• 10:00
  • A Hacker’s Guide to Risk

    Bruce Potter
    Sat, 10:00 - 10:50
    DEF CON 101
  • Scared Poopless – LTE and *your* laptop

    Jesse Michael, Mickey Shkatov
    Sat, 10:00 - 10:50
    Track One
  • ThunderStrike 2: Sith Strike

    Trammel Hudson, Corey Kallenberg, Xeno Kovah
    Sat, 10:00 - 10:50
    Track Two
  • Do Export Controls on “Intrusion Software” Threaten Vulnerability Research?

    Collin Anderson, Tom Cross
    Sat, 10:00 - 10:50
    Track Three
  • Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities

    Aditya K. Sood
    Sat, 10:00 - 10:50
    Track Four
  • 11:00
  • And That's How I Lost My Other Eye: Further Explorations In Data Destruction

    Zoz
    Sat, 11:00 - 11:50
    DEF CON 101
  • Key-Logger, Video, Mouse — How To Turn Your KVM Into a Raging Key-logging Monster

    Yaniv Balmas, Lior Oppenheim
    Sat, 11:00 - 11:50
    Track One
  • Machine vs. Machine: Inside DARPA’s Fully Automated CTF

    Mike Walker, Jordan Wiens
    Sat, 11:00 - 11:50
    Track Two
  • 'DLL Hijacking' on OS X? #@%& Yeah!

    Patrick Wardle
    Sat, 11:00 - 11:50
    Track Three
  • QARK: Android App Exploit and SCA Tool

    Tushar Dalvi, Tony Trummer
    Sat, 11:00 - 11:50
    Track Four
  • 12:00
  • Are We Really Safe? - Bypassing Access Control Systems

    Dennis Maldonado
    Sat, 12:00 - 12:50
    DEF CON 101
  • Hacking Smart Safes: On the "Brink" of a Robbery

    Dan Petro, Oscar Salazar
    Sat, 12:00 - 12:50
    Track One
  • F*ck the attribution, show us your .idb!

    Claudio Guarnieri, Morgan Marquis-Boire, Marion Marschalek
    Sat, 12:00 - 12:50
    Track Two
  • I Hunt Penetration Testers: More Weaknesses in Tools and Procedures

    Wesley McGrew
    Sat, 12:00 - 12:50
    Track Three
  • Chigula — a framework for Wi-Fi Intrusion Detection and Forensics

    Vivek Ramachandran
    Sat, 12:00 - 12:50
    Track Four
  • 13:00
  • It's The Only Way To Be Sure: Obtaining and Detecting Domain Persistence

    Grant Bugher
    Sat, 13:00 - 13:50
    DEF CON 101
  • Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simplex Data Service

    Colby Moore
    Sat, 13:00 - 13:50
    Track One
  • Angry Hacking - the next generation of binary analysis

    Yan Shoshitaishvili, Fish Wang
    Sat, 13:00 - 13:50
    Track Two
  • WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis

    William Ballenthin, Matthew Graeber, Claudiu Teodorescu
    Sat, 13:00 - 14:50
    Track Three
  • From 0 To Secure In 1 Minute — Securing IAAS

    Moshe Ferber, Nir Valtman
    Sat, 13:00 - 13:50
    Track Four
  • 14:00
  • Abusing XSLT for Practical Attacks

    Fernando Arnaboldi
    Sat, 14:00 - 14:50
    DEF CON 101
  • Extracting the Painful (blue)tooth

    Matteo Beccaro, Matteo Collura
    Sat, 14:00 - 14:50
    Track One
  • Remote Exploitation of an Unaltered Passenger Vehicle

    Charlie Miller, Christopher Valasek
    Sat, 14:00 - 14:50
    Track Two
  • BurpKit - Using WebKit to Own the Web

    Nadeem Douba
    Sat, 14:00 - 14:50
    Track Four
  • 15:00
  • Extending Fuzzing Grammars to Exploit Unexplored Code Paths in Modern Web Browsers

    Saif El-Sherei, Etienne Stalmans
    Sat, 15:00 - 15:50
    DEF CON 101
  • Looping Surveillance Cameras through Live Editing of Network Streams

    Eric Van Albert, Zach Banks
    Sat, 15:00 - 15:50
    Track One
  • Hacking Electric Skateboards: Vehicle Research For Mortals

    Richo Healey, Mike Ryan
    Sat, 15:00 - 15:50
    Track Two
  • High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC

    Joshua Smith
    Sat, 15:00 - 15:50
    Track Three
  • Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web

    Peter Eckersley, James Kasten, Yan Zhu
    Sat, 15:00 - 15:50
    Track Four
  • 16:00
  • How to Shot Web: Web and mobile hacking in 2015

    Jason Haddix
    Sat, 16:00 - 16:50
    DEF CON 101
  • Switches Get Stitches

    Colin Cassidy, Robert M. Lee, Éireann Leverett
    Sat, 16:00 - 16:50
    Track One
  • I want these * bugs off my * Internet

    Dan Kaminsky
    Sat, 16:00 - 16:50
    Track Two
  • Investigating the Practicality and Cost of Abusing Memory Errors with DNS

    Luke Young
    Sat, 16:00 - 16:50
    Track Three
  • NSA Playset: JTAG Implants

    Joe FitzPatrick, Matt King
    Sat, 16:00 - 16:50
    Track Four
  • 17:00
  • The Bieber Project: Ad Tech 101, Fake Fans and Adventures in Buying Internet Traffic

    Mark Ryan Del Moral Talabis
    Sat, 17:00 - 17:50
    DEF CON 101
  • Exploring Layer 2 Network Security in Virtualized Environments

    Ronny L. Bull, Dr. Jeanna N. Matthews
    Sat, 17:00 - 17:50
    Track One
  • Security Necromancy: Further Adventures in Mainframe Hacking

    Chad Rikansrud, Philip Young
    Sat, 17:00 - 17:50
    Track Two
  • 802.11 Massive Monitoring

    Andres Blanco, Andres Gazzoli
    Sat, 17:00 - 17:50
    Track Three
  • Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0

    Richard Thieme
    Sat, 17:00 - 17:50
    Track Four
  • 18:00
  • Game of Hacks: Play, Hack & Track

    Amit Ashbel, Maty Siman
    Sat, 18:00 - 18:50
    DEF CON 101
  • Staying Persistent in Software Defined Networks

    Gregory Pickett
    Sat, 18:00 - 18:50
    Track One
  • Ask the EFF: The Year in Digital Civil Liberties

    Nate Cardozo, Peter Eckersley, Mark Jaycox, Nadia Kayyali, Corynne McSherry, Kurt Opsahl
    Sat, 18:00 - 19:50
    Track Two
  • DEF CON Comedy Inception: How many levels deep can we go?

    Amanda Berlin, Chris Blow, Adam Crain, Katie Moussouris, Larry Pesce, Chris Sistrunk, Dan Tentler
    Sat, 18:00 - 19:50
    Track Three
  • DIY Nukeproofing: a new dig at "data-mining"

    3AlarmLampscooter
    Sat, 18:00 - 18:50
    Track Four
  • 19:00
  • Linux Containers: Future or Fantasy?

    Aaron Grattafiori
    Sat, 19:00 - 19:50
    DEF CON 101
  • I’m A Newbie Yet I Can Hack ZigBee – Take Unauthorized Control Over ZigBee Devices

    LI Jun, YANG Qing
    Sat, 19:00 - 19:50
    Track Four