De-anonymizing Programmers from Source Code and Binaries
One-liners to Rule Them All
Breaking Paser Logic: Take Your Path Normalization Off and Pop 0days Out!
Finding Xori: Malware Analysis Triage with Automated Disassembly
Hacking the Brain: Customize Evil Protocol to Pwn an SDN Controller
4G—Who is paying your cellular phone bill?
Playback: a TLS 1.3 story
Practical & Improved Wifi MitM with Mana
The L0pht Testimony, 20 Years Later (and Other Things You Were Afraid to Ask)
You're just complaining because you're guilty: A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System
Compression Oracle Attacks on VPN Networks
You'd better secure your BLE devices or we'll kick your butts !
Reaping and breaking keys at scale: when crypto meets big data
Detecting Blue Team Research Through Targeted Ads
Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from huge to little ones
Sex Work After SESTA/FOSTA
Reverse Engineering Windows Defender's Emulator
All your family secrets belong to us—Worrisome security issues in tracker apps
Relocation Bonus: Attacking the Windows Loader Makes Analysts Switch Careers
Defending the 2018 Midterm Elections from Foreign Adversaries
Politics and the Surveillance State. The story of a young politician's successful efforts to fight surveillance and pass the nation's strongest privacy bills.
Attacking the macOS Kernel Graphics Driver
Micro-Renovator: Bringing Processor Firmware up to Code
Lost and Found Certificates: dealing with residual certificates for pre-owned domains
Hacking BLE Bicycle Locks for Fun and a Small Profit
What the Fax!?