• 0
  • 0day for the Soul

    Tarah
    Sat, 15:00 - 15:25
    BioHacking Vilage
  • 0-day Hunting

     
    Sun, 10:00 - 11:00
    IoT Village
  • 1
  • 101 Ways to Brick your Hardware

    Joe FitzPatrick, Joe Grand
    Fri, 16:00 - 16:50
    DEF CON 101
  • 4
  • 411: A framework for managing security alerts

    Kenneth Lee, Kai Zhong
    Fri, 12:00 - 12:50
    DEF CON 101
  • 7
  • 7 Jedi Mind Tricks: Influence Your Target With Out A Word

    Chris Hadnagy
    Fri, 18:00 - 18:55
    Social Engineering Village
  • A
  • Abusing Bleeding Edge Web Standards for AppSec Glory

    Ryan Lester, Bryant Zadegan
    Sat, 17:00 - 17:50
    Track Two
  • (
  • (Ab)using Smart Cities: The Dark Age of Modern Mobility

    Matteo Beccaro, Matteo Collura
    Fri, 13:00 - 13:50
    Track Two
  • A
  • Accessibility: A Creative Solution to Living Without Sight

    Shaf Patel
    Fri, 12:00 - 12:50
    Skytalks
  • Active Incident Response

    brain, xian
    Sun, 12:00 - 12:50
    Skytalks
  • Adding Ramparts to your Bastille: An Introduction to SELinux Hardening

    Jay Beale
    Fri, 13:10 - 14:00
    Packet Hacking Village
  • Ads and Messengers: Exploit Me How You Can

    Ghareeb Saadeldin, Mohamed Saher
    Sun, 14:00 - 14:50
    Skytalks
  • Advanced social engineering techniques and the rise of cyber scams industrial complex

    Fadli B. Sidek
    Sat, 20:00 - 20:55
    Social Engineering Village
  • A Guide to Outsmarting the Machines

    Joseph, nephitejnf
    Fri, 13:00 - 13:50
    Skytalks
  • A Journey Through Exploit Mitigation Techniques in iOS

    Max Bazaliy
    Sat, 16:00 - 16:25
    DEF CON 101
  • All Your Solar Panels are Belong to Me

    Fred Bret-Mounet
    Sat, 16:30 - 16:55
    Track Two
  • A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors

    Francois Charbonneau, Ang Cui, Jatin Kataria
    Fri, 14:00 - 14:50
    Track Two
  • .
  • ....and bad mistakes I've made a few....

    Jayson E. Street
    Sat, 17:00 - 17:55
    Social Engineering Village
  • A
  • An Introduction to Pinworm: Man in the Middle for your Metadata

    bigezy, saci
    Sun, 14:00 - 14:50
    Track Two
  • An Introduction To Pulling Software From Flash via I2C, SPI and JTAG

     
    Sat, 12:00 - 13:00
    Hardware Hacking Village
  • Anti-Forensics AF

    int0x80
    Fri, 14:00 - 14:50
    DEF CON 101
  • Art of Espionage (v.303)

    Lizzie Borden, Pyr0
    Sat, 12:00 - 12:50
    Skytalks
  • Ask the EFF

    Nate Cardozo, Andrew Crocker, Eva Galperin, Dr. Jeremy Giliula, Kurt Opsahl, Katitza Rodriguez
    Sat, 16:30 - 16:55
    Track Three
  • Attacking BaseStations - an Odyssey through a Telco's Network

    Brian Butterly, Hendrik Schmidt
    Sun, 12:00 - 12:50
    Track One
  • Attacking EMR (Electronic Health Records) - Using HL7 and DICOM to Hack Critical Infrastructure

    Michael Hudson
    Sat, 11:00 - 11:25
    BioHacking Vilage
  • Attacking Network Infrastructure to Generate a 4 Tb/s DDoS for $5

    Luke Young
    Sat, 12:00 - 12:50
    DEF CON 101
  • Attacks on Enterprise Social Media

    Michael Raggo
    Sat, 14:10 - 15:00
    Packet Hacking Village
  • Attention Hackers: Cannabis Needs Your Help!

    Michael Zaytsev
    Sun, 13:00 - 13:25
    BioHacking Vilage
  • Auditing 6LoWPAN Networks using Standard Penetration Testing Tools

    Jonathan-Christofer Demay, Arnaud Lebrun, Adam Reziouk
    Sun, 15:00 - 15:50
    DEF CON 101
  • Automated DNS Data Exfiltration and Mitigation

    Nolan Berry, Towne Besel
    Fri, 10:00 - 10:50
    Skytalks
  • Automated Dorking for Fun and Profit^WSalary

    Filip Reesalu
    Fri, 16:10 - 17:00
    Packet Hacking Village
  • B
  • Backdooring Cryptocurrencies: The Underhanded Crypto Contest Winners

    Adam Caudill, Taylor Hornby
    Sun, 12:30 - 13:00
    Crypto and Privacy Village
  • Backdooring the Frontdoor

    Jmaxxz
    Sun, 13:00 - 13:50
    Track Three
  • Beyond the MCSE: Red Teaming Active Directory

