• 2
  • 25 Years of Program Analysis

    Yan Shoshitaishvili
    Sun, 15:00 - 15:45
    101 Track
  • A
  • Abusing Certificate Transparency Logs

    Hanno Böck
    Fri, 15:00 - 15:45
    Track 4
  • Abusing Webhooks for Command and Control

    Dimitry Snezhkov
    Sat, 11:20 - 11:40
    101 Track
  • Alice and Bob are Slightly Less Confused

    David Huerta
    Fri, 12:00 - 13:00
    Florentine Ballroom 4 - Crypto and Privacy Village
  • All Your Things Are Belong To Us

    0x00string, CJ_000, Maximus64, Zenofex
    Sat, 11:20 - 12:35
    Track 4
  • Amateur Digital Archeology

    Matt Joyce
    Thu, 13:00 - 13:45
    101 Track
  • An ACE Up the Sleeve: Designing Active Directory DACL Backdoors

    Andy Robbins, Will Schroeder
    Fri, 16:00 - 16:45
    Track 3
  • A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!

    Orange Tsai
    Fri, 12:00 - 12:45
    Track 3
  • A New Political Era: Time to start wearing tin-foil hats following

    Robby Mook, Joel Wallenstrom
    Fri, 15:00 - 16:00
    Florentine Ballroom 4 - Crypto and Privacy Village
  • A Picture is Worth a Thousand Words, Literally: Deep Neural Networks for Social Stego

    Michael Raggo, Philip Tully
    Sat, 13:00 - 13:45
    Track 4
  • Are all BSDs are created equally? A survey of BSD kernel vulnerabilities.

    Ilja van Sprundel
    Sun, 12:00 - 12:45
    Track 2
  • Assembly Language is Too High Level

    XlogicX
    Fri, 15:00 - 15:45
    101 Track
  • Attacking Autonomic Networks

    Omar Eissa
    Sat, 14:00 - 14:45
    101 Track
  • Automated Testing using Crypto Differential Fuzzing (DO NOT RECORD)

    Yolan Romailler
    Sat, 17:30 - 18:00
    Florentine Ballroom 4 - Crypto and Privacy Village
  • B
  • Backdooring the Lottery and Other Security Tales in Gaming over the Past 25 Years

    Gus Fritschie, Evan Teitelman
    Sun, 11:00 - 11:45
    Track 2
  • $
  • $BIGNUM steps forward, $TRUMPNUM steps back: how can we tell if we're winning?

    Cory Doctorow
    Sat, 10:00 - 10:45
    Track 2
  • B
  • BITSInject

    Dor Azouri
    Sun, 10:20 - 10:40
    Track 3
  • Blue Team TLS Hugs

    Lee Brotherston
    Sat, 17:00 - 17:30
    Florentine Ballroom 4 - Crypto and Privacy Village
  • Breaking Bitcoin Hardware Wallets

    Josh Datko, Chris Quartier
    Sun, 10:00 - 10:20
    Track 3
  • Breaking the x86 Instruction Set

    Christopher Domas
    Fri, 14:00 - 14:45
    Track 3
  • Breaking TLS: A Year in Incremental Privacy Improvements

    Andrew Brandt
    Fri, 14:00 - 15:00
    Florentine Ballroom 4 - Crypto and Privacy Village
  • Breaking Wind: Adventures in Hacking Wind Farm Control Networks

    Jason Staggs
    Sat, 10:20 - 10:40
    101 Track
  • Bypassing Android Password Manager Apps Without Root

    Stephan Huber, Siegfried Rasthofer
    Sun, 13:00 - 13:45
    Track 2
  • C
  • CableTap: Wirelessly Tapping Your Home Network

    Chris Grayson, Logan Lamb, Marc Newlin
    Sat, 16:00 - 16:45
    Track 3
  • Call the plumber - you have a leak in your (named) pipe

    Gil Cohen
    Sun, 14:00 - 14:45
    101 Track
  • Cisco Catalyst Exploitation

    Artem Kondratenko
    Fri, 17:00 - 17:45
    101 Track
  • CITL and the Digital Standard - A Year Later

    Sarah Zatko
    Fri, 12:00 - 12:45
    101 Track
  • Closing

     
    Sun, 14:00 - 15:00
    Florentine Ballroom 4 - Crypto and Privacy Village
  • Closing Ceremony

