Pivoter

    David Kennedy, Geoff Walton
    Sun, 12:00 - 12:50
    Track Two
  • Powershell for Penetraton Testers

    Nikhil Mittal
    Fri, 00:00 - 00:00
     
  • Protecting global email - status & the road ahead

    Steven F. Fox, Per Thorsheim
    Fri, 00:00 - 00:00
     
  • PSK31 Modulation Polyglots

    Sergey Bratus, Travis Goodspeed
    Fri, 10:00 - 10:50
    Wireless Village
  • Put on your tinfo_t hat if you're my type

    miaubiz
    Fri, 16:30 - 16:55
    Track Three
  • Pwning IoT with Hardware Attacks

    Chase Shultz
    Fri, 00:00 - 00:00
     
  • Q
  • QARK: Android App Exploit and SCA Tool

    Tushar Dalvi, Tony Trummer
    Sat, 11:00 - 11:50
    Track Four
  • "
  • "Quantum" Classification of Malware

    John Seymour
    Sun, 13:00 - 13:50
    Track Three
  • Q
  • Quantum Computers vs. Computers Security

    Jean-Philippe Aumasson
    Fri, 15:00 - 15:50
    Track Four
  • R
  • Red vs. Blue: Modern Active Directory Attacks & Defense

    Sean Metcalf
    Fri, 13:00 - 13:50
    Track Three
  • Remaining Covert in an Overt World

    Chet Hosmer, Michael Raggo
    Fri, 16:00 - 16:50
    Packet Capture Village
  • Remote Access, the APT

    Ian Latter
    Fri, 14:00 - 14:50
    Track Three
  • Remote Exploitation of an Unaltered Passenger Vehicle

    Charlie Miller, Christopher Valasek
    Sat, 14:00 - 14:50
    Track Two
  • REpsych: Psychological Warfare in Reverse Engineering

    Christopher Domas
    Sun, 11:00 - 11:50
    Track Three
  • Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey

    LosT
    Thu, 15:00 - 15:50
    DEF CON 101
  • REvisiting RE:DoS

    Eric Davisson
    Fri, 15:00 - 15:50
    Track Three
  • RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID

    Francis Brown, Shubham Shah
    Sun, 13:00 - 13:50
    DEF CON 101
  • Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion

    Marina Krotofil, Jason Larsen
    Fri, 18:00 - 18:50
    DEF CON 101
  • Rollin’ Down the Street Sniffin’ WiFi, Sippin’ on Pineapple Juice

    Sebastian Kinne, Darren Kitchen
    Fri, 00:00 - 00:00
     
  • S
  • Scared Poopless – LTE and *your* laptop

    Jesse Michael, Mickey Shkatov
    Sat, 10:00 - 10:50
    Track One
  • Secure Messaging for Normal People

    Justin Engler
    Thu, 18:00 - 18:50
    Track Four
  • Security Necromancy: Further Adventures in Mainframe Hacking

    Chad Rikansrud, Philip Young
    Sat, 17:00 - 17:50
    Track Two
  • Security of Wireless Home Automation Systems - A World Beside TCP/IP

    Sebastian Strobi, Tobias Zillner
    Fri, 16:00 - 16:50
    Internet of Things Village
  • Seeing Blue: Tools, Tricks, and Techniques for Messin’ With Bluetooth

    Mike Ryan, Dominic Spill
    Fri, 00:00 - 00:00
     
  • Seeing through the Fog

    Zack Fasel
    Thu, 12:00 - 12:50
    Track Four
  • Separating Bots from the Humans

    Ryan Mitchell
    Fri, 16:30 - 16:55
    Track Four
  • Shall We Play a Game?

    Tamas Szakaly
    Fri, 10:00 - 10:50
    Track One
  • Should we trust crypto frameworks? A story about CVE-2015-2141

    Evgeny Sidorov
    Fri, 00:00 - 00:00
     
  • SIGINT and Blind Signal Analysis with GNU Radio + Advanced SDR

    Balint Seeber
    Fri, 13:00 - 13:50
    Wireless Village
  • Skip, Freak, and Logjam: Moving past a legacy of weakness in TLS

    Karthikeyan Bhargavan
    Fri, 00:00 - 00:00
     
  • Sniffing SCADA

    Karl Koscher
    Fri, 12:00 - 12:50
    Packet Capture Village
  • Social Implications of DNA Acquisition & Storage

    Michael Goetzman
    Fri, 10:25 - 10:50
    BioHacking Village
  • Software Defined Radio Performance Trades and Tweaks

    Michael Calabro
    Fri, 00:00 - 00:00
     
  • Sorry, Wrong Number: Mysteries Of The Phone System - Past and Present

    Patrick McNeil, Owen
    Thu, 16:00 - 16:50
    Track Four
  • Special Presentation

     
    Fri, 14:00 - 14:50
    Internet of Things Village
  • Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simplex Data Service

    Colby Moore
    Sat, 13:00 - 13:50
    Track One
  • Stagefright: Scary Code in the Heart of Android

    Joshua Drake
    Fri, 11:00 - 11:50
    Track One
  • Staying Persistent in Software Defined Networks

    Gregory Pickett
    Sat, 18:00 - 18:50
    Track One
  • Stick That In Your (root)Pipe & Smoke It

    Patrick Wardle
    Sun, 12:00 - 12:50
    Track Three
  • Sup3r S3cr3t!