    Sean Metcalf
    Thu, 12:00 - 12:50
    DEF CON 101
  • BioHacking and Mortal Limitations

    Vlad Gostomelsky, Dr. Stan Naydin
    Fri, 18:00 - 18:50
    BioHacking Vilage
  • Biohacking for National Security

    Doug Weber, Dr. Renee Wegzyn
    Fri, 12:00 - 12:25
    BioHacking Vilage
  • Biosafety for the Home Enthusiast

    Mr_Br!ml3y
    Fri, 11:00 - 11:25
    BioHacking Vilage
  • Blinded by the Light

     
    Sat, 15:00 - 15:50
    Wireless Village
  • Blockfighting with a Hooker -- BlockfFghter2!

    K2
    Fri, 12:00 - 12:50
    Track Two
  • Breaking Bad Crypto: BB'06 [WORKSHOP]

    Filippo Valsorda
    Sat, 13:30 - 15:00
    Crypto and Privacy Village
  • Breaking Payment Points of Interaction

    Nir Valtman, Patrick Watson
    Fri, 15:00 - 15:50
    Skytalks
  • Breaking the Internet of Vibrating Things : What We Learned Reverse Engineering Bluetooth- and Internet-Enabled Adult Toys

    follower, goldfisk
    Fri, 16:00 - 16:25
    Track Three
  • BSODomizer HD: A Mischievous FPGA and HDMI Platform for the (M)asses

    Joe Grand, Zoz
    Fri, 10:00 - 10:50
    DEF CON 101
  • BtleJuice: the Bluetooth Smart Man In The Middle Framework

     
    Fri, 15:00 - 15:50
    Village Talks
  • Building a Local Passive DNS Tool for Threat Intelligence Research

    Kathy Wang
    Sun, 11:10 - 12:00
    Packet Hacking Village
  • Building malicious hardware out of analog circuits

     
    Fri, 12:00 - 13:00
    Hardware Hacking Village
  • Bypassing Captive Portals and Limited Networks

    Grant Bugher
    Sat, 12:00 - 12:25
    Track One
  • C
  • CAN i haz car secret plz?

    Ferdinand Noelscher, Javier Vazquez Vidal
    Fri, 12:00 - 12:25
    Track Three
  • CANSPY: A Framework for Auditing CAN Devices

    Jonathan-Christofer Demay, Arnaud Lebrun
    Sat, 12:00 - 12:50
    Track Three
  • Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-driving Vehicle

    Jianhao Liu, Wenyuan Xu, Chen Yan
    Sun, 13:00 - 13:50
    Track One
  • Cheap Tools for Hacking Heavy Trucks

    Haystack, Six_Volts
    Fri, 12:30 - 12:55
    Track Three
  • Closing Ceremonies

    Dark Tangent
    Sun, 16:30 - 17:50
    Track One
  • Code breaking - Catching a cheat

    Nezer Zaidenberg
    Sat, 12:00 - 12:50
    Village Talks
  • Compelled Decryption - State of the Art in Doctrinal Perversions

    Ladar Levison
    Fri, 11:00 - 11:50
    Track One
  • Connections: Eisenhower and the Internet

    Damon Small
    Fri, 15:10 - 16:00
    Packet Hacking Village
  • Crawling for APIs

    Ryan Mitchell
    Fri, 18:10 - 19:00
    Packet Hacking Village
  • CRISPR/Cas9: Newest Tools for Biohacking fun

    Dr. Thomas P. Keenan
    Sun, 10:30 - 10:55
    BioHacking Vilage
  • Crypto for Criminals - The OPSEC Concerns in Using Cryptography

    John Bambenek
    Sun, 12:00 - 12:30
    Crypto and Privacy Village
  • Crypto: State of the Law

    Nate Cardozo
    Sat, 17:00 - 17:50
    Track Three
  • Cunning with CNG: Soliciting Secrets from Schannel

    Jake Kambic
    Sat, 13:00 - 13:50
    Track Three
  • Cyber Grand Shellphish

    Antonio Bianchi, Kevin Borgolte, Jacopo Corbetta, Francesco Disperati, Andrew Dutcher, Aravind Machiry, Chris Salls, Yan Shoshitaishvili, Nick Stephens, Giovanni Vigna, Fish Wang
    Sun, 15:00 - 15:50
    Track Two
  • '
  • 'Cyber' Who Done It?! Attribution Analysis Through Arrest History

    Jake Kouns
    Sat, 16:00 - 16:50
    Track One
  • D
  • DARPA Cyber Grand Challenge Award Ceremony

    Dr. Arati Prabhakar, Mike Walker
    Fri, 10:00 - 10:50
    Track Two
  • Deceive and Succeed: Measuring the Efficiency of a Deception Eco-System in Post-Breach Detection

    Omer Zohar
    Fri, 12:10 - 13:00
    Packet Hacking Village
  • Deep Learning on CAN BUS