     
    Sun, 16:30 - 17:30
    Track 3
  • Controlling IoT devices with crafted radio signals

    Caleb Madrigal
    Fri, 13:00 - 13:45
    101 Track
  • Core Illumination: Traffic Analysis in Cyberspace

    Kenneth Geers
    Sat, 15:30 - 16:00
    Florentine Ballroom 4 - Crypto and Privacy Village
  • Cryptanalysis in the Time of Ransomware

     
    Fri, 16:30 - 17:30
    Florentine Ballroom 4 - Crypto and Privacy Village
  • Cypherpunks History

    Ryan Lackey
    Sun, 11:30 - 12:00
    Florentine Ballroom 4 - Crypto and Privacy Village
  • D
  • D0 No H4RM: A Healthcare Security Conversation

    Joshua Corman, Christian Dameff, Michael McNeil, Jerome Radcliffe, Suzanne Schwartz, MD, Jeff Tully, Beau Woods
    Sat, 20:00 - 22:00
    Modena Room
  • Dark Data

    Andreas Dewes, Svea Eckert
    Fri, 15:00 - 15:45
    Track 3
  • DC to DEF CON: Q&A with Congressmen James Langevin and Will Hurd

    Joshua Corman, Rep. Will Hurd, Rep. James Langevin (D-RI)
    Sat, 15:00 - 17:00
    Capri Room
  • Dealing the perfect hand - Shuffling memory blocks on z/OS

    Ayoul3
    Sat, 16:00 - 16:45
    101 Track
  • Death By 1000 Installers; on macOS, it's all broken!

    Patrick Wardle
    Fri, 14:00 - 14:45
    Track 2
  • DEF CON 101 Panel

    HighWiz, Niki7a, Roamer, Shaggy, Malware Unicorn, Wiseacre
    Thu, 16:00 - 17:45
    101 Track
  • Demystifying Windows Kernel Exploitation by Abusing GDI Objects.

    Saif El-Sherei
    Sat, 13:00 - 13:45
    101 Track
  • Digital Vengeance: Exploiting the Most Notorious C&C Toolkits

    Professor Plum
    Sat, 15:00 - 15:45
    Track 4
  • DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent

    Jim Nitterauer
    Sat, 12:00 - 12:45
    Track 3
  • DOOMed Point of Sale Systems

    trixr4skids
    Sat, 15:00 - 15:45
    Track 3
  • Driving down the rabbit hole

    Oleksandr Bazhaniuk, Jesse Michael, Mickey Shkatov
    Sat, 12:00 - 12:45
    101 Track
  • E
  • Evading next-gen AV using artificial intelligence

    Hyrum Anderson
    Sat, 11:00 - 11:20
    Track 4
  • Exploiting 0ld Mag-stripe information with New technology

    Salvador Mendoza
    Thu, 15:20 - 15:40
    101 Track 2
  • Exploiting Continuous Integration (CI) and Automated Build systems

    spaceB0x
    Sun, 11:00 - 11:45
    Track 3
  • F
  • Friday the 13th: JSON attacks!

    Oleksandr Mirosh, Alvaro Muñoz
    Sun, 14:00 - 14:45
    Track 4
  • From Box to Backdoor: Using Old School Tools and Techniques to Discover Backdoors in Modern Devices

    Patrick DeSantis
    Thu, 11:00 - 11:45
    101 Track
  • From "One Country - One Floppy" to "Startup Nation" - the story of the early days of the Israeli hacking community, and the journey towards today's vibrant startup scene

    Inbar Raz, Eden Shochat
    Sat, 16:00 - 16:45
    Track 2
  • G
  • Game of Chromes: Owning the Web with Zombie Chrome Extensions

    Tomer Cohen
    Sun, 13:00 - 13:45
    101 Track
  • Game of Drones: Putting the Emerging "Drone Defense" Market to the Test

    Francis Brown, David Latimer
    Sat, 16:00 - 16:45
    Track 4
  • Genetic Diseases to Guide Digital Hacks of the Human Genome: How the Cancer Moonshot Program will Enable Almost Anyone to Crash the Operating System that Runs You or to End Civilization...

