Behind the Scenes of the DEF CON 27 Badge
Hacking Congress: The Enemy Of My Enemy Is My Friend
Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware
Duplicating Restricted Mechanical Keys
Don't Red-Team AI Like a Chump
The Tor Censorship Arms Race: The Next Chapter
All the 4G modules Could be Hacked
Evil eBPF In-Depth: Practical Abuses of an In-Kernel Bytecode Runtime
Process Injection Techniques - Gotta Catch Them All
Phreaking Elevators
Infiltrating Corporate Intranet Like NSA ̶Pre-auth RCE on Leading SSL VPNs
API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web
HackPac: Hacking Pointer Authentication in iOS User Space
HVACking: Understand the Difference Between Security and Reality!
No Mas – How One Side-Channel Flaw Opens Atm, Pharmacies and Government Secrets Up to Attack
More Keys Than A Piano: Finding Secrets In Publicly Exposed Ebs Volumes
Harnessing Weapons of Mac Destruction
Are Your Child's Records at Risk? The Current State of School Infosec
A Hacker Guide To Deep-Learning Based Side Channel Attacks
Practical Key Search Attacks Against Modern Symmetric Ciphers
MOSE: Using Configuration Management for Evil
Change the World, cDc Style: Cow tips from the first 35 years
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
Relaying Credentials Has Never Been Easier: How to Easily Bypass the Latest NTLM Relay Mitigations
Please Inject Me, a x64 Code Injection
I Know What You Did Last Summer: 3 Years of Wireless Monitoring at DEF CON
Surveillance Detection Scout - Your Lookout on Autopilot
The JOP ROCKET: A Supremely Wicked Tool for JOP Gadget Discovery, or What to Do If ROP Is Too Easy
Poking the S in SD cards
Can You Track Me Now? Why The Phone Companies Are Such A Privacy Disaster
Breaking The Back End! It Is Not Always A Bug. Sometimes, It Is Just Bad Design!
Re: What's up Johnny? – Covert Content Attacks on Email End-to-End Encryption
D0 N0 H4RM: A Healthcare Security Conversation
Panel: DEF CON Groups