     
    Sat, 18:00 - 18:50
    Car Hacking Village
  • DEF CON 101 Panel

    Ryan Clark, CrYpT, HighWiz, Jay Korpi, Nikita Kronenberg, Mike Petruzzi
    Thu, 16:00 - 17:50
    DEF CON 101
  • DEF CON Welcome & Badge Talk

    LoST, Dark Tangent
    Fri, 11:00 - 11:50
    Track Three
  • Detecting and Finding Rogue Access Points

     
    Fri, 14:00 - 14:50
    Wireless Village
  • Developing Managed Code Rootkits for the Java Runtime Environment

    Benjamin Holland
    Sat, 10:00 - 10:50
    Track Three
  • Direct Memory Attack the Kernel

    Ulf Frisk
    Fri, 14:00 - 14:50
    Track Three
  • Discovering and Triangulating Rogue Cell Towers

    Eric Escobar
    Sun, 11:00 - 11:50
    Track Two
  • DIY Nukeproofing: A New Dig at 'Datamining'

    3AlarmLampScooter
    Sat, 16:00 - 16:25
    Track Two
  • DNS Greylisting for Phun and Phishing Prevention

    Munin
    Fri, 11:00 - 11:50
    Skytalks
  • Does Cultural differences become a barrier for social engineering?

    Tomohisa Ishikawa
    Fri, 16:00 - 16:55
    Social Engineering Village
  • Drone Hijacking and other IoT hacking with GNU Radio and XTRX SDR

     
    Sat, 13:00 - 13:50
    Wireless Village
  • Drone Security Advisory: Hacking Popular Drones

     
    Sat, 14:00 - 15:00
    IoT Village
  • Drones Hijacking - multi-dimensional attack vectors and countermeasures

    Aaron Luo
    Sun, 13:00 - 13:50
    Track Two
  • Drunk Hacker History: Hacker Stories Powered by C2H6O for Fun & Profit

     
    Sat, 17:00 - 17:50
    Track One
  • Dynamic Population Discovery for Lateral Movement Detection (Using Machine Learning)

    Rod Soto, Joseph Zadeh
    Sat, 15:10 - 16:00
    Packet Hacking Village
  • E
  • EagleCAD Basics

     
    Sun, 12:00 - 13:00
    Hardware Hacking Village
  • Eavesdropping on the Machines

    Tim Estell, Katea Murray
    Fri, 15:00 - 15:50
    DEF CON 101
  • EFF - Ask the EFF: The Year in Digital Civil Liberties

    Nate Cardozo, Andrew Crocker, Eva Galperin, Dr. Jeremy Giliula, Kurt Opsahl, Katitza Rodriguez
    Sat, 15:00 - 16:00
    Crypto and Privacy Village
  • Escaping The Sandbox By Not Breaking It

    Marco Grassi, Qidan He
    Sat, 10:00 - 10:50
    DEF CON 101
  • Esoteric Exfiltration

    Willa Cassandra Riggins
    Sat, 16:30 - 16:50
    DEF CON 101
  • Ethical Challenges & Responsibilities of Biohackers and Artists

    John Sundman
    Sat, 13:30 - 13:55
    BioHacking Vilage
  • Evil ESP

     
    Sat, 11:00 - 11:50
    Wireless Village
  • Examining the Internet's pollution

    Karyn Benson
    Sun, 10:00 - 10:50
    Track Three
  • Exploiting and Attacking Seismological Networks... Remotely

    Bertin Bervis Bonilla, James Jara
    Sat, 15:00 - 15:50
    Track Three
  • Exploiting a Smart Fridge: a Case Study in Kinetic Cyber

     
    Fri, 10:10 - 11:20
    IoT Village
  • F
  • Fancy Dancy Implanty

    Amal Graafstra
    Fri, 10:30 - 10:55
    BioHacking Vilage
  • FCC 5G/IoT Security Policy Objectives

     
    Fri, 12:10 - 13:30
    IoT Village
  • Feds and 0Days: From Before Heartbleed to After FBI-Apple

    Jason Healey
    Fri, 10:00 - 10:50
    Track One
  • Fiddler on the Roof: A No-Nonsense Look at Fiddler and Its Usage

    Morgan Gangwere
    Sat, 18:10 - 19:00
    Packet Hacking Village
  • Financial Crime: Past, Present, and Future

    Marcello Mansur
    Fri, 14:00 - 14:50
    Skytalks
  • Flavor-Tripping: a Whole New Way to Taste!

