The Trials & Tribulations of an Infosec Pro in the Government Sector
Feds and 0Days: From Before Heartbleed to After FBI-Apple
DARPA Cyber Grand Challenge Award Ceremony
Introduction the Wichcraft Compiler Collection : Towards Universal Code Theft
BSODomizer HD: A Mischievous FPGA and HDMI Platform for the (M)asses
Automated DNS Data Exfiltration and Mitigation
Vehicle-to-Infrastructure (V2X)
Use JTAG tools to get root on a Raspberry Pi
Wireless Capture the Flag Inbrief
Future Grind
Exploiting a Smart Fridge: a Case Study in Kinetic Cyber
Tabletop Cryptography
Fancy Dancy Implanty
Compelled Decryption - State of the Art in Doctrinal Perversions
Project CITL
DEF CON Welcome & Badge Talk
Meet the Feds
DNS Greylisting for Phun and Phishing Prevention
The Mitsubishi Hack Explained
This Year in Crypto & Privacy
Reversing LoRa: Deconstructing a Next-Gen Proprietary LPWAN
Biosafety for the Home Enthusiast
Presenting Security Metrics to the Board / Leadership
TBA
Implants
Honey Onions: Exposing Snooping Tor HSDir Relays
Blockfighting with a Hooker -- BlockfFghter2!
CAN i haz car secret plz?
411: A framework for managing security alerts
Accessibility: A Creative Solution to Living Without Sight
Hacking the CHV Badge / Using Yard Stick One for FOB Fun
Practical Text-Based Steganography: Exfiltrating Data from Secure Networks and Socially Engineering SecOps Analysts [WORKSHOP]
Building malicious hardware out of analog circuits
How Do I "BLE Hacking"?
Biohacking for National Security
FCC 5G/IoT Security Policy Objectives
Deceive and Succeed: Measuring the Efficiency of a Deception Eco-System in Post-Breach Detection
Frontrunning the Frontrunners
Cheap Tools for Hacking Heavy Trucks
Handing Full Control of the Radio Spectrum Over to the Machines
Flavor-Tripping: a Whole New Way to Taste!
Research on the Machines: Help the FTC Protect Privacy & Security
(Ab)using Smart Cities: The Dark Age of Modern Mobility
How to Make Your Own DEF CON Black Badge
Sentient Storage - Do SSDs Have a Mind of Their Own?
A Guide to Outsmarting the Machines
When Privacy Goes Poof! Why It's Gone and Never Coming Back
Introducing the HackMeRF
Sense & Avoid: Some laws to know before you break IoT
Adding Ramparts to your Bastille: An Introduction to SELinux Hardening
How to Design Distributed Systems Resilient Despite Malicious Participants
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
Direct Memory Attack the Kernel
Anti-Forensics AF
Financial Crime: Past, Present, and Future
Lessons from the Hacking of Ashley Madison
Picking Bluetooth Low Energy Locks from a Quarter Mile Away
Detecting and Finding Rogue Access Points
You Are Being Manipulated
How to Remote Control an Airliner: SecurityFLawsin Avionics
Slouching Towards Utopia: The State of the Internet Dream
The Remote Metamorphic Engine: Detecting, Evading, Attacking the AI and Reverse Engineering
Eavesdropping on the Machines
Breaking Payment Points of Interaction
Instegogram: Exploiting Instagram for C2 via Image Steganography
The Covert Cupid Under .11 Veil !!! /* Approach for Covert WIFI */
BtleJuice: the Bluetooth Smart Man In The Middle Framework
Rise of the Lovetron9000
Connections: Eisenhower and the Internet
Introducing Man In The Contacts attack to trick encrypted messaging apps
Robot Hacks Video Games: How TASBot Exploits Consoles with Custom Controllers
Side-channel Attacks on High-security Electronic Safe Locks
Breaking the Internet of Vibrating Things : What We Learned Reverse Engineering Bluetooth- and Internet-Enabled Adult Toys
101 Ways to Brick your Hardware
Why Snowden's Leaks Were Inevitable
Getting Started with Cryptography in Python [WORKSHOP]
TBD
Does Cultural differences become a barrier for social engineering?
Kickin' It Old Skool: SDR for Ye Olde Signals
Is Your Internet Light On? Protecting Consumers in the Age of Connected Everything
To Beat the Toaster, You Must Become the Toaster: How to Show AI Who's Boss in the Robot Apocalypse
Automated Dorking for Fun and Profit^WSalary
Samsung Pay: Tokenized Numbers, Flaws and Issues
MR. ROBOT Panel
Hacking Next-Gen ATM's From Capture to Cashout
Sk3wlDbg: Emulating All (well many) of the Things with Ida
Malware Command and Control Channels: A journey into darkness
Lie to Me - LIE TO THEM - Chronicles of "How to save $ at the Strip Club"
Live Drone RF Reverse Engineering
The Wizard of Oz – Painting a reality through deception
Revocation, the Frailty of PKI
Video Games Can Teach Science: ScienceGameCenter.org
Verifying IPS Coverage Claims: Here's How
privacy by design - it's n0t that difficult
Slack as Intelligence Collector or "how anime cons get weird"
State of the Curve: 2016
7 Jedi Mind Tricks: Influence Your Target With Out A Word
I Amateur Radio (And So Can You!)
Security Logs Aren't Enough: Logging for User Data Protection
BioHacking and Mortal Limitations
Crawling for APIs
US Interrogation Techniques and Social Engineering
How to backdoor Diffie-Hellman
You are being manipulated