• 4
  • 4G—Who is paying your cellular phone bill?

    Dr. Silke Holtmanns, Isha Singh
    Fri, 14:00 - 14:45
    Track 2
  • 8
  • 80 to 0 in under 5 seconds: Falsifying a medical patient's vitals

    Douglas McKee
    Sat, 16:00 - 16:45
    Track 1
  • A
  • A Journey Into Hexagon: Dissecting a Qualcomm Baseband

    Seamus Burke
    Thu, 13:00 - 13:45
    101 Track
  • All your family secrets belong to us—Worrisome security issues in tracker apps

    Dr. Steven Arzt, Stephan Huber, Siegfried Rasthofer
    Sat, 16:00 - 16:45
    Track 2
  • All your math are belong to us

    sghctoma
    Sat, 15:00 - 15:45
    Track 1
  • An Attacker Looks at Docker: Approaching Multi-Container Applications

    Wesley McGrew
    Fri, 11:00 - 11:45
    101 Track
  • Asura: A huge PCAP file analyzer for anomaly packets detection using massive multithreading

    Ruo Ando
    Sun, 13:30 - 13:50
    Track 1
  • Attacking the macOS Kernel Graphics Driver

    Yu Wang
    Sun, 12:00 - 12:45
    Track 2
  • Automated Discovery of Deserialization Gadget Chains

    Ian Haken
    Fri, 16:00 - 16:45
    101 Track
  • B
  • barcOwned—Popping shells with your cereal box

    magicspacekiwi, Michael West
    Sun, 13:00 - 13:20
    Track 3
  • Betrayed by the keyboard: How what you type can give you away

    Matt Wixey
    Sun, 14:00 - 14:45
    101 Track
  • Beyond the Lulz: Black-Hat Trolling, White-Hat Trolling, Attacking and Defending Our Attention Landscape

    Joan Donovan, Matt Goerzen, Dr. Jeanna N. Matthews
    Sat, 20:00 - 22:00
    Octavius 9
  • Booby Trapping Boxes

    hon1nbo, Ladar Levison
    Sat, 15:00 - 15:45
    Track 3
  • Breaking Extreme Networks WingOS: How to own millions of devices running on Aircrafts, Government, Smart cities and more.

    Josep Pi Rodriguez
    Sun, 11:00 - 11:45
    Track 1
  • Breaking Paser Logic: Take Your Path Normalization Off and Pop 0days Out!

    Orange Tsai
    Fri, 12:00 - 12:45
    Track 2
  • Breaking Smart Speakers: We are Listening to You.

    Wu HuiYu, Qian Wenxiang
    Sun, 12:00 - 12:45
    101 Track
  • Building Absurd Christmas Light Shows

    Rob Joyce
    Sat, 12:00 - 12:45
    101 Track
  • Building the Hacker Tracker

    Whitney Champion, Seth Law
    Thu, 15:00 - 15:20
    101 Track
  • Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010

    Gabriel Ryan
    Fri, 15:00 - 15:45
    Track 1
  • C
  • Compression Oracle Attacks on VPN Networks

    Ahamed Nafeez
    Sat, 11:00 - 11:45
    Track 2
  • Compromising online accounts by cracking voicemail systems

    Martin Vigo
    Fri, 13:00 - 13:20
    Track 1
  • D
  • D0 N0 H4RM: A Healthcare Security Conversation

    Joshua Corman, Christian Dameff, Kirill Levchenko, PhD, Jeff Tully MD, David Nathans, Jerome Radcliffe, Roberto Suarez, Beau Woods
    Fri, 20:00 - 22:00
    Octavius 9
  • De-anonymizing Programmers from Source Code and Binaries

    Dr. Aylin Caliskan, Rachel Greenstadt
    Fri, 10:00 - 10:45
    Track 2
  • DEF CON 101 Panel

    HighWiz, Jericho, Nikita, Roamer, Shaggy, Chris Sumner, Wiseacre
    Thu, 15:30 - 16:45
    101 Track
  • DEF CON Closing Ceremonies

    The Dark Tangent
    Sun, 16:00 - 17:45
    Track 1
  • Defending the 2018 Midterm Elections from Foreign Adversaries

    Joshua Franklin, Kevin Franklin
    Sun, 10:00 - 10:45
    Track 2
  • Demystifying MS17-010: Reverse Engineering the ETERNAL Exploits

    zerosum0x0
    Sun, 11:00 - 11:45
    Track 3
  • Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities

    Matt Knight, Ryan Speers
    Sun, 12:00 - 12:45
    Track 3
  • Detecting Blue Team Research Through Targeted Ads

    0x200b
    Sat, 13:30 - 13:50
    Track 2
  • Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from huge to little ones

    Rodrigo Colli, Eduardo Izycki
    Sat, 14:00 - 14:20
    Track 2
  • Disrupting the Digital Dystopia or What the hell is happening in computer law?