    Alan
    Fri, 12:30 - 12:55
    BioHacking Vilage
  • Forcing a Targeted LTE Cellphone into an Unsafe Network

    Haoqi Shan, Wanqiao Zhang
    Sat, 15:00 - 15:50
    Track One
  • Front Door Nightmare

    obiwan666
    Sun, 11:00 - 11:50
    Skytalks
  • Frontrunning the Frontrunners

    Paul Vixie
    Fri, 12:30 - 12:55
    Track One
  • Future Grind

    Ryan O'Shea
    Fri, 10:00 - 10:25
    BioHacking Vilage
  • Fuzzing For Humans: Real Fuzzing in the Real World

    Joshua Pereyda
    Sat, 16:10 - 17:00
    Packet Hacking Village
  • G
  • Game over, man! – Reversing Video Games to Create an Unbeatable AI Player

    Dan Petro
    Sun, 12:00 - 12:50
    Track Three
  • Getting Started with Cryptography in Python [WORKSHOP]

    Amirali Sanatinia
    Fri, 16:00 - 17:30
    Crypto and Privacy Village
  • God is a Human II - Artificial Intelligence and the Nature of Reality

    Cassiopiea
    Sat, 11:00 - 11:50
    Skytalks
  • H
  • Hacker Fundamentals and Cutting Through Abstraction

    LosT
    Thu, 15:00 - 15:50
    DEF CON 101
  • Hacker-Machine Interface - State of the Union for SCADA HMI Vulnerabilities

    Brian Gorenc, Fritz Sands
    Sat, 14:00 - 14:50
    Track Three
  • Hacking Hotel Keys and Point of Sale Systems: Attacking Systems Using Magnetic Secure Transmission

    Weston Hecker
    Sun, 10:00 - 10:50
    Track Two
  • Hacking Next-Gen ATM's From Capture to Cashout

    Weston Hecker
    Fri, 17:00 - 17:50
    Track One
  • Hacking Sensory Perception

    Scott Novich
    Sun, 11:00 - 11:25
    BioHacking Vilage
  • Hacking the CHV Badge / Using Yard Stick One for FOB Fun

     
    Fri, 12:00 - 12:50
    Car Hacking Village
  • Handing Full Control of the Radio Spectrum Over to the Machines

     
    Fri, 12:30 - 12:50
    Wireless Village
  • Heavy Duty Networks vs Light Duty

     
    Sun, 10:00 - 10:50
    Car Hacking Village
  • Help, I've got ANTs!!!

    Tamas Szakaly
    Sun, 14:00 - 14:50
    Track One
  • Hiding Wookiees in HTTP - HTTP smuggling is a thing we should know better and care about

    regilero
    Sun, 11:00 - 11:50
    Track One
  • Highlights from the Matasano Challenges [WORKSHOP]

    Matt Cheung
    Sat, 16:00 - 18:00
    Crypto and Privacy Village
  • Homologation - Friend or Frenemy?

    Headless Chook, Shane Kemper
    Sun, 13:00 - 13:50
    Skytalks
  • Honey Onions: Exposing Snooping Tor HSDir Relays

    Guevara Noubir, Amirali Sanatinia
    Fri, 12:00 - 12:25
    Track One
  • Hot Wheels: Hacking Electronic Wheelchairs

     
    Sat, 10:10 - 11:10
    IoT Village
  • How Do I "BLE Hacking"?

     
    Fri, 12:00 - 12:20
    Wireless Village
  • How the Smart-City becomes Stupid

     
    Sat, 12:10 - 13:10
    IoT Village
  • How to backdoor Diffie-Hellman

    David Wong
    Fri, 19:00 - 19:50
    Village Talks
  • How to Design Distributed Systems Resilient Despite Malicious Participants

    Radia Perlman
    Fri, 14:00 - 14:50
    Track One
  • How to Do it Wrong: Smartphone Antivirus and Security Applications Under Fire

    Stephan Huber, Siegfried Rasthofer
    Sun, 10:00 - 10:50
    Track One
  • How to Find 1,352 WordPress XSS Plugin Vulnerabilities in 1 Hour (not really)

    Larry W. Cashdollar
    Sat, 11:10 - 12:00
    Packet Hacking Village
  • How to get good seats in the security theater? Hacking boarding passes for fun and profit.

    Przemek Jaroszewski
    Sun, 10:00 - 10:50
    DEF CON 101
  • How to Make Your Own DEF CON Black Badge

    Joe FitzPatrick, Michael Leibowitz, Kenny McElroy, Jesse Michael, Dean Pierce, Mickey Shkatov
    Fri, 13:00 - 13:50
    Track Three
  • How to Overthrow a Government

    Chris Rock
    Sat, 10:00 - 10:50
    Track One
  • How to Remote Control an Airliner: SecurityFLawsin Avionics

    Sebastian Westerhold
    Fri, 15:00 - 15:50
    Track One
  • How to Un-Work your job: Revolutions, Radicals and Engineering by Committee

    Steven Zani
    Sat, 19:00 - 19:55
    Social Engineering Village
  • HTTP/2 & QUIC: Teaching Good Protocols To Do Bad Things

    Catherine Pearce, Carl Vincent
    Sat, 12:10 - 13:00
    Packet Hacking Village
  • Human Hacking: You ARE the weakest link.

    Bethany Ward, Cyni Winegard
    Sat, 16:00 - 16:55
    Social Engineering Village
  • I
  • I Amateur Radio (And So Can You!)

     
    Fri, 18:00 - 18:50
    Wireless Village
  • I Fight For The Users, Episode I - Attacks Against Top Consumer Products

    Zack Fasel, Erin Jacobs
    Sat, 10:00 - 10:50
    Track Two
  • Imagine a Beowulf cluster of Pineapples!