     
    Fri, 00:00 - 00:00
     
  • Switches Get Stitches

    Colin Cassidy, Robert M. Lee, Éireann Leverett
    Sat, 16:00 - 16:50
    Track One
  • T
  • Tell me who you are and I will tell you your lock pattern

    Marte Løge
    Fri, 16:00 - 16:25
    Track Four
  • The Bieber Project: Ad Tech 101, Fake Fans and Adventures in Buying Internet Traffic

    Mark Ryan Del Moral Talabis
    Sat, 17:00 - 17:50
    DEF CON 101
  • The Death of Privacy

    Stealth
    Fri, 00:00 - 00:00
     
  • The Digital Cockroach Bait Station: How to Build Spam Honeypots

    Robert Simmons
    Fri, 00:00 - 00:00
     
  • The Hand that Rocks the Cradle: Hacking IoT Baby Monitors

    Mark Stanislav
    Fri, 10:00 - 10:50
    Internet of Things Village
  • The Packets Made Me Do It: Getting Started with Distributed Full Packet Capture Using OpenFPC

    Leon Ward
    Fri, 00:00 - 00:00
     
  • The Wireless World of the Internet of Things

    JP Dunning
    Fri, 15:00 - 15:50
    Wireless Village
  • ThunderStrike 2: Sith Strike

    Trammel Hudson, Corey Kallenberg, Xeno Kovah
    Sat, 10:00 - 10:50
    Track Two
  • Tools and Techniques Used at the Wall of Sheep

    Ming Chow
    Fri, 10:00 - 10:50
    Packet Capture Village
  • Tospo Virus: Weaponizing WiFi Pineapple Vulnerabilities

    Catatonic
    Fri, 00:00 - 00:00
     
  • Twitter, ISIL, and Tech

    Tim Newberry
    Fri, 00:00 - 00:00
     
  • U
  • Ubiquity Forensics - Your iCloud and You

    Sarah Edwards
    Sun, 11:00 - 11:50
    DEF CON 101
  • Underhanded Crypto Contest Wrapup

    Adam Caudill, Taylor Hornby
    Fri, 00:00 - 00:00
     
  • Understanding End-User Attacks – Real World Examples

    David Kennedy
    Fri, 00:00 - 00:00
     
  • Understanding Social Engineering Attacks with Natural Language Processing

    Ian Harris
    Fri, 18:00 - 18:50
    Social Engineering Village
  • USB Attack to Decrypt Wi-Fi Communications

    Jeremy Dorrough
    Fri, 12:00 - 12:50
    Track Three
  • Using Privacy and Crypto Tools

    Edmond Rogers, Shane Rogers
    Fri, 11:00 - 11:25
    Crypto and Privacy Village
  • V
  • Violating Web Services

    Ron Taylor
    Fri, 17:00 - 17:50
    Packet Capture Village
  • W
  • Welcome to DEF CON

    LoST, Jeff Moss
    Fri, 10:00 - 10:50
    Track Three
  • What is Bitcoin Tumbling and why do it?

    David Dahl, Sean Thomas Jones
    Fri, 00:00 - 00:00
     
  • When IoT attacks: hacking a Linux-powered rifle

    Michael Auger, Runa A. Sandvik
    Fri, 17:00 - 17:50
    Track One
  • When the Secretary of State says: “Please Stop Hacking Us…”

    David An
    Fri, 16:00 - 16:25
    Track Three
  • Where are the privacy-preserving services for the masses?

    Hadi Asghari
    Fri, 00:00 - 00:00
     
  • Who Will Rule the Sky? The Coming Drone Policy Wars

    Matt Cagle, Eric Cheng
    Sun, 11:00 - 11:50
    Track One
  • WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis

    William Ballenthin, Matthew Graeber, Claudiu Teodorescu
    Sat, 13:00 - 14:50
    Track Three
  • Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts

    Omer Coskun
    Sun, 13:00 - 13:50
    Track Two
  • Wireless Pentesting: So Easy a Cave Man Can Do It

    Cyb3r-Assassin
    Fri, 00:00 - 00:00
     
  • Working together to keep the Internet safe and secure

    Alejandro Mayorkas
    Fri, 10:00 - 10:50
    Track Two
  • Workshop: How Do I TAILS? A Beginner's Guide to Anonymous Computing

    Forrest
    Fri, 00:00 - 00:00
     
  • WPA Enterprise Hacking

    Thomas D’Otreppe, Vivek Ramachandran
    Fri, 11:00 - 11:50
    Wireless Village
  • Y
  • Yellow Means Proceed with Caution - Applied De-escalation for Social Engineering

    Noah Beddome
    Fri, 16:00 - 16:50
    Social Engineering Village