    John Sotos
    Sun, 12:00 - 12:45
    Track 4
  • Get-$pwnd: Attacking Battle-Hardened Windows Server

    Lee Holmes
    Sat, 10:00 - 10:20
    Track 3
  • Ghost in the Droid: Possessing Android Applications with ParaSpectre

    chaosdata
    Sun, 10:20 - 10:40
    Track 4
  • '
  • 'Ghost Telephonist' Impersonates You Through LTE CSFB

    Lin Huang, Yuwei Zheng
    Sun, 11:00 - 11:45
    Track 4
  • H
  • Hacking Democracy

    Mr. Sean Kanuck
    Fri, 20:00 - 22:00
    Capri Room
  • Hacking Democracy: A Socratic Dialogue

    Mr. Sean Kanuck
    Fri, 12:00 - 12:45
    Track 4
  • Hacking on Multiparty Computation

    Matt Cheung
    Fri, 10:30 - 11:00
    Florentine Ballroom 4 - Crypto and Privacy Village
  • Hacking Smart Contracts

    Konstantinos Karagiannis
    Fri, 11:00 - 11:45
    Track 3
  • Hacking the Cloud

    Sean Metcalf, Gerald Steere
    Thu, 14:00 - 14:45
    101 Track
  • Hacking travel routers like it's 1999

    Mikhail Sosonkin
    Fri, 10:20 - 10:40
    Track 2
  • Have you seen my naked selfies? Neither has my snoopy boyfriend. Pr

    Lauren Rucker
    Sat, 14:00 - 15:00
    Florentine Ballroom 4 - Crypto and Privacy Village
  • Here to stay: Gaining persistency by abusing advanced authentication mechanisms

    Igal Gofman, Marina Simakov
    Sat, 17:00 - 17:45
    101 Track
  • Horror stories of a translator and how a tweet can start a war with less than 140 characters

    El Kentaro
    Fri, 20:00 - 22:00
    Modena Room
  • How we created the first SHA-1 collision and what it means for hash security

    Elie Bursztein
    Fri, 14:00 - 14:45
    Track 4
  • I
  • If You Give a Mouse a Microchip... It will execute a payload and cheat at your high-stakes video game tournament

    Rob Stanley, Mark Williams
    Sat, 11:00 - 11:45
    Track 3
  • I Know What You Are by the Smell of Your Wifi

    Denton Gentry
    Sun, 10:00 - 10:20
    Track 2
  • Inside the "Meet Desai" Attack: Defending Distributed Targets from Distributed Attacks

    Trey Forgety
    Thu, 15:00 - 15:45
    101 Track
  • Introducing HUNT: Data Driven Web Hacking & Manual Testing

    Jason Haddix
    Sat, 17:00 - 17:45
    Track 3
  • J
  • Jailbreaking Apple Watch

    Max Bazaliy
    Thu, 12:00 - 12:45
    101 Track 2
  • K
  • Koadic C3 - Windows COM Command & Control Framework

    Sean Dillon, Zach Harding
    Sat, 13:00 - 13:45
    Track 2
  • L
  • Linux-Stack Based V2X Framework: All You Need to Hack Connected Vehicles

    Nicholas Haltmeyer, Duncan Woodbury
    Sat, 14:00 - 14:45
    Track 3
  • M
  • macOS/iOS Kernel Debugging and Heap Feng Shui

    Min Zheng
    Fri, 10:00 - 10:20
    101 Track
  • Malicious CDNs: Identifying Zbot Domains en Masse via SSL Certificates and Bipartite Graphs

    Dhia Mahjoub, Thomas Mathew
    Sun, 13:00 - 13:45
    Track 3
  • Man in the NFC

    Haoqi Shan, Jian Yuan
    Sun, 14:00 - 14:45
    Track 3
  • MEATPISTOL, A Modular Malware Implant Framework

    John Cramb, Josh Schwartz
    Fri, 17:00 - 17:45
    Track 3
  • Microservices and FaaS for Offensive Security

    Ryan Baxendale
    Sat, 11:00 - 11:20
    101 Track
  • MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt)

    Chris Thompson
    Sat, 15:00 - 15:45
    101 Track
  • N
  • Next-Generation Tor Onion Services

    Roger Dingledine
    Fri, 13:00 - 13:45
    Track 4
  • O
  • Offensive Malware Analysis: Dissecting OSX/FruitFly via a Custom C&C Server

    Patrick Wardle
    Fri, 10:20 - 10:40
    101 Track
  • Open Source Safe Cracking Robots - Combinations Under 1 Hour! (Is it bait? Damn straight it is.)