    Nate Cardozo, Nathan White
    Fri, 20:00 - 22:00
    Octavius 13
  • Dissecting the Teddy Ruxpin: Reverse Engineering the Smart Bear

    zenofex
    Fri, 13:00 - 13:20
    101 Track
  • Dragnet—Your Social Engineering Sidekick

    Truman Kain
    Fri, 13:30 - 13:50
    Track 1
  • E
  • Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparent Session Hijacking

    ldionmarcil
    Sun, 13:30 - 13:50
    Track 3
  • EFF Fireside Hax (AKA Ask the EFF)

    Andrés Arrieta, Nate Cardozo, Kurt Opsahl, Katitza Rodriguez, Nash Sheard, Jamie Lee Williams
    Sat, 20:00 - 22:00
    Roman Chillout
  • Exploiting Active Directory Administrator Insecurities

    Sean Metcalf
    Sat, 11:00 - 11:45
    Track 1
  • F
  • Fasten your seatbelts: We are escaping iOS 11 sandbox!

    Xiaolong Bai, Min Zheng
    Fri, 13:30 - 13:50
    Track 3
  • Finding Xori: Malware Analysis Triage with Automated Disassembly

    Amanda Rousseau, Rich Seymour
    Fri, 13:00 - 13:20
    Track 2
  • Fire & Ice: Making and Breaking macOS Firewalls

    Patrick Wardle
    Sat, 14:30 - 14:50
    Track 3
  • For the Love of Money: Finding and exploiting vulnerabilities in mobile point of sales systems

    Leigh Anne Galloway, Timur Yunusov
    Sun, 10:00 - 10:45
    Track 3
  • Fuzzing Malware For Fun & Profit. Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware

    Maksim Shudrak
    Sun, 15:00 - 15:45
    Track 3
  • G
  • GOD MODE UNLOCKED: Hardware Backdoors in [redacted] x86 CPUs

    Christopher Domas
    Fri, 14:00 - 14:45
    Track 1
  • H
  • Hacking BLE Bicycle Locks for Fun and a Small Profit

    Vincent Tan
    Sun, 14:00 - 14:45
    Track 2
  • Hacking PLCs and Causing Havoc on Critical Infrastructures

    Thiago Alves
    Sat, 11:00 - 11:45
    101 Track
  • Hacking the Brain: Customize Evil Protocol to Pwn an SDN Controller

    Jianwei Huang, Peng Liu, Feng Xiao
    Fri, 13:30 - 13:50
    Track 2
  • Having fun with IoT: Reverse Engineering and Hacking of Xiaomi IoT Devices

    Dennis Giese
    Sat, 14:00 - 14:45
    101 Track
  • House of Roman—a "leakless" heap fengshui to achieve RCE on PIE Binaries

    Sanat Sharma
    Sat, 13:30 - 13:50
    101 Track
  • I
  • I'll See Your Missile and Raise You A MIRV: An overview of the Genesis Scripting Engine

    Dan Borges, Alex Levinson
    Fri, 17:00 - 17:45
    Track 1
  • Infecting The Embedded Supply Chain

    Alex, Zach
    Sat, 13:30 - 14:15
    Track 3
  • Inside the Fake Science Factory

    Svea Eckert, Till Krause, Chris Sumner
    Sat, 16:00 - 16:45
    Track 3
  • In Soviet Russia Smartcard Hacks You

    Eric Sesterhenn
    Sat, 13:00 - 13:20
    Track 1
  • It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded devices for fun and profit

    Morgan Gangwere
    Fri, 12:00 - 12:45
    101 Track
  • It WISN't me, attacking industrial wireless mesh networks

    Mattijs van Ommeren, Erwin Paternotte
    Sat, 10:00 - 10:45
    Track 1
  • J
  • Jailbreaking the 3DS through 7 years of hardening

    smea
    Sat, 11:00 - 11:45
    Track 3
  • L
  • Last mile authentication problem: Exploiting the missing link in end-to-end secure communication

    Markku Antikainen, Tuomas Aura, Thanh Bui, Siddharth Rao
    Sun, 12:00 - 12:45
    Track 1
  • Looking for the perfect signature: an automatic YARA rules generation algorithm in the AI-era

    Andrea Marcelli
    Sat, 13:00 - 13:20
    Track 3
  • Lora Smart Water Meter Security Analysis

