Welcome To DEF CON & Badge Maker Talk
NSA Talks Cybersecurity
Vulnerable Out of the Box: An Evaluation of Android Carrier Devices
Compromising online accounts by cracking voicemail systems
Dragnet—Your Social Engineering Sidekick
GOD MODE UNLOCKED: Hardware Backdoors in [redacted] x86 CPUs
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability
I'll See Your Missile and Raise You A MIRV: An overview of the Genesis Scripting Engine
It WISN't me, attacking industrial wireless mesh networks
Exploiting Active Directory Administrator Insecurities
Tineola: Taking a Bite Out of Enterprise Blockchain
In Soviet Russia Smartcard Hacks You
The ring 0 façade: awakening the processor's inner demons
SMBetray—Backdooring and breaking signatures
All your math are belong to us
80 to 0 in under 5 seconds: Falsifying a medical patient's vitals
The Road to Resilience: How Real Hacking Redeems this Damnable Profession
Rock appround the clock: Tracking malware developers by Android "AAPT" timezone disclosure bug
Breaking Extreme Networks WingOS: How to own millions of devices running on Aircrafts, Government, Smart cities and more.
Last mile authentication problem: Exploiting the missing link in end-to-end secure communication
Man-In-The-Disk
Asura: A huge PCAP file analyzer for anomaly packets detection using massive multithreading
Your Watch Can Watch You! Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch
PANEL: DEF CON GROUPS
DEF CON Closing Ceremonies