    Nathan Seidle
    Fri, 12:00 - 12:45
    Track 2
  • Operational Security Lessons from the Dark Web

    Shea Nangle
    Sat, 12:00 - 13:00
    Florentine Ballroom 4 - Crypto and Privacy Village
  • Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection

    Weston Hecker
    Thu, 11:00 - 11:45
    101 Track 2
  • P
  • Panel - An Evening with the EFF

    Shabid Buttar, Nate Cardozo, Eva Galperin, Kurt Opsahl, Kit Walsh
    Fri, 20:00 - 22:00
    Trevi Room
  • Panel: DEF CON Groups

    Grifter, Jun Li, Major Malfunction, Jeff Moss, S0ups, Jayson E. Street, Waz, Brent White
    Fri, 17:00 - 17:45
    Track 2
  • Panel: Meet The Feds

    Leonard Bailey, Andrea Matwyshyn, Terrell McSweeny, Suzanne Schwartz, MD, Lisa Wiswell
    Fri, 10:20 - 11:35
    Track 4
  • Panel - Meet the Feds (who care about security research)

    Leonard Bailey, Kimber Dowsett, Allan Friedman, Amélie E. Koran, Nick Leiserson
    Sat, 20:00 - 22:00
    Capri Room
  • PEIMA (Probability Engine to Identify Malicious Activity): Using Power Laws to address Denial of Service Attacks

    Redezem
    Sun, 10:20 - 10:40
    Track 2
  • Persisting with Microsoft Office: Abusing Extensibility Options

    William Knowles
    Sat, 10:00 - 10:20
    101 Track
  • Phone system testing and other fun tricks

    Owen
    Fri, 15:00 - 15:45
    Track 2
  • Popping a Smart Gun

    Plore
    Sat, 17:00 - 17:45
    Track 4
  • Porosity: A Decompiler For Blockchain-Based Smart Contracts Bytecode

    Matthieu Suiche
    Thu, 12:00 - 12:45
    101 Track
  • Privacy is Not An Add-On: Designing for Privacy from the Ground Up

    Alisha Kloc
    Sat, 11:30 - 12:00
    Florentine Ballroom 4 - Crypto and Privacy Village
  • Protecting Users' Privacy in a Location-Critical Enterprise: The Ch

    Trey Forgety
    Fri, 13:00 - 14:00
    Florentine Ballroom 4 - Crypto and Privacy Village
  • R
  • Radio Exploitation 101: Characterizing, Contextualizing, and Applying Wireless Attack Methods

    Matt Knight, Marc Newlin
    Fri, 16:00 - 16:45
    101 Track
  • Rage Against the Weaponized AI Propaganda Machine

    Chris Sumner
    Fri, 11:00 - 11:45
    101 Track
  • Real-time RFID Cloning in the Field

    Dennis Maldonado
    Thu, 15:00 - 15:20
    101 Track 2
  • Revoke-Obfuscation: PowerShell Obfuscation Detection (And Evasion) Using Science

    Daniel Bohannon, Lee Holmes
    Sun, 13:00 - 13:45
    Track 4
  • rustls: modern\, fast\, safer TLS

    Joseph Birr-Pixton
    Sat, 16:00 - 17:00
    Florentine Ballroom 4 - Crypto and Privacy Village
  • S
  • Secret Tools: Learning about Government Surveillance Software You Can't Ever See

    Peyton Engel
    Fri, 10:00 - 10:20
    Track 4
  • Secure Tokin' and Doobiekeys: How to roll your own counterfeit hardware security devices

    Joe FitzPatrick, Michael Leibowitz
    Sat, 11:00 - 11:45
    Track 2
  • Security Analysis of the Telegram IM

    Tomas Susanka
    Fri, 16:00 - 16:30
    Florentine Ballroom 4 - Crypto and Privacy Village
  • See no evil, hear no evil: Hacking invisibly and silently with light and sound

    Matt Wixey
    Thu, 14:00 - 14:45
    101 Track 2
  • SHA-3 vs the world

    David Wong
    Fri, 11:00 - 12:00
    Florentine Ballroom 4 - Crypto and Privacy Village
  • Social Engineering The News

