DEF CON 26 - Thursday, August 9
10:00
Phipps
ThinSIM-based Attacks on Mobile Money Systems
11:00
Dai, Gong, Yang
Pwning "the toughest target": the exploit chain of winning the largest bug bounty in the history of ASR program
12:00
Borges
Ring 0/-2 Rootkits: bypassing defenses
13:00
Burke
A Journey Into Hexagon: Dissecting a Qualcomm Baseband
14:00
Si, X
WAGGING THE TAIL—COVERT PASSIVE SURVEILLANCE AND HOW TO MAKE THEIR LIFE DIFFICULT
15:00
Champion, Law
Building the Hacker Tracker
15:30
HighWiz, Jericho, Nikita, Roamer, Shaggy, Sumner, Wiseacre
DEF CON 101 Panel
DEF CON 26 - Friday, August 10
10:00
Rozner
Synfuzz: Building a Grammar Based Re-targetable Test Generation Framework
Dark Tangent
Welcome To DEF CON & Badge Maker Talk
Caliskan, Greenstadt
De-anonymizing Programmers from Source Code and Binaries
Manfra
Securing our Nation's Election Infrastructure
10:30
m010ch_
Please do not Duplicate: Attacking the Knox Box and Other Keyed Alike Systems
11:00
McGrew
An Attacker Looks at Docker: Approaching Multi-Container Applications
Joyce
NSA Talks Cybersecurity
egypt, Vu
One-liners to Rule Them All
Huang, Li, Zeng
Lora Smart Water Meter Security Analysis
12:00
Gangwere
It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded devices for fun and profit
Johnson, Stavrou
Vulnerable Out of the Box: An Evaluation of Android Carrier Devices
Tsai
Breaking Paser Logic: Take Your Path Normalization Off and Pop 0days Out!
Lawshae
Who Controls the Controllers—Hacking Crestron IoT Automation Systems
13:00
zenofex
Dissecting the Teddy Ruxpin: Reverse Engineering the Smart Bear
Vigo
Compromising online accounts by cracking voicemail systems
Rousseau, Seymour
Finding Xori: Malware Analysis Triage with Automated Disassembly
Martin
One-Click to OWA
13:30
Tarnovsky
You can run, but you can't hide. Reverse engineering using X-Ray.
Kain
Dragnet—Your Social Engineering Sidekick
Huang, Liu, Xiao
Hacking the Brain: Customize Evil Protocol to Pwn an SDN Controller
Bai, Zheng
Fasten your seatbelts: We are escaping iOS 11 sandbox!
14:00
Michael, Shkatov
UEFI exploitation for the masses
Domas
GOD MODE UNLOCKED: Hardware Backdoors in [redacted] x86 CPUs
Holtmanns, Singh
4G—Who is paying your cellular phone bill?
Ossmann, Spill
Revolting Radios
15:00
Tarquin
Weaponizing Unicode: Homographs Beyond IDNs
Ryan
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Alguacil, Moya
Playback: a TLS 1.3 story
yawnbox
Privacy infrastructure, challenges and opportunities
16:00
Haken
Automated Discovery of Deserialization Gadget Chains
Cao, Jian, Qun, Zheng
Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability
singe
Practical & Improved Wifi MitM with Mana
Aqil, _delta_zero
Your Voice is My Passport
17:00
Danneman
Your Bank's Digital Side Door
Borges, Levinson
I'll See Your Missile and Raise You A MIRV: An overview of the Genesis Scripting Engine
DilDog, Grand, Mills, Mudge, Pond, Rogue, Silicosis, Tan
The L0pht Testimony, 20 Years Later (and Other Things You Were Afraid to Ask)
Buchwald, Nirenberg
Reverse Engineering, hacking documentary series
20:00
Cardozo, White
Disrupting the Digital Dystopia or What the hell is happening in computer law?
Corman, Dameff, Levchenko, MD, Nathans, Radcliffe, Suarez, Woods
D0 N0 H4RM: A Healthcare Security Conversation
Potter, Potter
Oh Noes! — A Role Playing Incident Response Game
DEF CON 26 - Saturday, August 11
10:00
Krotofil, Wetzels
Through the Eyes of the Attacker: Designing Embedded Systems Exploits for Industrial Control Systems
Ommeren, Paternotte
It WISN't me, attacking industrial wireless mesh networks
Adams, Greco, Matthews
You're just complaining because you're guilty: A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System
Bai, Chai, Wang, Zheng
You may have paid more than you imagine—Replay Attacks on Ethereum Smart Contracts
11:00
Alves
Hacking PLCs and Causing Havoc on Critical Infrastructures
Metcalf
Exploiting Active Directory Administrator Insecurities
Nafeez
Compression Oracle Attacks on VPN Networks
smea
Jailbreaking the 3DS through 7 years of hardening
12:00
Joyce
Building Absurd Christmas Light Shows
Hakimian, Riedesel
Tineola: Taking a Bite Out of Enterprise Blockchain
Cauquil
You'd better secure your BLE devices or we'll kick your butts !
