• 10:00
  • Abusing native Shims for Post Exploitation

    Sean Pierce
    Sun, 10:00 - 10:50
    DEF CON 101
  • Abusing Adobe Reader’s JavaScript APIs

    Brian Gorenc, Abdul-Aziz Hariri, Jasiel Spelman
    Sun, 10:00 - 10:50
    Track One
  • Docker, Docker, Give Me The News, I Got A Bad Case Of Securing You

    David Mortman
    Sun, 10:00 - 10:50
    Track Two
  • How to Hack Government: Technologists as Policy Makers

    Terrell McSweeny, Ashkan Soltani
    Sun, 10:00 - 10:50
    Track Three
  • 11:00
  • Ubiquity Forensics - Your iCloud and You

    Sarah Edwards
    Sun, 11:00 - 11:50
    DEF CON 101
  • Who Will Rule the Sky? The Coming Drone Policy Wars

    Matt Cagle, Eric Cheng
    Sun, 11:00 - 11:50
    Track One
  • Canary: Keeping Your Dick Pics Safe(r)

    Rob Bathurst, Jeff Thomas
    Sun, 11:00 - 11:50
    Track Two
  • REpsych: Psychological Warfare in Reverse Engineering

    Christopher Domas
    Sun, 11:00 - 11:50
    Track Three
  • 12:00
  • Hijacking Arbitrary .NET Application Control Flow

    Topher Timzen
    Sun, 12:00 - 12:50
    DEF CON 101
  • Knocking my neighbor’s kid’s cruddy drone offline

    Michael Robinson
    Sun, 12:00 - 12:50
    Track One
  • Pivoting Without Rights – Introducing Pivoter

    David Kennedy, Geoff Walton
    Sun, 12:00 - 12:50
    Track Two
  • Stick That In Your (root)Pipe & Smoke It

    Patrick Wardle
    Sun, 12:00 - 12:50
    Track Three
  • 13:00
  • RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID

    Francis Brown, Shubham Shah
    Sun, 13:00 - 13:50
    DEF CON 101
  • Attacking Hypervisors Using Firmware and Hardware

    Oleksandr Bazhaniuk, Yuriy Bulygin, Andrew Furtak, Mikhail Gorobets, Alexander Matrosov
    Sun, 13:00 - 13:50
    Track One
  • Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts

    Omer Coskun
    Sun, 13:00 - 13:50
    Track Two
  • "Quantum" Classification of Malware

    John Seymour
    Sun, 13:00 - 13:50
    Track Three
  • 14:00
  • Contest Closing Ceremonies

     
    Sun, 14:00 - 16:20
    DEF CON 101
  • Inter-VM data exfiltration: The art of cache timing covert channel on x86 multi-core

    Etienne Martineau
    Sun, 14:00 - 14:50
    Track One
  • Let's Talk About SOAP, Baby. Let's Talk About UPNP

    Ricky Lawshae
    Sun, 14:00 - 14:50
    Track Two
  • Advances in Linux Process Forensics Using ECFS

    Ryan O'Neill
    Sun, 14:00 - 14:50
    Track Three
  • 16:30
  • Closing Ceremonies

     
    Sun, 16:30 - 18:00
    Track One