    Michael Schrenk
    Thu, 00:00 - 00:45
    101 Track
  • Starting the Avalanche: Application DoS In Microservice Architectures

    Scott Behrens, Jeremy Heffner
    Fri, 13:00 - 13:45
    Track 3
  • T
  • Taking Windows 10 Kernel Exploitation to the next level - Leveraging write-what-where vulnerabilities in Creators Update

    Morten Schenk
    Sat, 17:00 - 17:45
    Track 2
  • Teaching Old Shellcode New Tricks

    Joshua Pitts
    Fri, 13:00 - 13:45
    Track 2
  • The Adventures of AV and the Leaky Sandbox

    Amit Klein, Itzik Kotler
    Fri, 16:00 - 16:45
    Track 2
  • The Black Art of Wireless Post Exploitation

    Gabriel Ryan
    Sun, 12:00 - 12:45
    101 Track
  • The Brain's Last Stand

    Garry Kasparov
    Fri, 10:00 - 10:45
    Track 3
  • The call is coming from inside the house! Are you ready for the next evolution in DDoS attacks?

    Steinthor Bjarnason, Jason Jones
    Sun, 12:00 - 12:45
    Track 3
  • The Internet Already Knows I'm Pregnant

    Kashmir Hill, Cooper Quintin
    Fri, 17:00 - 17:45
    Track 4
  • The Key Management Facility of the Root Zone DNSSEC KSK

    Punky Duero
    Sun, 12:00 - 12:30
    Florentine Ballroom 4 - Crypto and Privacy Village
  • The Last CTF Talk You'll Ever Need: AMA with 20 years of DEF CON Capture-the-Flag organizers

    Caezar, Chris Eagle, Invisigoth, Hawaii John, Myles, Vulc@n
    Thu, 16:00 - 17:45
    101 Track 2
  • The Policy & Business Case for Privacy By Design

    Zerina Curevac
    Sun, 12:30 - 13:30
    Florentine Ballroom 4 - Crypto and Privacy Village
  • There's no place like 127.0.0.1 - Achieving reliable DNS rebinding in modern browsers

    Luke Young
    Thu, 10:00 - 10:45
    101 Track
  • The spear to break the security wall of S7CommPlus

    Cheng Lei, Zhang Yunhai
    Sat, 10:00 - 10:20
    Track 4
  • The Surveillance Capitalism Will Continue Until Morale Improves

    J0N J4RV1S
    Sat, 10:30 - 11:30
    Florentine Ballroom 4 - Crypto and Privacy Village
  • The Symantec/Chrome SSL debacle - how to do this better...

     
    Sat, 13:00 - 14:00
    Florentine Ballroom 4 - Crypto and Privacy Village
  • The Why and How for Secure Automatic Patch Management

    Scott Arciszewski
    Sun, 13:30 - 14:00
    Florentine Ballroom 4 - Crypto and Privacy Village
  • "
  • "Tick, Tick, Tick. Boom! You're Dead." — Tech & the FTC

    Terrell McSweeny, Whitney Merrill
    Fri, 16:00 - 16:45
    Track 4
  • T
  • Total Recall: Implanting Passwords in Cognitive Memory

    Tess Schrodinger
    Sun, 11:00 - 11:45
    101 Track
  • Tracking Spies in the Skies

    Jason Hernandez, Jerod MacDonald-Evoy, Sam Richards
    Sat, 15:00 - 15:45
    Track 2
  • Trojan-tolerant Hardware & Supply Chain Security in Practice

    Dan Cvrcek, Vasilios Mavroudis
    Sat, 14:00 - 14:45
    Track 2
  • Twenty Years of MMORPG Hacking: Better Graphics, Same Exploits

    Manfred
    Sat, 13:00 - 13:45
    Track 3
  • U
  • Unboxing Android: Everything you wanted to know about Android packers

    Avi Bashan, Slava Makkaveev
    Sun, 10:00 - 10:45
    101 Track
  • Uncovering useful and embarrassing info with Maltego

    Andrew MacPherson
    Thu, 00:00 - 00:45
    101 Track
  • Underhanded Crypto Announcement

     
    Fri, 16:00 - 16:30
    Florentine Ballroom 3 - Crypto and Privacy Village
  • Unfairplay (NOT RECORDED)

    [anonymous panel]
    Fri, 17:30 - 18:30
    Florentine Ballroom 4 - Crypto and Privacy Village
  • (
  • (Un)Fucking Forensics: Active/Passive (i.e. Offensive/Defensive) memory hacking/debugging.

