Machine Duping 101: Pwning Deep Learning Systems
Maelstrom - Are You Playing with a Full Deck? : Using a Newly Developed Attack Life Cycle Game to Educate, Demonstrate and Evangelize.
Beyond the MCSE: Red Teaming Active Directory
Weaponize Your Feature Codes
Realtime Bluetooth Device Detection with Blue Hydra
Hacker Fundamentals and Cutting Through Abstraction
DEF CON 101 Panel
BSODomizer HD: A Mischievous FPGA and HDMI Platform for the (M)asses
Meet the Feds
411: A framework for managing security alerts
Sentient Storage - Do SSDs Have a Mind of Their Own?
Anti-Forensics AF
Eavesdropping on the Machines
101 Ways to Brick your Hardware
Malware Command and Control Channels: A journey into darkness
Escaping The Sandbox By Not Breaking It
Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools
Attacking Network Infrastructure to Generate a 4 Tb/s DDoS for $5
NG9-1-1: The Next Generation of Emergency Ph0nage
SITCH - Inexpensive, Coordinated GSM Anomaly Detection
Phishing without Failure and Frustration
A Journey Through Exploit Mitigation Techniques in iOS
Esoteric Exfiltration
Sticky Keys To The Kingdom: Pre-auth RCE Is More Common Than You Think
Propaganda and You (and your devices) - How media devices can be used to coerce, and how the same devices can be used to fight back.
How to get good seats in the security theater? Hacking boarding passes for fun and profit.
Vulnerabilities 101: How to Launch or Improve Your Vulnerability Research Game
So You Think You Want To Be a Penetration Tester
Mouse Jiggler Offense and Defense
Toxic Proxies - Bypassing HTTPS and VPNs to Pwn Your Online Identity
Auditing 6LoWPAN Networks using Standard Penetration Testing Tools