4G—Who is paying your cellular phone bill?
80 to 0 in under 5 seconds: Falsifying a medical patient's vitals
A Journey Into Hexagon: Dissecting a Qualcomm Baseband
All your family secrets belong to us—Worrisome security issues in tracker apps
All your math are belong to us
An Attacker Looks at Docker: Approaching Multi-Container Applications
Asura: A huge PCAP file analyzer for anomaly packets detection using massive multithreading
Attacking the macOS Kernel Graphics Driver
Automated Discovery of Deserialization Gadget Chains
barcOwned—Popping shells with your cereal box
Betrayed by the keyboard: How what you type can give you away
Beyond the Lulz: Black-Hat Trolling, White-Hat Trolling, Attacking and Defending Our Attention Landscape
Booby Trapping Boxes
Breaking Extreme Networks WingOS: How to own millions of devices running on Aircrafts, Government, Smart cities and more.
Breaking Paser Logic: Take Your Path Normalization Off and Pop 0days Out!
Breaking Smart Speakers: We are Listening to You.
Building Absurd Christmas Light Shows
Building the Hacker Tracker
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Compression Oracle Attacks on VPN Networks
Compromising online accounts by cracking voicemail systems
D0 N0 H4RM: A Healthcare Security Conversation
De-anonymizing Programmers from Source Code and Binaries
DEF CON 101 Panel
DEF CON Closing Ceremonies
Defending the 2018 Midterm Elections from Foreign Adversaries
Demystifying MS17-010: Reverse Engineering the ETERNAL Exploits
Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities
Detecting Blue Team Research Through Targeted Ads
Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from huge to little ones
Disrupting the Digital Dystopia or What the hell is happening in computer law?
Dissecting the Teddy Ruxpin: Reverse Engineering the Smart Bear
Dragnet—Your Social Engineering Sidekick
Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparent Session Hijacking
EFF Fireside Hax (AKA Ask the EFF)
Exploiting Active Directory Administrator Insecurities
Fasten your seatbelts: We are escaping iOS 11 sandbox!
Finding Xori: Malware Analysis Triage with Automated Disassembly
Fire & Ice: Making and Breaking macOS Firewalls
For the Love of Money: Finding and exploiting vulnerabilities in mobile point of sales systems
Fuzzing Malware For Fun & Profit. Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware
GOD MODE UNLOCKED: Hardware Backdoors in [redacted] x86 CPUs
Hacking BLE Bicycle Locks for Fun and a Small Profit
Hacking PLCs and Causing Havoc on Critical Infrastructures
Hacking the Brain: Customize Evil Protocol to Pwn an SDN Controller
Having fun with IoT: Reverse Engineering and Hacking of Xiaomi IoT Devices
House of Roman—a "leakless" heap fengshui to achieve RCE on PIE Binaries
I'll See Your Missile and Raise You A MIRV: An overview of the Genesis Scripting Engine
Infecting The Embedded Supply Chain
Inside the Fake Science Factory
In Soviet Russia Smartcard Hacks You
It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded devices for fun and profit
It WISN't me, attacking industrial wireless mesh networks
Jailbreaking the 3DS through 7 years of hardening
Last mile authentication problem: Exploiting the missing link in end-to-end secure communication
Looking for the perfect signature: an automatic YARA rules generation algorithm in the AI-era
Lora Smart Water Meter Security Analysis
Lost and Found Certificates: dealing with residual certificates for pre-owned domains
Man-In-The-Disk
Micro-Renovator: Bringing Processor Firmware up to Code
NSA Talks Cybersecurity
Oh Noes! — A Role Playing Incident Response Game
One bite and all your dreams will come true: Analyzing and Attacking Apple Kernel Drivers
One-Click to OWA
One-liners to Rule Them All
One Step Ahead of Cheaters -- Instrumenting Android Emulators
Outsmarting the Smart City
PANEL: DEF CON GROUPS
Playback: a TLS 1.3 story
Playing Malware Injection with Exploit thoughts
Please do not Duplicate: Attacking the Knox Box and Other Keyed Alike Systems
Politics and the Surveillance State. The story of a young politician's successful efforts to fight surveillance and pass the nation's strongest privacy bills.
Practical & Improved Wifi MitM with Mana
Privacy infrastructure, challenges and opportunities
Privacy Is Equality—And It's Far from Dead
Project Interceptor: avoiding counter-drone systems with nanodrones
Pwning "the toughest target": the exploit chain of winning the largest bug bounty in the history of ASR program
Reaping and breaking keys at scale: when crypto meets big data
Relocation Bonus: Attacking the Windows Loader Makes Analysts Switch Careers
Reverse Engineering, hacking documentary series
Reverse Engineering Windows Defender's Emulator
Revolting Radios
Ridealong Adventures—Critical Issues with Police Body Cameras
Ring 0/-2 Rootkits: bypassing defenses
Rock appround the clock: Tracking malware developers by Android "AAPT" timezone disclosure bug
Searching for the Light: Adventures with OpticSpy
Securing our Nation's Election Infrastructure
Sex Work After SESTA/FOSTA
SMBetray—Backdooring and breaking signatures
Synfuzz: Building a Grammar Based Re-targetable Test Generation Framework
The L0pht Testimony, 20 Years Later (and Other Things You Were Afraid to Ask)
The Mouse is Mightier than the Sword
The ring 0 façade: awakening the processor's inner demons
The Road to Resilience: How Real Hacking Redeems this Damnable Profession
ThinSIM-based Attacks on Mobile Money Systems
Through the Eyes of the Attacker: Designing Embedded Systems Exploits for Industrial Control Systems
Tineola: Taking a Bite Out of Enterprise Blockchain
Trouble in the tubes: How internet routing security breaks down and how you can do it at home
UEFI exploitation for the masses
Vulnerable Out of the Box: An Evaluation of Android Carrier Devices
WAGGING THE TAIL—COVERT PASSIVE SURVEILLANCE AND HOW TO MAKE THEIR LIFE DIFFICULT
Weaponizing Unicode: Homographs Beyond IDNs
Welcome To DEF CON & Badge Maker Talk
What the Fax!?
Who Controls the Controllers—Hacking Crestron IoT Automation Systems
You can run, but you can't hide. Reverse engineering using X-Ray.
You'd better secure your BLE devices or we'll kick your butts !
You may have paid more than you imagine—Replay Attacks on Ethereum Smart Contracts
Your Bank's Digital Side Door
You're just complaining because you're guilty: A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System
Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability
Your Voice is My Passport
Your Watch Can Watch You! Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch