Welcome to DEF CON 25
Hacking travel routers like it's 1999
Weaponizing the BBC Micro:Bit
Open Source Safe Cracking Robots - Combinations Under 1 Hour! (Is it bait? Damn straight it is.)
Teaching Old Shellcode New Tricks
Death By 1000 Installers; on macOS, it's all broken!
Phone system testing and other fun tricks
The Adventures of AV and the Leaky Sandbox
Panel: DEF CON Groups
$BIGNUM steps forward, $TRUMPNUM steps back: how can we tell if we're winning?
Secure Tokin' and Doobiekeys: How to roll your own counterfeit hardware security devices
When Privacy Goes Poof! Why It's Gone and Never Coming Back
Koadic C3 - Windows COM Command & Control Framework
Trojan-tolerant Hardware & Supply Chain Security in Practice
Tracking Spies in the Skies
From "One Country - One Floppy" to "Startup Nation" - the story of the early days of the Israeli hacking community, and the journey towards today's vibrant startup scene
Taking Windows 10 Kernel Exploitation to the next level - Leveraging write-what-where vulnerabilities in Creators Update
I Know What You Are by the Smell of Your Wifi
PEIMA (Probability Engine to Identify Malicious Activity): Using Power Laws to address Denial of Service Attacks
Backdooring the Lottery and Other Security Tales in Gaming over the Past 25 Years
Are all BSDs are created equally? A survey of BSD kernel vulnerabilities.
Bypassing Android Password Manager Apps Without Root
Weaponizing Machine Learning: Humanity Was Overrated Anyway