    Lin Huang, Jun Li, Yingtao Zeng
    Fri, 11:00 - 11:45
    Track 3
  • Lost and Found Certificates: dealing with residual certificates for pre-owned domains

    Dylan Ayrey, Ian Foster
    Sun, 13:30 - 13:50
    Track 2
  • M
  • Man-In-The-Disk

    Slava Makkaveev
    Sun, 13:00 - 13:20
    Track 1
  • Micro-Renovator: Bringing Processor Firmware up to Code

    Matt King
    Sun, 13:00 - 13:20
    Track 2
  • N
  • NSA Talks Cybersecurity

    Rob Joyce
    Fri, 11:00 - 11:45
    Track 1
  • O
  • Oh Noes! — A Role Playing Incident Response Game

    Bruce Potter, Robert Potter
    Fri, 20:00 - 22:00
    Roman Chillout
  • One bite and all your dreams will come true: Analyzing and Attacking Apple Kernel Drivers

    Xiaolong Bai, Min Zheng
    Sun, 14:00 - 14:45
    Track 3
  • One-Click to OWA

    William Martin
    Fri, 13:00 - 13:20
    Track 3
  • One-liners to Rule Them All

    egypt, William Vu
    Fri, 11:00 - 11:45
    Track 2
  • One Step Ahead of Cheaters -- Instrumenting Android Emulators

    Nevermoe
    Sat, 13:00 - 13:20
    101 Track
  • Outsmarting the Smart City

    Dan Crowley, Mauro Paredes, Jennifer Savage
    Sat, 16:00 - 16:45
    101 Track
  • P
  • PANEL: DEF CON GROUPS

    Casey Bourbonnais, Jeff Moss, Tim Roberts, S0ups, Jayson E. Street, Brent White, April C. Wright
    Sun, 15:00 - 15:45
    Track 1
  • Playback: a TLS 1.3 story

    Alfonso Garcia Alguacil, Alejo Murillo Moya
    Fri, 15:00 - 15:45
    Track 2
  • Playing Malware Injection with Exploit thoughts

    Sheng-Hao Ma
    Sat, 14:00 - 14:20
    Track 3
  • Please do not Duplicate: Attacking the Knox Box and Other Keyed Alike Systems

    m010ch_
    Fri, 10:30 - 10:50
    Track 3
  • Politics and the Surveillance State. The story of a young politician's successful efforts to fight surveillance and pass the nation's strongest privacy bills.

    Daniel Zolnikov
    Sun, 11:00 - 11:45
    Track 2
  • Practical & Improved Wifi MitM with Mana

    singe
    Fri, 16:00 - 16:45
    Track 2
  • Privacy infrastructure, challenges and opportunities

    yawnbox
    Fri, 15:00 - 15:45
    Track 3
  • Privacy Is Equality—And It's Far from Dead

    Sarah St. Vincent
    Sat, 20:00 - 22:00
    Octavius 13
  • Project Interceptor: avoiding counter-drone systems with nanodrones

    David Melendez Cano
    Sat, 15:00 - 15:45
    101 Track
  • Pwning "the toughest target": the exploit chain of winning the largest bug bounty in the history of ASR program

    Jianjun Dai, Guang Gong, Wenlin Yang
    Thu, 11:00 - 11:45
    101 Track
  • R
  • Reaping and breaking keys at scale: when crypto meets big data

    Nils Amiet, Yolan Romailler
    Sat, 13:00 - 13:20
    Track 2
  • Relocation Bonus: Attacking the Windows Loader Makes Analysts Switch Careers

    Nick Cano
    Sat, 17:00 - 17:45
    Track 2
  • Reverse Engineering, hacking documentary series

    Dave Buchwald, Michael Lee Nirenberg
    Fri, 17:00 - 17:45
    Track 3
  • Reverse Engineering Windows Defender's Emulator

    Alex Bulazel
    Sat, 15:00 - 15:45
    Track 2
  • Revolting Radios

    Michael Ossmann, Dominic Spill
    Fri, 14:00 - 14:45
    Track 3
  • Ridealong Adventures—Critical Issues with Police Body Cameras

    Josh Mitchell
    Sat, 12:00 - 12:45
    Track 3
  • Ring 0/-2 Rootkits: bypassing defenses

    Alexandre Borges
    Thu, 12:00 - 12:45
    101 Track
  • Rock appround the clock: Tracking malware developers by Android "AAPT" timezone disclosure bug