     
    Sat, 17:00 - 17:50
    Wireless Village
  • Implants

    Amal Graafstra
    Fri, 11:30 - 11:55
    BioHacking Vilage
  • Implants (2)

    Amal Graafstra
    Sat, 11:30 - 11:55
    BioHacking Vilage
  • Implants (3)

    Amal Graafstra
    Sun, 11:30 - 11:55
    BioHacking Vilage
  • Incident Code Name: When SkyFalls A Shaken, Not Stirred, James Bond Tale on Incident Response

    Plug
    Sun, 13:10 - 14:00
    Packet Hacking Village
  • Instegogram: Exploiting Instagram for C2 via Image Steganography

    Hyrum Anderson, Daniel Grant, Amanda Rousseau
    Fri, 15:00 - 15:30
    Crypto and Privacy Village
  • Insteon, Inste-off, Inste-open?

     
    Sat, 12:30 - 12:50
    Wireless Village
  • Internet of Thieves (or DIY Persistence)

     
    Sat, 15:30 - 16:30
    IoT Village
  • Introducing Man In The Contacts attack to trick encrypted messaging apps

    Jérémy Matos
    Fri, 15:30 - 16:00
    Crypto and Privacy Village
  • Introducing the HackMeRF

     
    Fri, 13:00 - 15:50
    Wireless Village
  • Introduction the Wichcraft Compiler Collection : Towards Universal Code Theft

    Jonathan Brossard
    Fri, 10:00 - 10:50
    Track Three
  • Intro to Brain Based Authentication

    Melanie Segado, Sydney Swaine-Simon
    Sat, 17:00 - 17:25
    BioHacking Vilage
  • IoT Defenses - Software, Hardware, Wireless and Cloud

     
    Sun, 11:00 - 12:00
    Village Talks
  • Is Your Internet Light On? Protecting Consumers in the Age of Connected Everything

     
    Fri, 16:00 - 16:50
    Village Talks
  • It's Just Software, Right?

     
    Sat, 14:30 - 14:50
    Wireless Village
  • I've got 99 Problems, but Little Snitch ain't one

    Patrick Wardle
    Sat, 16:00 - 16:25
    Track Three
  • J
  • Jittery MacGyver: Lessons Learned from Building a Bionic Hand out of a Coffee Maker

    Evan Booth
    Sat, 11:00 - 11:50
    Track One
  • JWTs in a flash!

    Evan Johnson
    Sat, 11:00 - 11:30
    Crypto and Privacy Village
  • K
  • Kickin' It Old Skool: SDR for Ye Olde Signals

     
    Fri, 16:00 - 17:50
    Wireless Village
  • L
  • Lessons from the Hacking of Ashley Madison

    Per Thorsheim
    Fri, 14:00 - 15:00
    Crypto and Privacy Village
  • Let’s Get Physical: Network Attacks Against Physical Security Systems

    Ricky Lawshae
    Sun, 12:00 - 12:50
    Track Two
  • Lie to Me - LIE TO THEM - Chronicles of "How to save $ at the Strip Club"

    Buckaroo, Steve Pordon
    Fri, 17:00 - 17:50
    Skytalks
  • Light-Weight Protocol! Serious Equipment! Critical Implications!

    Neal Hindocha, Lucas Lundgren
    Sat, 11:00 - 11:50
    Track Two
  • Live Drone RF Reverse Engineering

     
    Fri, 17:00 - 18:00
    IoT Village
  • LTE and Its Collective Insecurity

    Chuck McAuley, Chris Moore
    Sun, 12:10 - 13:00
    Packet Hacking Village
  • M
  • Machine Duping 101: Pwning Deep Learning Systems

    Clarence Chio
    Thu, 10:00 - 10:50
    DEF CON 101
  • Maelstrom - Are You Playing with a Full Deck? : Using a Newly Developed Attack Life Cycle Game to Educate, Demonstrate and Evangelize.

    Shane Steiger
    Thu, 11:00 - 11:50
    DEF CON 101
  • Make Your Own Brain Stimulation Device

    Melanie Segado, Sydney Swaine-Simon
    Sat, 17:30 - 17:55
    BioHacking Vilage
  • Malware Command and Control Channels: A journey into darkness

    Brad Woodberg
    Fri, 17:00 - 17:50
    DEF CON 101
  • Managing Digital Codesigning Identities in an Engineering Company

    Evgeny Sidorov, Eldar Zaitov
    Sun, 11:30 - 12:00
    Crypto and Privacy Village
  • Meet the Feds

    Lorrie Cranor, Ed Felten, Jonathan Mayer
    Fri, 11:00 - 11:50
    DEF CON 101
  • Mining VirusTotal for Operational Data and Applying a Quality Control On It

    Gita Ziabari
    Sat, 17:10 - 18:00
    Packet Hacking Village
  • MouseJack: Injecting Keystrokes into Wireless Mice

    Marc Newlin
    Sat, 13:00 - 13:50
    Track Two
  • Mouse Jiggler Offense and Defense

