• Thursday, August 4
  • Machine Duping 101: Pwning Deep Learning Systems

    Clarence Chio
    Thu, 10:00 - 10:50
    DEF CON 101
  • Maelstrom - Are You Playing with a Full Deck? : Using a Newly Developed Attack Life Cycle Game to Educate, Demonstrate and Evangelize.

    Shane Steiger
    Thu, 11:00 - 11:50
    DEF CON 101
  • Beyond the MCSE: Red Teaming Active Directory

    Sean Metcalf
    Thu, 12:00 - 12:50
    DEF CON 101
  • Weaponize Your Feature Codes

    Nicholas Rosario
    Thu, 13:00 - 13:50
    DEF CON 101
  • Realtime Bluetooth Device Detection with Blue Hydra

    Granolocks, Zero_Chaos
    Thu, 14:00 - 14:50
    DEF CON 101
  • Hacker Fundamentals and Cutting Through Abstraction

    LosT
    Thu, 15:00 - 15:50
    DEF CON 101
  • DEF CON 101 Panel

    Ryan Clark, CrYpT, HighWiz, Jay Korpi, Nikita Kronenberg, Mike Petruzzi
    Thu, 16:00 - 17:50
    DEF CON 101
  • Friday, August 5
  • BSODomizer HD: A Mischievous FPGA and HDMI Platform for the (M)asses

    Joe Grand, Zoz
    Fri, 10:00 - 10:50
    DEF CON 101
  • Meet the Feds

    Lorrie Cranor, Ed Felten, Jonathan Mayer
    Fri, 11:00 - 11:50
    DEF CON 101
  • 411: A framework for managing security alerts

    Kenneth Lee, Kai Zhong
    Fri, 12:00 - 12:50
    DEF CON 101
  • Sentient Storage - Do SSDs Have a Mind of Their Own?

    Tom Kopchak
    Fri, 13:00 - 13:50
    DEF CON 101
  • Anti-Forensics AF

    int0x80
    Fri, 14:00 - 14:50
    DEF CON 101
  • Eavesdropping on the Machines

    Tim Estell, Katea Murray
    Fri, 15:00 - 15:50
    DEF CON 101
  • 101 Ways to Brick your Hardware

    Joe FitzPatrick, Joe Grand
    Fri, 16:00 - 16:50
    DEF CON 101
  • Malware Command and Control Channels: A journey into darkness

    Brad Woodberg
    Fri, 17:00 - 17:50
    DEF CON 101
  • Saturday, August 6
  • Escaping The Sandbox By Not Breaking It

    Marco Grassi, Qidan He
    Sat, 10:00 - 10:50
    DEF CON 101
  • Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools

    Wesley McGrew
    Sat, 11:00 - 11:50
    DEF CON 101
  • Attacking Network Infrastructure to Generate a 4 Tb/s DDoS for $5

    Luke Young
    Sat, 12:00 - 12:50
    DEF CON 101
  • NG9-1-1: The Next Generation of Emergency Ph0nage

    Trey Forgety, Alex Kreilein
    Sat, 13:00 - 13:50
    DEF CON 101
  • SITCH - Inexpensive, Coordinated GSM Anomaly Detection

    ashmastaflash
    Sat, 14:00 - 14:50
    DEF CON 101
  • Phishing without Failure and Frustration

    Jay Beale, Larry Pesce
    Sat, 15:00 - 15:50
    DEF CON 101
  • A Journey Through Exploit Mitigation Techniques in iOS

    Max Bazaliy
    Sat, 16:00 - 16:25
    DEF CON 101
  • Esoteric Exfiltration

    Willa Cassandra Riggins
    Sat, 16:30 - 16:50
    DEF CON 101
  • Sticky Keys To The Kingdom: Pre-auth RCE Is More Common Than You Think

    Dennis Maldonado, Tim McGuffin
    Sat, 17:00 - 17:25
    DEF CON 101
  • Propaganda and You (and your devices) - How media devices can be used to coerce, and how the same devices can be used to fight back.

    The Bob Ross Fan Club
    Sat, 17:30 - 17:55
    DEF CON 101
  • Sunday, August 7
  • How to get good seats in the security theater? Hacking boarding passes for fun and profit.

    Przemek Jaroszewski
    Sun, 10:00 - 10:50
    DEF CON 101
  • Vulnerabilities 101: How to Launch or Improve Your Vulnerability Research Game

    Steve Christey Coley, Joshua Drake
    Sun, 11:00 - 11:50
    DEF CON 101
  • So You Think You Want To Be a Penetration Tester

    Anch
    Sun, 12:00 - 12:50
    DEF CON 101
  • Mouse Jiggler Offense and Defense

    Dr. Phil
    Sun, 13:00 - 13:50
    DEF CON 101
  • Toxic Proxies - Bypassing HTTPS and VPNs to Pwn Your Online Identity

    Alex Chapman, Paul Stone
    Sun, 14:00 - 14:50
    DEF CON 101
  • Auditing 6LoWPAN Networks using Standard Penetration Testing Tools

    Jonathan-Christofer Demay, Arnaud Lebrun, Adam Reziouk
    Sun, 15:00 - 15:50
    DEF CON 101