• 10:00
  • Synfuzz: Building a Grammar Based Re-targetable Test Generation Framework

    Joe Rozner
    Fri, 10:00 - 10:45
    101 Track
  • Welcome To DEF CON & Badge Maker Talk

    The Dark Tangent
    Fri, 10:00 - 10:45
    Track 1
  • De-anonymizing Programmers from Source Code and Binaries

    Dr. Aylin Caliskan, Rachel Greenstadt
    Fri, 10:00 - 10:45
    Track 2
  • Securing our Nation's Election Infrastructure

    Jeanette Manfra
    Fri, 10:00 - 10:20
    Track 3
  • 10:30
  • Please do not Duplicate: Attacking the Knox Box and Other Keyed Alike Systems

    m010ch_
    Fri, 10:30 - 10:50
    Track 3
  • 11:00
  • An Attacker Looks at Docker: Approaching Multi-Container Applications

    Wesley McGrew
    Fri, 11:00 - 11:45
    101 Track
  • NSA Talks Cybersecurity

    Rob Joyce
    Fri, 11:00 - 11:45
    Track 1
  • One-liners to Rule Them All

    egypt, William Vu
    Fri, 11:00 - 11:45
    Track 2
  • Lora Smart Water Meter Security Analysis

    Lin Huang, Jun Li, Yingtao Zeng
    Fri, 11:00 - 11:45
    Track 3
  • 12:00
  • It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded devices for fun and profit

    Morgan Gangwere
    Fri, 12:00 - 12:45
    101 Track
  • Vulnerable Out of the Box: An Evaluation of Android Carrier Devices

    Ryan Johnson, Angelos Stavrou
    Fri, 12:00 - 12:45
    Track 1
  • Breaking Paser Logic: Take Your Path Normalization Off and Pop 0days Out!

    Orange Tsai
    Fri, 12:00 - 12:45
    Track 2
  • Who Controls the Controllers—Hacking Crestron IoT Automation Systems

    Ricky Lawshae
    Fri, 12:00 - 12:45
    Track 3
  • 13:00
  • Dissecting the Teddy Ruxpin: Reverse Engineering the Smart Bear

    zenofex
    Fri, 13:00 - 13:20
    101 Track
  • Compromising online accounts by cracking voicemail systems

    Martin Vigo
    Fri, 13:00 - 13:20
    Track 1
  • Finding Xori: Malware Analysis Triage with Automated Disassembly

    Amanda Rousseau, Rich Seymour
    Fri, 13:00 - 13:20
    Track 2
  • One-Click to OWA

    William Martin
    Fri, 13:00 - 13:20
    Track 3
  • 13:30
  • You can run, but you can't hide. Reverse engineering using X-Ray.

    George Tarnovsky
    Fri, 13:30 - 13:50
    101 Track
  • Dragnet—Your Social Engineering Sidekick

    Truman Kain
    Fri, 13:30 - 13:50
    Track 1
  • Hacking the Brain: Customize Evil Protocol to Pwn an SDN Controller

    Jianwei Huang, Peng Liu, Feng Xiao
    Fri, 13:30 - 13:50
    Track 2
  • Fasten your seatbelts: We are escaping iOS 11 sandbox!

    Xiaolong Bai, Min Zheng
    Fri, 13:30 - 13:50
    Track 3
  • 14:00
  • UEFI exploitation for the masses

    Jesse Michael, Mickey Shkatov
    Fri, 14:00 - 14:45
    101 Track
  • GOD MODE UNLOCKED: Hardware Backdoors in [redacted] x86 CPUs

    Christopher Domas
    Fri, 14:00 - 14:45
    Track 1
  • 4G—Who is paying your cellular phone bill?

    Dr. Silke Holtmanns, Isha Singh
    Fri, 14:00 - 14:45
    Track 2
  • Revolting Radios

    Michael Ossmann, Dominic Spill
    Fri, 14:00 - 14:45
    Track 3
  • 15:00
  • Weaponizing Unicode: Homographs Beyond IDNs

    The Tarquin
    Fri, 15:00 - 15:45
    101 Track
  • Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010

    Gabriel Ryan
    Fri, 15:00 - 15:45
    Track 1
  • Playback: a TLS 1.3 story

    Alfonso Garcia Alguacil, Alejo Murillo Moya
    Fri, 15:00 - 15:45
    Track 2
  • Privacy infrastructure, challenges and opportunities

    yawnbox
    Fri, 15:00 - 15:45
    Track 3
  • 16:00
  • Automated Discovery of Deserialization Gadget Chains

    Ian Haken
    Fri, 16:00 - 16:45
    101 Track
  • Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability

    Shaokun Cao, Yunding Jian, Mingchuang Qun, Yuwei Zheng
    Fri, 16:00 - 16:45
    Track 1
  • Practical & Improved Wifi MitM with Mana

    singe
    Fri, 16:00 - 16:45
    Track 2
  • Your Voice is My Passport

    Azeem Aqil, _delta_zero
    Fri, 16:00 - 16:45
    Track 3
  • 17:00
  • Your Bank's Digital Side Door

    Steven Danneman
    Fri, 17:00 - 17:45
    101 Track
  • I'll See Your Missile and Raise You A MIRV: An overview of the Genesis Scripting Engine

    Dan Borges, Alex Levinson
    Fri, 17:00 - 17:45
    Track 1
  • The L0pht Testimony, 20 Years Later (and Other Things You Were Afraid to Ask)

    DilDog, Joe Grand, Elinor Mills, Mudge, Weld Pond, Space Rogue, Silicosis, John Tan
    Fri, 17:00 - 17:45
    Track 2
  • Reverse Engineering, hacking documentary series

    Dave Buchwald, Michael Lee Nirenberg
    Fri, 17:00 - 17:45
    Track 3
  • 20:00
  • Disrupting the Digital Dystopia or What the hell is happening in computer law?

    Nate Cardozo, Nathan White
    Fri, 20:00 - 22:00
    Octavius 13
  • D0 N0 H4RM: A Healthcare Security Conversation

    Joshua Corman, Christian Dameff, Kirill Levchenko, PhD, Jeff Tully MD, David Nathans, Jerome Radcliffe, Roberto Suarez, Beau Woods
    Fri, 20:00 - 22:00
    Octavius 9
  • Oh Noes! — A Role Playing Incident Response Game

    Bruce Potter, Robert Potter
    Fri, 20:00 - 22:00
    Roman Chillout