    Sheila A. Berta, Sergio De Los Santos
    Sun, 10:00 - 10:45
    Track 1
  • S
  • Searching for the Light: Adventures with OpticSpy

    Joe Grand
    Sun, 11:00 - 11:45
    101 Track
  • Securing our Nation's Election Infrastructure

    Jeanette Manfra
    Fri, 10:00 - 10:20
    Track 3
  • Sex Work After SESTA/FOSTA

    Maggie Mayhem
    Sat, 14:30 - 14:50
    Track 2
  • SMBetray—Backdooring and breaking signatures

    William Martin
    Sat, 14:00 - 14:45
    Track 1
  • Synfuzz: Building a Grammar Based Re-targetable Test Generation Framework

    Joe Rozner
    Fri, 10:00 - 10:45
    101 Track
  • T
  • The L0pht Testimony, 20 Years Later (and Other Things You Were Afraid to Ask)

    DilDog, Joe Grand, Elinor Mills, Mudge, Weld Pond, Space Rogue, Silicosis, John Tan
    Fri, 17:00 - 17:45
    Track 2
  • The Mouse is Mightier than the Sword

    Patrick Wardle
    Sun, 10:00 - 10:45
    101 Track
  • The ring 0 façade: awakening the processor's inner demons

    Christopher Domas
    Sat, 13:30 - 13:50
    Track 1
  • The Road to Resilience: How Real Hacking Redeems this Damnable Profession

    Richard Thieme
    Sat, 17:00 - 17:45
    Track 1
  • ThinSIM-based Attacks on Mobile Money Systems

    Rowan Phipps
    Thu, 10:00 - 10:45
    101 Track
  • Through the Eyes of the Attacker: Designing Embedded Systems Exploits for Industrial Control Systems

    Marina Krotofil, Jos Wetzels
    Sat, 10:00 - 10:45
    101 Track
  • Tineola: Taking a Bite Out of Enterprise Blockchain

    Parsia Hakimian, Stark Riedesel
    Sat, 12:00 - 12:45
    Track 1
  • Trouble in the tubes: How internet routing security breaks down and how you can do it at home

    Lane Broadbent
    Sun, 13:00 - 13:45
    101 Track
  • U
  • UEFI exploitation for the masses

    Jesse Michael, Mickey Shkatov
    Fri, 14:00 - 14:45
    101 Track
  • V
  • Vulnerable Out of the Box: An Evaluation of Android Carrier Devices

    Ryan Johnson, Angelos Stavrou
    Fri, 12:00 - 12:45
    Track 1
  • W
  • WAGGING THE TAIL—COVERT PASSIVE SURVEILLANCE AND HOW TO MAKE THEIR LIFE DIFFICULT

    Si, Agent X
    Thu, 14:00 - 14:45
    101 Track
  • Weaponizing Unicode: Homographs Beyond IDNs

    The Tarquin
    Fri, 15:00 - 15:45
    101 Track
  • Welcome To DEF CON & Badge Maker Talk

    The Dark Tangent
    Fri, 10:00 - 10:45
    Track 1
  • What the Fax!?

    Yaniv Balmas, Eyal Itkin
    Sun, 15:00 - 15:45
    Track 2
  • Who Controls the Controllers—Hacking Crestron IoT Automation Systems

    Ricky Lawshae
    Fri, 12:00 - 12:45
    Track 3
  • Y
  • You can run, but you can't hide. Reverse engineering using X-Ray.

    George Tarnovsky
    Fri, 13:30 - 13:50
    101 Track
  • You'd better secure your BLE devices or we'll kick your butts !

    Damien Cauquil
    Sat, 12:00 - 12:45
    Track 2
  • You may have paid more than you imagine—Replay Attacks on Ethereum Smart Contracts

    Zhenxuan Bai, Kunzhe Chai, Senhua Wang, Yuwei Zheng
    Sat, 10:00 - 10:45
    Track 3
  • Your Bank's Digital Side Door

    Steven Danneman
    Fri, 17:00 - 17:45
    101 Track
  • You're just complaining because you're guilty: A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System

    Nathan Adams, Jerome Greco, Dr. Jeanna N. Matthews
    Sat, 10:00 - 10:45
    Track 2
  • Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability

    Shaokun Cao, Yunding Jian, Mingchuang Qun, Yuwei Zheng
    Fri, 16:00 - 16:45
    Track 1
  • Your Voice is My Passport

    Azeem Aqil, _delta_zero
    Fri, 16:00 - 16:45
    Track 3
  • Your Watch Can Watch You! Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch

    Hyoung-Kee Choi, Dongsung Kim
    Sun, 14:00 - 14:45
    Track 1