    Dr. Phil
    Sun, 13:00 - 13:50
    DEF CON 101
  • MR. ROBOT Panel

    Kor Adana, Marc Rogers, Dark Tangent
    Fri, 16:30 - 17:50
    Track Three
  • Multi-channel Wardriving Tools for IEEE 802.15.4 and Beyond

     
    Sat, 16:00 - 16:30
    Wireless Village
  • My Usability Goes to 11": A Hacker's Guide to User Experience Research

    Greg Norcie
    Sun, 12:00 - 13:00
    Village Talks
  • N
  • NG9-1-1: The Next Generation of Emergency Ph0nage

    Trey Forgety, Alex Kreilein
    Sat, 13:00 - 13:50
    DEF CON 101
  • Nootropics: Better Living Through Chemistry or Modern-Day Prometheus

    GingerBread Man
    Sun, 13:30 - 13:55
    BioHacking Vilage
  • Now You See Me, Now You Don't

    Aamir Lakhani, Joseph Muniz
    Sat, 13:10 - 14:00
    Packet Hacking Village
  • O
  • Oops, I Cracked My PANs

    qu0rum
    Sat, 10:30 - 11:00
    Crypto and Privacy Village
  • Oops! I made a machine gun: The Progressive Lowering of the Barrier to Entry in Firearms Manufacturing

    Gingerbread
    Sat, 16:00 - 16:50
    Skytalks
  • Open House - Key Signing Party & Lightning Talks

     
    Sat, 12:30 - 13:30
    Crypto and Privacy Village
  • Overview and Evolution of Password-Based Authentication Schemes

    Ignat Korchagin
    Sat, 12:00 - 12:30
    Crypto and Privacy Village
  • P
  • Panel - Oldtimers vs Noobz

     
    Sat, 13:00 - 13:50
    Skytalks
  • Phishing without Failure and Frustration

    Jay Beale, Larry Pesce
    Sat, 15:00 - 15:50
    DEF CON 101
  • Picking Bluetooth Low Energy Locks from a Quarter Mile Away

    Ben Ramsey, Anthony Rose
    Fri, 14:00 - 15:00
    IoT Village
  • Picking Bluetooth Low Energy Locks from a Quarter Mile Away

    Ben Ramsey, Anthony Rose
    Sat, 11:00 - 11:50
    Track Three
  • pin2pwn: How to Root an Embedded Linux Box with a Sewing Needle

    Brad Dixon
    Sat, 12:30 - 12:55
    Track Two
  • Platform agnostic kernel fuzzing

    Georgi Geshev, James Loureiro
    Sun, 15:00 - 15:50
    Track Three
  • Playing Through the Pain? - The Impact of Secrets and Dark Knowledge on Security and Intelligence Professionals

    Richard Thieme
    Sat, 15:00 - 15:50
    Track Two
  • Practical Penetration Testing of Embedded Devices

    James Edge
    Sat, 14:00 - 14:50
    Skytalks
  • Practical Text-Based Steganography: Exfiltrating Data from Secure Networks and Socially Engineering SecOps Analysts [WORKSHOP]

    Joe Gervais
    Fri, 12:00 - 13:00
    Crypto and Privacy Village
  • Presenting Security Metrics to the Board / Leadership

    Walt Williams
    Fri, 11:10 - 12:00
    Packet Hacking Village
  • privacy by design - it's n0t that difficult

    Petri Koivisto
    Fri, 17:30 - 18:00
    Crypto and Privacy Village
  • Project CITL

    Peiter Zatko, Sarah Zatko
    Fri, 11:00 - 11:50
    Track Two
  • Propaganda and You (and your devices) - How media devices can be used to coerce, and how the same devices can be used to fight back.

    The Bob Ross Fan Club
    Sat, 17:30 - 17:55
    DEF CON 101
  • R
  • Realtime Bluetooth Device Detection with Blue Hydra

    Granolocks, Zero_Chaos
    Thu, 14:00 - 14:50
    DEF CON 101
  • Research on the Machines: Help the FTC Protect Privacy & Security

    Lorrie Cranor, Terrell McSweeny
    Fri, 13:00 - 13:50
    Track One
  • Retweet to Win: How 50 lines of Python made me the luckiest guy on Twitter

    Hunter Scott
    Sat, 12:30 - 12:55
    Track One
  • Reverse engineering biological research equipment for fun and open science

    Joel Dapello, Charles Fracchia
    Sat, 12:30 - 12:55
    BioHacking Vilage
  • Reversing and Exploiting Embedded Devices

     
    Sat, 15:00 - 15:50
    Village Talks
  • Reversing LoRa: Deconstructing a Next-Gen Proprietary LPWAN

     
    Fri, 11:00 - 11:50
    Wireless Village
  • Revocation, the Frailty of PKI

    Trey Blalock, Mat Caughron
    Fri, 17:00 - 17:50
    Village Talks
  • Rise of the Lovetron9000

    Rich Lee
    Fri, 15:00 - 15:50
    BioHacking Vilage
  • Robot Hacks Video Games: How TASBot Exploits Consoles with Custom Controllers

