• Flamingo Hotel

  • Thursday, August 9
  • ThinSIM-based Attacks on Mobile Money Systems

    Rowan Phipps
    Thu, 10:00 - 10:45
    101 Track
  • Pwning "the toughest target": the exploit chain of winning the largest bug bounty in the history of ASR program

    Jianjun Dai, Guang Gong, Wenlin Yang
    Thu, 11:00 - 11:45
    101 Track
  • Ring 0/-2 Rootkits: bypassing defenses

    Alexandre Borges
    Thu, 12:00 - 12:45
    101 Track
  • A Journey Into Hexagon: Dissecting a Qualcomm Baseband

    Seamus Burke
    Thu, 13:00 - 13:45
    101 Track
  • WAGGING THE TAIL—COVERT PASSIVE SURVEILLANCE AND HOW TO MAKE THEIR LIFE DIFFICULT

    Si, Agent X
    Thu, 14:00 - 14:45
    101 Track
  • Building the Hacker Tracker

    Whitney Champion, Seth Law
    Thu, 15:00 - 15:20
    101 Track
  • DEF CON 101 Panel

    HighWiz, Jericho, Nikita, Roamer, Shaggy, Chris Sumner, Wiseacre
    Thu, 15:30 - 16:45
    101 Track
  • Friday, August 10
  • Synfuzz: Building a Grammar Based Re-targetable Test Generation Framework

    Joe Rozner
    Fri, 10:00 - 10:45
    101 Track
  • An Attacker Looks at Docker: Approaching Multi-Container Applications

    Wesley McGrew
    Fri, 11:00 - 11:45
    101 Track
  • It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded devices for fun and profit

    Morgan Gangwere
    Fri, 12:00 - 12:45
    101 Track
  • Dissecting the Teddy Ruxpin: Reverse Engineering the Smart Bear

    zenofex
    Fri, 13:00 - 13:20
    101 Track
  • You can run, but you can't hide. Reverse engineering using X-Ray.

    George Tarnovsky
    Fri, 13:30 - 13:50
    101 Track
  • UEFI exploitation for the masses

    Jesse Michael, Mickey Shkatov
    Fri, 14:00 - 14:45
    101 Track
  • Weaponizing Unicode: Homographs Beyond IDNs

    The Tarquin
    Fri, 15:00 - 15:45
    101 Track
  • Automated Discovery of Deserialization Gadget Chains

    Ian Haken
    Fri, 16:00 - 16:45
    101 Track
  • Your Bank's Digital Side Door

    Steven Danneman
    Fri, 17:00 - 17:45
    101 Track
  • Saturday, August 11
  • Through the Eyes of the Attacker: Designing Embedded Systems Exploits for Industrial Control Systems

    Marina Krotofil, Jos Wetzels
    Sat, 10:00 - 10:45
    101 Track
  • Hacking PLCs and Causing Havoc on Critical Infrastructures

    Thiago Alves
    Sat, 11:00 - 11:45
    101 Track
  • Building Absurd Christmas Light Shows

    Rob Joyce
    Sat, 12:00 - 12:45
    101 Track
  • One Step Ahead of Cheaters -- Instrumenting Android Emulators

    Nevermoe
    Sat, 13:00 - 13:20
    101 Track
  • House of Roman—a "leakless" heap fengshui to achieve RCE on PIE Binaries

    Sanat Sharma
    Sat, 13:30 - 13:50
    101 Track
  • Having fun with IoT: Reverse Engineering and Hacking of Xiaomi IoT Devices

    Dennis Giese
    Sat, 14:00 - 14:45
    101 Track
  • Project Interceptor: avoiding counter-drone systems with nanodrones

    David Melendez Cano
    Sat, 15:00 - 15:45
    101 Track
  • Outsmarting the Smart City

    Dan Crowley, Mauro Paredes, Jennifer Savage
    Sat, 16:00 - 16:45
    101 Track
  • Sunday, August 12
  • The Mouse is Mightier than the Sword

    Patrick Wardle
    Sun, 10:00 - 10:45
    101 Track
  • Searching for the Light: Adventures with OpticSpy

    Joe Grand
    Sun, 11:00 - 11:45
    101 Track
  • Breaking Smart Speakers: We are Listening to You.

    Wu HuiYu, Qian Wenxiang
    Sun, 12:00 - 12:45
    101 Track
  • Trouble in the tubes: How internet routing security breaks down and how you can do it at home

    Lane Broadbent
    Sun, 13:00 - 13:45
    101 Track
  • Betrayed by the keyboard: How what you type can give you away

    Matt Wixey
    Sun, 14:00 - 14:45
    101 Track