    K2
    Sat, 10:20 - 10:40
    Track 4
  • U
  • Untrustworthy Hardware and How to Fix It

    0ctane
    Sun, 10:00 - 10:20
    Track 4
  • Using GPS Spoofing to control time

    David Robinson
    Fri, 14:00 - 14:45
    101 Track
  • V
  • Village Setup (Volunteers and Organizers Only)

     
    Thu, 13:30 - 15:30
    Florentine Ballroom 4 - Crypto and Privacy Village
  • Volunteer Huddle

     
    Thu, 15:30 - 16:30
    Florentine Ballroom 4 - Crypto and Privacy Village
  • W
  • Weaponizing Machine Learning: Humanity Was Overrated Anyway

    Ben Morris, Dan Petro
    Sun, 14:00 - 14:45
    Track 2
  • Weaponizing the BBC Micro:Bit

    Damien Cauquil
    Fri, 11:00 - 11:45
    Track 2
  • Welcome - Friday

     
    Fri, 10:00 - 10:30
    Florentine Ballroom 4 - Crypto and Privacy Village
  • Welcome - Saturday

     
    Sat, 10:00 - 10:30
    Florentine Ballroom 4 - Crypto and Privacy Village
  • Welcome - Sunday

     
    Sun, 10:30 - 11:00
    Florentine Ballroom 4 - Crypto and Privacy Village
  • Welcome to DEF CON 25

    Dark Tangent
    Fri, 10:00 - 10:20
    Track 2
  • When Privacy Goes Poof! Why It's Gone and Never Coming Back

    Richard Thieme
    Sat, 12:00 - 12:45
    Track 2
  • Where are the SDN Security Talks?

    Jonathan Medina
    Thu, 10:00 - 10:45
    101 Track 2
  • Wiping out CSRF

    Joe Rozner
    Thu, 13:00 - 13:45
    101 Track 2
  • WS: Breaking the Uber Badge Ciphers

     
    Fri, 12:00 - 13:00
    Florentine Ballroom 3 - Crypto and Privacy Village
  • WS: FeatherDuster and Cryptanalib workshop

    Dan Crowley
    Fri, 13:00 - 14:00
    Florentine Ballroom 3 - Crypto and Privacy Village
  • WS: Implementing An Elliptic Curve in Go

    George Tankersley
    Sat, 11:00 - 12:30
    Florentine Ballroom 3 - Crypto and Privacy Village
  • WS: Mansion Apartment Shack House: How To Explain Crypto To Practic

    Tarah Wheeler
    Fri, 11:30 - 12:00
    Florentine Ballroom 3 - Crypto and Privacy Village
  • WS: NoiseSocket: Extending Noise to Make Every TCP Connection Secur

    Dmitry Dain, Alexey Ermishkin
    Fri, 15:00 - 15:30
    Florentine Ballroom 3 - Crypto and Privacy Village
  • WS: Reasoning about Consensus Algorithms

    Zaki Manian
    Sun, 11:00 - 12:00
    Florentine Ballroom 3 - Crypto and Privacy Village
  • WS: Secrets Management in the Cloud

    Evan Johnson
    Sat, 12:30 - 13:30
    Florentine Ballroom 3 - Crypto and Privacy Village
  • WS: SECURE COMMUNICATIONS IN ANDROID WITH TLS/SSL

    Miguel Guirao
    Sat, 14:00 - 16:00
    Florentine Ballroom 3 - Crypto and Privacy Village
  • WS: Supersingular Isogeny Diffie-Hellman

    Deirdre Connolly
    Fri, 17:00 - 17:30
    Florentine Ballroom 3 - Crypto and Privacy Village
  • WSUSpendu: How to hang WSUS clients

    Romain Coltel, Yves Le Provost
    Sat, 10:20 - 10:40
    Track 3
  • X
  • XenoScan: Scanning Memory Like a Boss

    Nick Cano
    Sat, 14:00 - 14:45
    Track 4
  • Y
  • Yet another password hashing talk

    Evgeny Sidorov
    Sat, 15:00 - 15:30
    Florentine Ballroom 4 - Crypto and Privacy Village