• 09:00
  • What's Lurking Inside MP3 Files That Can Hurt You?

    Michael Raggo
    Sun, 09:00 - 09:50
    Skytalks
  • 10:00
  • How to Do it Wrong: Smartphone Antivirus and Security Applications Under Fire

    Stephan Huber, Siegfried Rasthofer
    Sun, 10:00 - 10:50
    Track One
  • Hacking Hotel Keys and Point of Sale Systems: Attacking Systems Using Magnetic Secure Transmission

    Weston Hecker
    Sun, 10:00 - 10:50
    Track Two
  • Examining the Internet's pollution

    Karyn Benson
    Sun, 10:00 - 10:50
    Track Three
  • How to get good seats in the security theater? Hacking boarding passes for fun and profit.

    Przemek Jaroszewski
    Sun, 10:00 - 10:50
    DEF CON 101
  • The Other Way to Get a Hairy Hand; or, Contracts for Hackers

    Brendan O’Connor
    Sun, 10:00 - 10:50
    Skytalks
  • Heavy Duty Networks vs Light Duty

     
    Sun, 10:00 - 10:50
    Car Hacking Village
  • 0-day Hunting

     
    Sun, 10:00 - 11:00
    IoT Village
  • The Live SEPodcast

     
    Sun, 10:00 - 12:00
    Social Engineering Village
  • 10:30
  • CRISPR/Cas9: Newest Tools for Biohacking fun

    Dr. Thomas P. Keenan
    Sun, 10:30 - 10:55
    BioHacking Vilage
  • 11:00
  • Hiding Wookiees in HTTP - HTTP smuggling is a thing we should know better and care about

    regilero
    Sun, 11:00 - 11:50
    Track One
  • Discovering and Triangulating Rogue Cell Towers

    Eric Escobar
    Sun, 11:00 - 11:50
    Track Two
  • Use Their Machines Against Them: Loading Code with a Copier

    Mike
    Sun, 11:00 - 11:50
    Track Three
  • Vulnerabilities 101: How to Launch or Improve Your Vulnerability Research Game

    Steve Christey Coley, Joshua Drake
    Sun, 11:00 - 11:50
    DEF CON 101
  • Front Door Nightmare

    obiwan666
    Sun, 11:00 - 11:50
    Skytalks
  • IoT Defenses - Software, Hardware, Wireless and Cloud

     
    Sun, 11:00 - 12:00
    Village Talks
  • Hacking Sensory Perception

    Scott Novich
    Sun, 11:00 - 11:25
    BioHacking Vilage
  • 11:10
  • Building a Local Passive DNS Tool for Threat Intelligence Research

    Kathy Wang
    Sun, 11:10 - 12:00
    Packet Hacking Village
  • 11:30
  • Managing Digital Codesigning Identities in an Engineering Company

    Evgeny Sidorov, Eldar Zaitov
    Sun, 11:30 - 12:00
    Crypto and Privacy Village
  • Implants (3)

    Amal Graafstra
    Sun, 11:30 - 11:55
    BioHacking Vilage
  • 12:00
  • Attacking BaseStations - an Odyssey through a Telco's Network

    Brian Butterly, Hendrik Schmidt
    Sun, 12:00 - 12:50
    Track One
  • Let’s Get Physical: Network Attacks Against Physical Security Systems

    Ricky Lawshae
    Sun, 12:00 - 12:50
    Track Two
  • Game over, man! – Reversing Video Games to Create an Unbeatable AI Player

    Dan Petro
    Sun, 12:00 - 12:50
    Track Three
  • So You Think You Want To Be a Penetration Tester

    Anch
    Sun, 12:00 - 12:50
    DEF CON 101
  • Active Incident Response

    brain, xian
    Sun, 12:00 - 12:50
    Skytalks
  • Crypto for Criminals - The OPSEC Concerns in Using Cryptography

    John Bambenek
    Sun, 12:00 - 12:30
    Crypto and Privacy Village
  • EagleCAD Basics

