macOS/iOS Kernel Debugging and Heap Feng Shui
Welcome to DEF CON 25
The Brain's Last Stand
Secret Tools: Learning about Government Surveillance Software You Can't Ever See
Welcome - Friday
Offensive Malware Analysis: Dissecting OSX/FruitFly via a Custom C&C Server
Hacking travel routers like it's 1999
Panel: Meet The Feds
Hacking on Multiparty Computation
Rage Against the Weaponized AI Propaganda Machine
Weaponizing the BBC Micro:Bit
Hacking Smart Contracts
SHA-3 vs the world
WS: Mansion Apartment Shack House: How To Explain Crypto To Practic
CITL and the Digital Standard - A Year Later
Open Source Safe Cracking Robots - Combinations Under 1 Hour! (Is it bait? Damn straight it is.)
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!
Hacking Democracy: A Socratic Dialogue
Alice and Bob are Slightly Less Confused
WS: Breaking the Uber Badge Ciphers
Controlling IoT devices with crafted radio signals
Teaching Old Shellcode New Tricks
Starting the Avalanche: Application DoS In Microservice Architectures
Next-Generation Tor Onion Services
Protecting Users' Privacy in a Location-Critical Enterprise: The Ch
WS: FeatherDuster and Cryptanalib workshop
Using GPS Spoofing to control time
Death By 1000 Installers; on macOS, it's all broken!
Breaking the x86 Instruction Set
How we created the first SHA-1 collision and what it means for hash security
Breaking TLS: A Year in Incremental Privacy Improvements
Assembly Language is Too High Level
Phone system testing and other fun tricks
Dark Data
Abusing Certificate Transparency Logs
A New Political Era: Time to start wearing tin-foil hats following
WS: NoiseSocket: Extending Noise to Make Every TCP Connection Secur
Radio Exploitation 101: Characterizing, Contextualizing, and Applying Wireless Attack Methods
The Adventures of AV and the Leaky Sandbox
An ACE Up the Sleeve: Designing Active Directory DACL Backdoors
"Tick, Tick, Tick. Boom! You're Dead." — Tech & the FTC
Security Analysis of the Telegram IM
Underhanded Crypto Announcement
Cryptanalysis in the Time of Ransomware
Cisco Catalyst Exploitation
Panel: DEF CON Groups
MEATPISTOL, A Modular Malware Implant Framework
The Internet Already Knows I'm Pregnant
WS: Supersingular Isogeny Diffie-Hellman
Unfairplay (NOT RECORDED)
Hacking Democracy
Horror stories of a translator and how a tweet can start a war with less than 140 characters
Panel - An Evening with the EFF