Mitchell
Ridealong Adventures—Critical Issues with Police Body Cameras
13:00
Nevermoe
One Step Ahead of Cheaters -- Instrumenting Android Emulators
Sesterhenn
In Soviet Russia Smartcard Hacks You
Amiet, Romailler
Reaping and breaking keys at scale: when crypto meets big data
Marcelli
Looking for the perfect signature: an automatic YARA rules generation algorithm in the AI-era
13:30
Sharma
House of Roman—a "leakless" heap fengshui to achieve RCE on PIE Binaries
Domas
The ring 0 façade: awakening the processor's inner demons
0x200b
Detecting Blue Team Research Through Targeted Ads
Alex, Zach
Infecting The Embedded Supply Chain
14:00
Giese
Having fun with IoT: Reverse Engineering and Hacking of Xiaomi IoT Devices
Martin
SMBetray—Backdooring and breaking signatures
Colli, Izycki
Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from huge to little ones
Ma
Playing Malware Injection with Exploit thoughts
14:30
Mayhem
Sex Work After SESTA/FOSTA
Wardle
Fire & Ice: Making and Breaking macOS Firewalls
15:00
Cano
Project Interceptor: avoiding counter-drone systems with nanodrones
sghctoma
All your math are belong to us
Bulazel
Reverse Engineering Windows Defender's Emulator
hon1nbo, Levison
Booby Trapping Boxes
16:00
Crowley, Paredes, Savage
Outsmarting the Smart City
McKee
80 to 0 in under 5 seconds: Falsifying a medical patient's vitals
Arzt, Huber, Rasthofer
All your family secrets belong to us—Worrisome security issues in tracker apps
Eckert, Krause, Sumner
Inside the Fake Science Factory
17:00
Thieme
The Road to Resilience: How Real Hacking Redeems this Damnable Profession
Cano
Relocation Bonus: Attacking the Windows Loader Makes Analysts Switch Careers
20:00
Vincent
Privacy Is Equality—And It's Far from Dead
Donovan, Goerzen, Matthews
Beyond the Lulz: Black-Hat Trolling, White-Hat Trolling, Attacking and Defending Our Attention Landscape
Arrieta, Cardozo, Opsahl, Rodriguez, Sheard, Williams
EFF Fireside Hax (AKA Ask the EFF)
DEF CON 26 - Sunday, August 12
10:00
Wardle
The Mouse is Mightier than the Sword
Berta, Santos
Rock appround the clock: Tracking malware developers by Android "AAPT" timezone disclosure bug
Franklin, Franklin
Defending the 2018 Midterm Elections from Foreign Adversaries
Galloway, Yunusov
For the Love of Money: Finding and exploiting vulnerabilities in mobile point of sales systems
11:00
Grand
Searching for the Light: Adventures with OpticSpy
Rodriguez
Breaking Extreme Networks WingOS: How to own millions of devices running on Aircrafts, Government, Smart cities and more.
Zolnikov
Politics and the Surveillance State. The story of a young politician's successful efforts to fight surveillance and pass the nation's strongest privacy bills.
zerosum0x0
Demystifying MS17-010: Reverse Engineering the ETERNAL Exploits
12:00
HuiYu, Wenxiang
Breaking Smart Speakers: We are Listening to You.
Antikainen, Aura, Bui, Rao
Last mile authentication problem: Exploiting the missing link in end-to-end secure communication
Wang
Attacking the macOS Kernel Graphics Driver
Knight, Speers
Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities
13:00
Broadbent
Trouble in the tubes: How internet routing security breaks down and how you can do it at home
Makkaveev
Man-In-The-Disk
King
Micro-Renovator: Bringing Processor Firmware up to Code
magicspacekiwi, West
barcOwned—Popping shells with your cereal box
13:30
Ando
Asura: A huge PCAP file analyzer for anomaly packets detection using massive multithreading
Ayrey, Foster
Lost and Found Certificates: dealing with residual certificates for pre-owned domains
ldionmarcil
Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparent Session Hijacking
14:00
Wixey
Betrayed by the keyboard: How what you type can give you away
Choi, Kim
Your Watch Can Watch You! Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch
Tan
Hacking BLE Bicycle Locks for Fun and a Small Profit
Bai, Zheng
One bite and all your dreams will come true: Analyzing and Attacking Apple Kernel Drivers
15:00
Bourbonnais, Moss, Roberts, S0ups, Street, White, Wright
PANEL: DEF CON GROUPS
Balmas, Itkin
What the Fax!?
Shudrak
Fuzzing Malware For Fun & Profit. Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware
16:00
Dark Tangent
DEF CON Closing Ceremonies


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.