     
    Sun, 12:00 - 13:00
    Hardware Hacking Village
  • Wireless Capture the Flag

     
    Sun, 12:00 - 12:50
    Wireless Village
  • My Usability Goes to 11": A Hacker's Guide to User Experience Research

    Greg Norcie
    Sun, 12:00 - 13:00
    Village Talks
  • 12:10
  • LTE and Its Collective Insecurity

    Chuck McAuley, Chris Moore
    Sun, 12:10 - 13:00
    Packet Hacking Village
  • 12:30
  • Backdooring Cryptocurrencies: The Underhanded Crypto Contest Winners

    Adam Caudill, Taylor Hornby
    Sun, 12:30 - 13:00
    Crypto and Privacy Village
  • 13:00
  • Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-driving Vehicle

    Jianhao Liu, Wenyuan Xu, Chen Yan
    Sun, 13:00 - 13:50
    Track One
  • Drones Hijacking - multi-dimensional attack vectors and countermeasures

    Aaron Luo
    Sun, 13:00 - 13:50
    Track Two
  • Backdooring the Frontdoor

    Jmaxxz
    Sun, 13:00 - 13:50
    Track Three
  • Mouse Jiggler Offense and Defense

    Dr. Phil
    Sun, 13:00 - 13:50
    DEF CON 101
  • Homologation - Friend or Frenemy?

    Headless Chook, Shane Kemper
    Sun, 13:00 - 13:50
    Skytalks
  • Attention Hackers: Cannabis Needs Your Help!

    Michael Zaytsev
    Sun, 13:00 - 13:25
    BioHacking Vilage
  • 13:10
  • Incident Code Name: When SkyFalls A Shaken, Not Stirred, James Bond Tale on Incident Response

    Plug
    Sun, 13:10 - 14:00
    Packet Hacking Village
  • 13:30
  • Nootropics: Better Living Through Chemistry or Modern-Day Prometheus

    GingerBread Man
    Sun, 13:30 - 13:55
    BioHacking Vilage
  • 14:00
  • Help, I've got ANTs!!!

    Tamas Szakaly
    Sun, 14:00 - 14:50
    Track One
  • An Introduction to Pinworm: Man in the Middle for your Metadata

    bigezy, saci
    Sun, 14:00 - 14:50
    Track Two
  • VLAN hopping, ARP Poisoning and Man-In-The-Middle Attacks in Virtualized Environments

    Ronny L. Bull, Dr. Jeanna N. Matthews, Ms. Kaitlin A. Trumbull
    Sun, 14:00 - 14:50
    Track Three
  • Toxic Proxies - Bypassing HTTPS and VPNs to Pwn Your Online Identity

    Alex Chapman, Paul Stone
    Sun, 14:00 - 14:50
    DEF CON 101
  • Ads and Messengers: Exploit Me How You Can

    Ghareeb Saadeldin, Mohamed Saher
    Sun, 14:00 - 14:50
    Skytalks
  • 15:00
  • Stumping the Mobile Chipset

    Adam Donenfeld
    Sun, 15:00 - 15:50
    Track One
  • Cyber Grand Shellphish

    Antonio Bianchi, Kevin Borgolte, Jacopo Corbetta, Francesco Disperati, Andrew Dutcher, Aravind Machiry, Chris Salls, Yan Shoshitaishvili, Nick Stephens, Giovanni Vigna, Fish Wang
    Sun, 15:00 - 15:50
    Track Two
  • Platform agnostic kernel fuzzing

    Georgi Geshev, James Loureiro
    Sun, 15:00 - 15:50
    Track Three
  • Auditing 6LoWPAN Networks using Standard Penetration Testing Tools

    Jonathan-Christofer Demay, Arnaud Lebrun, Adam Reziouk
    Sun, 15:00 - 15:50
    DEF CON 101
  • 16:30
  • Closing Ceremonies

    Dark Tangent
    Sun, 16:30 - 17:50
    Track One