• 10:00
  • Through the Eyes of the Attacker: Designing Embedded Systems Exploits for Industrial Control Systems

    Marina Krotofil, Jos Wetzels
    Sat, 10:00 - 10:45
    101 Track
  • It WISN't me, attacking industrial wireless mesh networks

    Mattijs van Ommeren, Erwin Paternotte
    Sat, 10:00 - 10:45
    Track 1
  • You're just complaining because you're guilty: A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System

    Nathan Adams, Jerome Greco, Dr. Jeanna N. Matthews
    Sat, 10:00 - 10:45
    Track 2
  • You may have paid more than you imagine—Replay Attacks on Ethereum Smart Contracts

    Zhenxuan Bai, Kunzhe Chai, Senhua Wang, Yuwei Zheng
    Sat, 10:00 - 10:45
    Track 3
  • 11:00
  • Hacking PLCs and Causing Havoc on Critical Infrastructures

    Thiago Alves
    Sat, 11:00 - 11:45
    101 Track
  • Exploiting Active Directory Administrator Insecurities

    Sean Metcalf
    Sat, 11:00 - 11:45
    Track 1
  • Compression Oracle Attacks on VPN Networks

    Ahamed Nafeez
    Sat, 11:00 - 11:45
    Track 2
  • Jailbreaking the 3DS through 7 years of hardening

    smea
    Sat, 11:00 - 11:45
    Track 3
  • 12:00
  • Building Absurd Christmas Light Shows

    Rob Joyce
    Sat, 12:00 - 12:45
    101 Track
  • Tineola: Taking a Bite Out of Enterprise Blockchain

    Parsia Hakimian, Stark Riedesel
    Sat, 12:00 - 12:45
    Track 1
  • You'd better secure your BLE devices or we'll kick your butts !

    Damien Cauquil
    Sat, 12:00 - 12:45
    Track 2
  • Ridealong Adventures—Critical Issues with Police Body Cameras

    Josh Mitchell
    Sat, 12:00 - 12:45
    Track 3
  • 13:00
  • One Step Ahead of Cheaters -- Instrumenting Android Emulators

    Nevermoe
    Sat, 13:00 - 13:20
    101 Track
  • In Soviet Russia Smartcard Hacks You

    Eric Sesterhenn
    Sat, 13:00 - 13:20
    Track 1
  • Reaping and breaking keys at scale: when crypto meets big data

    Nils Amiet, Yolan Romailler
    Sat, 13:00 - 13:20
    Track 2
  • Looking for the perfect signature: an automatic YARA rules generation algorithm in the AI-era

    Andrea Marcelli
    Sat, 13:00 - 13:20
    Track 3
  • 13:30
  • House of Roman—a "leakless" heap fengshui to achieve RCE on PIE Binaries

    Sanat Sharma
    Sat, 13:30 - 13:50
    101 Track
  • The ring 0 façade: awakening the processor's inner demons

    Christopher Domas
    Sat, 13:30 - 13:50
    Track 1
  • Detecting Blue Team Research Through Targeted Ads

    0x200b
    Sat, 13:30 - 13:50
    Track 2
  • Infecting The Embedded Supply Chain

    Alex, Zach
    Sat, 13:30 - 14:15
    Track 3
  • 14:00
  • Having fun with IoT: Reverse Engineering and Hacking of Xiaomi IoT Devices

    Dennis Giese
    Sat, 14:00 - 14:45
    101 Track
  • SMBetray—Backdooring and breaking signatures

    William Martin
    Sat, 14:00 - 14:45
    Track 1
  • Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from huge to little ones

    Rodrigo Colli, Eduardo Izycki
    Sat, 14:00 - 14:20
    Track 2
  • Playing Malware Injection with Exploit thoughts

    Sheng-Hao Ma
    Sat, 14:00 - 14:20
    Track 3
  • 14:30
  • Sex Work After SESTA/FOSTA

    Maggie Mayhem
    Sat, 14:30 - 14:50
    Track 2
  • Fire & Ice: Making and Breaking macOS Firewalls

    Patrick Wardle
    Sat, 14:30 - 14:50
    Track 3
  • 15:00
  • Project Interceptor: avoiding counter-drone systems with nanodrones

    David Melendez Cano
    Sat, 15:00 - 15:45
    101 Track
  • All your math are belong to us

    sghctoma
    Sat, 15:00 - 15:45
    Track 1
  • Reverse Engineering Windows Defender's Emulator

    Alex Bulazel
    Sat, 15:00 - 15:45
    Track 2
  • Booby Trapping Boxes

    hon1nbo, Ladar Levison
    Sat, 15:00 - 15:45
    Track 3
  • 16:00
  • Outsmarting the Smart City

    Dan Crowley, Mauro Paredes, Jennifer Savage
    Sat, 16:00 - 16:45
    101 Track
  • 80 to 0 in under 5 seconds: Falsifying a medical patient's vitals

    Douglas McKee
    Sat, 16:00 - 16:45
    Track 1
  • All your family secrets belong to us—Worrisome security issues in tracker apps

    Dr. Steven Arzt, Stephan Huber, Siegfried Rasthofer
    Sat, 16:00 - 16:45
    Track 2
  • Inside the Fake Science Factory

    Svea Eckert, Till Krause, Chris Sumner
    Sat, 16:00 - 16:45
    Track 3
  • 17:00
  • The Road to Resilience: How Real Hacking Redeems this Damnable Profession

    Richard Thieme
    Sat, 17:00 - 17:45
    Track 1
  • Relocation Bonus: Attacking the Windows Loader Makes Analysts Switch Careers

    Nick Cano
    Sat, 17:00 - 17:45
    Track 2
  • 20:00
  • Privacy Is Equality—And It's Far from Dead

    Sarah St. Vincent
    Sat, 20:00 - 22:00
    Octavius 13
  • Beyond the Lulz: Black-Hat Trolling, White-Hat Trolling, Attacking and Defending Our Attention Landscape

    Joan Donovan, Matt Goerzen, Dr. Jeanna N. Matthews
    Sat, 20:00 - 22:00
    Octavius 9
  • EFF Fireside Hax (AKA Ask the EFF)

    Andrés Arrieta, Nate Cardozo, Kurt Opsahl, Katitza Rodriguez, Nash Sheard, Jamie Lee Williams
    Sat, 20:00 - 22:00
    Roman Chillout