    Allan Cecil
    Fri, 16:00 - 16:50
    Track One
  • S
  • Saflok or Unsaflok, That is the Question

    Cell Wizard
    Sat, 09:00 - 09:50
    Skytalks
  • Samsung Pay: Tokenized Numbers, Flaws and Issues

    Salvador Mendoza
    Fri, 16:30 - 16:55
    Track Two
  • SCAM CALL – Call Dropped

    Mattias Borg
    Sat, 18:00 - 18:55
    Social Engineering Village
  • Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools

    Wesley McGrew
    Sat, 11:00 - 11:50
    DEF CON 101
  • Security Flaws in Automotive Immobilizer

     
    Sat, 19:00 - 19:50
    Car Hacking Village
  • Security Logs Aren't Enough: Logging for User Data Protection

    Alisha Kloc
    Fri, 18:00 - 18:50
    Village Talks
  • Sense & Avoid: Some laws to know before you break IoT

     
    Fri, 13:00 - 13:50
    Village Talks
  • Sentient Storage - Do SSDs Have a Mind of Their Own?

    Tom Kopchak
    Fri, 13:00 - 13:50
    DEF CON 101
  • Side-channel Attacks on High-security Electronic Safe Locks

    Plore
    Fri, 16:00 - 16:25
    Track Two
  • Silicon Valley Asks DC About Freedom, Crypto, & the Cybers

    Rep. Will Hurd, Alex Stamos, Rep. Eric Swalwell
    Sat, 10:00 - 10:50
    Village Talks
  • SITCH - Inexpensive, Coordinated GSM Anomaly Detection

    ashmastaflash
    Sat, 14:00 - 14:50
    DEF CON 101
  • Six Degrees of Domain Admin - Using Graph Theory to Accelerate Red Team Operations

    Andy Robbins, Will Schroeder, Rohan Vazarkar
    Sat, 13:00 - 13:50
    Track One
  • Sk3wlDbg: Emulating All (well many) of the Things with Ida

    Chris Eagle
    Fri, 17:00 - 17:50
    Track Two
  • Slack as Intelligence Collector or "how anime cons get weird"

    Rick Glass
    Fri, 18:00 - 18:50
    Skytalks
  • Slaying Rogue Access Points with Python and Cheap Hardware

     
    Sat, 12:00 - 12:50
    Wireless Village
  • Slouching Towards Utopia: The State of the Internet Dream

    Jennifer Granick
    Fri, 15:00 - 15:50
    Track Two
  • SNMP and IoT Devices: Let me Manage that for you Bro!

     
    Sat, 13:00 - 13:50
    Village Talks
  • So You Think You Want To Be a Penetration Tester

    Anch
    Sun, 12:00 - 12:50
    DEF CON 101
  • SSL Visibility, Uncovered

    Andrew Brandt
    Sat, 11:00 - 11:50
    Village Talks
  • Stargate: Pivoting Through VNC to Own Internal Networks

    Yonathan Klijnsma, Dan Tentler
    Sat, 12:00 - 12:25
    Track Two
  • State of the Curve: 2016

    Deirdre Connolly
    Fri, 18:00 - 18:30
    Crypto and Privacy Village
  • Sticky Keys To The Kingdom: Pre-auth RCE Is More Common Than You Think

    Dennis Maldonado, Tim McGuffin
    Sat, 17:00 - 17:25
    DEF CON 101
  • Stumping the Mobile Chipset

    Adam Donenfeld
    Sun, 15:00 - 15:50
    Track One
  • T
  • Tabletop Cryptography

    nibb13
    Fri, 10:30 - 11:00
    Crypto and Privacy Village
  • Taking Down Skynet (By Subverting the Command and Control Channel)

    Phax
    Sat, 18:00 - 18:50
    Skytalks
  • Tales from the Dongosphere: Lessons Learned Hosting Public Email for 4chan

    Vincent Canfield
    Sat, 15:00 - 15:50
    Skytalks
  • TBA

     
    Fri, 11:30 - 12:00
    IoT Village
  • TBD

     
    Fri, 16:00 - 17:00
    Hardware Hacking Village
  • The Bioethics of BioHacking

    Christian Dameff
    Sat, 15:30 - 15:55
    BioHacking Vilage
  • The Covert Cupid Under .11 Veil !!! /* Approach for Covert WIFI */

     
    Fri, 15:00 - 15:30
    Wireless Village
  • The Era of Bio Big Data: Benefits and Challenges for Information Security, Health, the Economy, and National Security

    Edward You
    Sat, 16:00 - 16:25
    BioHacking Vilage
  • The Live SEPodcast

     
    Sun, 10:00 - 12:00
    Social Engineering Village
  • The Mitsubishi Hack Explained

     
    Fri, 11:00 - 11:50
    Car Hacking Village
  • The New White Hat Hacking: Computational Biology for the Good of Mankind

    Candice Schumann, Rock Stevens
    Sat, 12:00 - 12:25
    BioHacking Vilage
  • The Next Big Thing in Bioterrorism

    Dr. Victoria Sutton
    Sat, 16:30 - 16:55
    BioHacking Vilage
  • The next John Moses Browning will use GitHub

