DEF CON 27 - Thursday, August 8
10:00
Yair
Exploiting Windows Exploit Mitigation for ROP Exploits
11:00
Li, Qian, Wu
Breaking Google Home: Exploit It with SQLite(Magellan)
12:00
Baumhof
Are Quantum Computers Really A Threat To Cryptography? A Practical Overview Of Current State-Of-The-Art Techniques With Some Interesting Surprises
13:00
Laulheret
Intro to Embedded Hacking—How you too can find a decade old bug in widely deployed devices. [REDACTED] Deskphones, a case study.
14:00
Qin, Wang, Zhou
Web2Own: Attacking Desktop Apps From Web Security's Perspective
15:00
Highwiz, Jacobs, n00bz, Nikita, Shaggy, Tottenkoph, Will
DEF CON 101 Panel
DEF CON 27 - Friday, August 9
10:00
Grand
Behind the Scenes of the DEF CON 27 Badge
Ellis, Harman, Langevin, Lieu, Thomas
Hacking Congress: The Enemy Of My Enemy Is My Friend
Bilodeau, Paquet-Clouston
Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware
Graydon, Graydon
Duplicating Restricted Mechanical Keys
11:00
Herbert-Voss
Don't Red-Team AI Like a Chump
Dingledine
The Tor Censorship Arms Race: The Next Chapter
Huang, Hui, Zhang
All the 4G modules Could be Hacked
Dileo
Evil eBPF In-Depth: Practical Abuses of an In-Kernel Bytecode Runtime
12:00
Klein, Kotler
Process Injection Techniques - Gotta Catch Them All
WillC
Phreaking Elevators
Chang, Tsai
Infiltrating Corporate Intranet Like NSA ̶Pre-auth RCE on Leading SSL VPNs
Maddux
API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web
13:00
Bai, Zheng
HackPac: Hacking Pointer Authentication in iOS User Space
Bereza, McKee
HVACking: Understand the Difference Between Security and Reality!
Davis
No Mas – How One Side-Channel Flaw Opens Atm, Pharmacies and Government Secrets Up to Attack
Morris
More Keys Than A Piano: Finding Secrets In Publicly Exposed Ebs Volumes
14:00
Wardle
Harnessing Weapons of Mac Destruction
Demirkapi
Are Your Child's Records at Risk? The Current State of School Infosec
Bursztein, Picod
A Hacker Guide To Deep-Learning Based Side Channel Attacks
Crowley, Pagan
Practical Key Search Attacks Against Modern Symmetric Ciphers
15:00
Grace
MOSE: Using Configuration Management for Evil
Menn, Omega, Rioux, Vegetable, Zatko
Change the World, cDc Style: Cow tips from the first 35 years
Cui, Housley, Kataria
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
Simakov, Zinar
Relaying Credentials Has Never Been Easier: How to Easily Bypass the Latest NTLM Relay Mitigations
16:00
Weinberg
Please Inject Me, a x64 Code Injection
Spicer
I Know What You Did Last Summer: 3 Years of Wireless Monitoring at DEF CON
Kain
Surveillance Detection Scout - Your Lookout on Autopilot
Brizendine, Stroschien
The JOP ROCKET: A Supremely Wicked Tool for JOP Gadget Discovery, or What to Do If ROP Is Too Easy
16:30
Oberli
Poking the S in SD cards
Wyden
Can You Track Me Now? Why The Phone Companies Are Such A Privacy Disaster
Pickett
Breaking The Back End! It Is Not Always A Bug. Sometimes, It Is Just Bad Design!
