• 10:00
  • The Mouse is Mightier than the Sword

    Patrick Wardle
    Sun, 10:00 - 10:45
    101 Track
  • Rock appround the clock: Tracking malware developers by Android "AAPT" timezone disclosure bug

    Sheila A. Berta, Sergio De Los Santos
    Sun, 10:00 - 10:45
    Track 1
  • Defending the 2018 Midterm Elections from Foreign Adversaries

    Joshua Franklin, Kevin Franklin
    Sun, 10:00 - 10:45
    Track 2
  • For the Love of Money: Finding and exploiting vulnerabilities in mobile point of sales systems

    Leigh Anne Galloway, Timur Yunusov
    Sun, 10:00 - 10:45
    Track 3
  • 11:00
  • Searching for the Light: Adventures with OpticSpy

    Joe Grand
    Sun, 11:00 - 11:45
    101 Track
  • Breaking Extreme Networks WingOS: How to own millions of devices running on Aircrafts, Government, Smart cities and more.

    Josep Pi Rodriguez
    Sun, 11:00 - 11:45
    Track 1
  • Politics and the Surveillance State. The story of a young politician's successful efforts to fight surveillance and pass the nation's strongest privacy bills.

    Daniel Zolnikov
    Sun, 11:00 - 11:45
    Track 2
  • Demystifying MS17-010: Reverse Engineering the ETERNAL Exploits

    zerosum0x0
    Sun, 11:00 - 11:45
    Track 3
  • 12:00
  • Breaking Smart Speakers: We are Listening to You.

    Wu HuiYu, Qian Wenxiang
    Sun, 12:00 - 12:45
    101 Track
  • Last mile authentication problem: Exploiting the missing link in end-to-end secure communication

    Markku Antikainen, Tuomas Aura, Thanh Bui, Siddharth Rao
    Sun, 12:00 - 12:45
    Track 1
  • Attacking the macOS Kernel Graphics Driver

    Yu Wang
    Sun, 12:00 - 12:45
    Track 2
  • Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities

    Matt Knight, Ryan Speers
    Sun, 12:00 - 12:45
    Track 3
  • 13:00
  • Trouble in the tubes: How internet routing security breaks down and how you can do it at home

    Lane Broadbent
    Sun, 13:00 - 13:45
    101 Track
  • Man-In-The-Disk

    Slava Makkaveev
    Sun, 13:00 - 13:20
    Track 1
  • Micro-Renovator: Bringing Processor Firmware up to Code

    Matt King
    Sun, 13:00 - 13:20
    Track 2
  • barcOwned—Popping shells with your cereal box

    magicspacekiwi, Michael West
    Sun, 13:00 - 13:20
    Track 3
  • 13:30
  • Asura: A huge PCAP file analyzer for anomaly packets detection using massive multithreading

    Ruo Ando
    Sun, 13:30 - 13:50
    Track 1
  • Lost and Found Certificates: dealing with residual certificates for pre-owned domains

    Dylan Ayrey, Ian Foster
    Sun, 13:30 - 13:50
    Track 2
  • Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparent Session Hijacking

    ldionmarcil
    Sun, 13:30 - 13:50
    Track 3
  • 14:00
  • Betrayed by the keyboard: How what you type can give you away

    Matt Wixey
    Sun, 14:00 - 14:45
    101 Track
  • Your Watch Can Watch You! Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch

    Hyoung-Kee Choi, Dongsung Kim
    Sun, 14:00 - 14:45
    Track 1
  • Hacking BLE Bicycle Locks for Fun and a Small Profit

    Vincent Tan
    Sun, 14:00 - 14:45
    Track 2
  • One bite and all your dreams will come true: Analyzing and Attacking Apple Kernel Drivers

    Xiaolong Bai, Min Zheng
    Sun, 14:00 - 14:45
    Track 3
  • 15:00
  • PANEL: DEF CON GROUPS

    Casey Bourbonnais, Jeff Moss, Tim Roberts, S0ups, Jayson E. Street, Brent White, April C. Wright
    Sun, 15:00 - 15:45
    Track 1
  • What the Fax!?

    Yaniv Balmas, Eyal Itkin
    Sun, 15:00 - 15:45
    Track 2
  • Fuzzing Malware For Fun & Profit. Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware

    Maksim Shudrak
    Sun, 15:00 - 15:45
    Track 3
  • 16:00
  • DEF CON Closing Ceremonies

    The Dark Tangent
    Sun, 16:00 - 17:45
    Track 1