Weaponizing Hypervisors to Fight and Beat Car and Medical Devices Attacks
Rise of the Hypebots: Scripting Streetwear
Information Security in the Public Interest
EDR Is Coming; Hide Yo Sh!t
Your Car is My Car
HAKC THE POLICE
Hacking Your Thoughts - Batman Forever meets Black Mirror
Meticulously Modern Mobile Manipulations
How You Can Buy AT&T, T-Mobile, and Sprint Real-Time Location Data on the Black Market
Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming
Why You Should Fear Your “mundane” Office Equipment
Zombie Ant Farm: Practical Tips for Playing Hide and Seek with Linux EDRs
RACE - Minimal Rights and ACE for Active Directory Dominance
GSM: We Can Hear Everyone Now!
Tag-side attacks against NFC
SSO Wars: The Token Menace
SELECT code_execution FROM * USING SQLite;—Gaining code execution using a malicious SQLite database
I'm on your phone, listening - Attacking VoIP Configuration Interfaces
Zero bugs found? Hold my Beer AFL! How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets
Next Generation Process Emulation with Binee
Get off the Kernel if you can’t Drive
Reverse-Engineering 4g Hotspots for Fun, Bugs and Net Financial Loss
State of DNS Rebinding - Attack & Prevention Techniques and the Singularity of Origin
.NET Malware Threats: Internals And Reversing
Reverse Engineering 17+ Cars in Less Than 10 Minutes
NOC NOC. Who's there? All. All who? All the things you wanted to know about the DEF CON NOC and we won't tell you about
Confessions of an Nespresso Money Mule: Free Stuff & Triangulation Fraud
Vacuum Cleaning Security—Pinky and the Brain Edition
Unpacking Pkgs: A Look Inside Macos Installer Packages And Common Security Flaws
Go NULL Yourself or: How I Learned to Start Worrying While Getting Fined for Other’s Auto Infractions
Apache Solr Injection
Meet the EFF - Meetup Panel
We Hacked Twitter… And the World Lost Their Sh*t Over It!