Müller
Re: What's up Johnny? – Covert Content Attacks on Email End-to-End Encryption
20:00
Dameff, Moe, Radcliffe, Rios, Schwartz, Tully
D0 N0 H4RM: A Healthcare Security Conversation
22:15
Bourbonnais, Darington, Roberts, s0ups, Street, White, Wright
Panel: DEF CON Groups
DEF CON 27 - Saturday, August 10
10:00
Islam, Regalado
Weaponizing Hypervisors to Fight and Beat Car and Medical Devices Attacks
finalphoenix
Rise of the Hypebots: Scripting Streetwear
Schneier
Information Security in the Public Interest
Leibowitz, Timzen
EDR Is Coming; Hide Yo Sh!t
11:00
Jmaxxz
Your Car is My Car
Swearingen
HAKC THE POLICE
Pratt
Hacking Your Thoughts - Batman Forever meets Black Mirror
Jacobs
Meticulously Modern Mobile Manipulations
12:00
Cox
How You Can Buy AT&T, T-Mobile, and Sprint Real-Time Location Data on the Black Market
Cauquil
Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming
Rivas, Romero
Why You Should Fear Your “mundane” Office Equipment
Snezhkov
Zombie Ant Farm: Practical Tips for Playing Hide and Seek with Linux EDRs
13:00
Mittal
RACE - Minimal Rights and ACE for Active Directory Dominance
Buckley, Kulikowski, Murray
GSM: We Can Hear Everyone Now!
Wade
Tag-side attacks against NFC
Mirosh, Muñoz
SSO Wars: The Token Menace
14:00
Gull
SELECT code_execution FROM * USING SQLite;—Gaining code execution using a malicious SQLite database
Huber, Roskosch
I'm on your phone, listening - Attacking VoIP Configuration Interfaces
Shudrak
Zero bugs found? Hold my Beer AFL! How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets
Gwinnup, Holowczak
Next Generation Process Emulation with Binee
15:00
Michael, Shkatov
Get off the Kernel if you can’t Drive
richter
Reverse-Engineering 4g Hotspots for Fun, Bugs and Net Financial Loss
Doussot, Meyer
State of DNS Rebinding - Attack & Prevention Techniques and the Singularity of Origin
Borges
.NET Malware Threats: Internals And Reversing
16:00
Stone
Reverse Engineering 17+ Cars in Less Than 10 Minutes
NOC NOC. Who's there? All. All who? All the things you wanted to know about the DEF CON NOC and we won't tell you about
Kollars
Confessions of an Nespresso Money Mule: Free Stuff & Triangulation Fraud
jiska, Ullrich
Vacuum Cleaning Security—Pinky and the Brain Edition
16:30
Grant
Unpacking Pkgs: A Look Inside Macos Installer Packages And Common Security Flaws
droogie
Go NULL Yourself or: How I Learned to Start Worrying While Getting Fined for Other’s Auto Infractions
Stepankin
Apache Solr Injection
20:00
Buttar, Cyphers, Fischer, Opsahl, Sheard
Meet the EFF - Meetup Panel
22:15
Carr, Godfrey
We Hacked Twitter… And the World Lost Their Sh*t Over It!
DEF CON 27 - Sunday, August 11
10:00
Berta
Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers
smea
Adventures In Smart Buttplug Penetration (testing)
Baker
Hacking WebAssembly Games with Binary Instrumentation
Liu, Zhang
Your Secret Files Are Mine: Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors
11:00
Barral, Géraud-Stewart, Jaloyan
The ABC of Next-Gen Shellcoding
Camara
SDR Against Smart TVs: URL and Channel Injection Attacks
Gong, Pi
Exploiting Qualcomm WLAN and Modem Over The Air
Itkin
Say Cheese - How I Ransomwared Your DSLR Camera
12:00
Mollema
I'm In Your Cloud... Pwning Your Azure Environement
Cohen, Waisel
Malproxying: Leave Your Malware at Home
Kettle
HTTP Desync Attacks: Smashing into the Cell Next Door
Baines
Help Me, Vulnerabilities. You're My Only Hope
13:00
Thompson
[ MI CASA-SU CASA ] My 192.168.1.1 is Your 192.168.1.1
Wixey
Sound Effects: Exploring Acoustic Cyber-weapons
Brocious, Sadeghipour
Owning The Cloud Through Server-Side Request Forgery
Athalye
Want Strong Isolation? Just Reset Your Processor
14:00
Roberts
Firmware Slap: Automating Discovery of Exploitable Vulnerabilities in Firmware
Dixon
Cheating in eSports: How to Cheat at Virtual Cycling Using USB Hacks
Luca, Mueller
The Ether Wars: Exploits, counter-exploits and honeypots on Ethereum
Contests Awards Ceremony
16:00
Tangent
Closing Ceremonies


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.