    Karl Kasarda, Iam McCollum
    Sat, 17:00 - 17:50
    Skytalks
  • The Other Way to Get a Hairy Hand; or, Contracts for Hackers

    Brendan O’Connor
    Sun, 10:00 - 10:50
    Skytalks
  • The Remote Metamorphic Engine: Detecting, Evading, Attacking the AI and Reverse Engineering

    Amro Abdelgawad
    Fri, 15:00 - 15:50
    Track Three
  • Thermostat Randomware and Workshop

     
    Sat, 17:00 - 18:00
    IoT Village
  • The State of HTTPS: Securing Web Traffic Is Not What It Used to Be

    J0N J4RV1S
    Sat, 11:30 - 12:00
    Crypto and Privacy Village
  • The Trials & Tribulations of an Infosec Pro in the Government Sector

    grecs
    Fri, 09:00 - 09:50
    Skytalks
  • The Wizard of Oz – Painting a reality through deception

    David Kennedy
    Fri, 17:00 - 17:55
    Social Engineering Village
  • This Year in Crypto & Privacy

     
    Fri, 11:00 - 12:00
    Crypto and Privacy Village
  • To Beat the Toaster, We Must Become the Toaster: How to Show A.I. Who's Boss in the Robot Apocalypse

    Jen, Darren
    Sat, 10:00 - 10:50
    Skytalks
  • To Beat the Toaster, You Must Become the Toaster: How to Show AI Who's Boss in the Robot Apocalypse

    Darren Lawless, Jennifer Szkatulski
    Fri, 16:00 - 16:50
    BioHacking Vilage
  • To Catch An APT: YARA

    Jay DiMartino
    Sat, 10:10 - 11:00
    Packet Hacking Village
  • Toxic Proxies - Bypassing HTTPS and VPNs to Pwn Your Online Identity

    Alex Chapman, Paul Stone
    Sun, 14:00 - 14:50
    DEF CON 101
  • Tranewreck

     
    Sat, 16:00 - 16:50
    Village Talks
  • U
  • Universal Serial aBUSe: Remote Physical Access Attacks

    Rogan Dawes, Dominic White
    Sat, 14:00 - 14:50
    Track Two
  • Use JTAG tools to get root on a Raspberry Pi

     
    Fri, 10:00 - 12:00
    Hardware Hacking Village
  • Use JTAG tools to get root on a Raspberry Pi (2)

     
    Sat, 15:00 - 17:00
    Hardware Hacking Village
  • Use Their Machines Against Them: Loading Code with a Copier

    Mike
    Sun, 11:00 - 11:50
    Track Three
  • US Interrogation Techniques and Social Engineering

    Robert Anderson
    Fri, 19:00 - 19:55
    Social Engineering Village
  • V
  • V2V communications an introduction

     
    Sat, 17:00 - 17:50
    Car Hacking Village
  • Vehicle-to-Infrastructure (V2X)

     
    Fri, 10:00 - 10:50
    Car Hacking Village
  • Verifying IPS Coverage Claims: Here's How

    Garett Montgomery
    Fri, 17:10 - 18:00
    Packet Hacking Village
  • Video Games Can Teach Science: ScienceGameCenter.org

    Melanie Stegman, Ph.D.
    Fri, 17:00 - 17:50
    BioHacking Vilage
  • VLAN hopping, ARP Poisoning and Man-In-The-Middle Attacks in Virtualized Environments

    Ronny L. Bull, Dr. Jeanna N. Matthews, Ms. Kaitlin A. Trumbull
    Sun, 14:00 - 14:50
    Track Three
  • Vulnerabilities 101: How to Launch or Improve Your Vulnerability Research Game

    Steve Christey Coley, Joshua Drake
    Sun, 11:00 - 11:50
    DEF CON 101
  • W
  • WCTF Day 2 Kickoff

     
    Sat, 10:00 - 10:50
    Wireless Village
  • Weaponize Your Feature Codes

    Nicholas Rosario
    Thu, 13:00 - 13:50
    DEF CON 101
  • Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter

    John Seymour, Philip Tully
    Sat, 14:00 - 14:50
    Track One
  • What's Lurking Inside MP3 Files That Can Hurt You?

    Michael Raggo
    Sun, 09:00 - 09:50
    Skytalks
  • When Privacy Goes Poof! Why It's Gone and Never Coming Back

    Richard Thieme
    Fri, 13:00 - 14:00
    Crypto and Privacy Village
  • Why Snowden's Leaks Were Inevitable

    Jake Williams
    Fri, 16:00 - 16:50
    Skytalks
  • Wireless Capture the Flag

     
    Sun, 12:00 - 12:50
    Wireless Village
  • Wireless Capture the Flag Inbrief

     
    Fri, 10:00 - 10:50
    Wireless Village
  • Y
  • You Are Being Manipulated

    GrayRaven
    Fri, 14:10 - 15:00
    Packet Hacking Village
  • You are being manipulated

    James Powell
    Fri, 20:00 - 20:55
    Social Engineering Village