The Mouse is Mightier than the Sword
Rock appround the clock: Tracking malware developers by Android "AAPT" timezone disclosure bug
Defending the 2018 Midterm Elections from Foreign Adversaries
For the Love of Money: Finding and exploiting vulnerabilities in mobile point of sales systems
Searching for the Light: Adventures with OpticSpy
Breaking Extreme Networks WingOS: How to own millions of devices running on Aircrafts, Government, Smart cities and more.
Politics and the Surveillance State. The story of a young politician's successful efforts to fight surveillance and pass the nation's strongest privacy bills.
Demystifying MS17-010: Reverse Engineering the ETERNAL Exploits
Breaking Smart Speakers: We are Listening to You.
Last mile authentication problem: Exploiting the missing link in end-to-end secure communication
Attacking the macOS Kernel Graphics Driver
Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities
Trouble in the tubes: How internet routing security breaks down and how you can do it at home
Man-In-The-Disk
Micro-Renovator: Bringing Processor Firmware up to Code
barcOwned—Popping shells with your cereal box
Asura: A huge PCAP file analyzer for anomaly packets detection using massive multithreading
Lost and Found Certificates: dealing with residual certificates for pre-owned domains
Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparent Session Hijacking
Betrayed by the keyboard: How what you type can give you away
Your Watch Can Watch You! Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch
Hacking BLE Bicycle Locks for Fun and a Small Profit
One bite and all your dreams will come true: Analyzing and Attacking Apple Kernel Drivers
PANEL: DEF CON GROUPS
What the Fax!?
Fuzzing Malware For Fun & Profit. Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware
DEF CON Closing Ceremonies