• Friday, August 7
  • Welcome to DEF CON

    LoST, Jeff Moss
    Fri, 10:00 - 10:50
    Track Three
  • Fighting Back in the War on General Purpose Computers

    Cory Doctorow
    Fri, 11:00 - 11:50
    Track Three
  • USB Attack to Decrypt Wi-Fi Communications

    Jeremy Dorrough
    Fri, 12:00 - 12:50
    Track Three
  • Red vs. Blue: Modern Active Directory Attacks & Defense

    Sean Metcalf
    Fri, 13:00 - 13:50
    Track Three
  • Remote Access, the APT

    Ian Latter
    Fri, 14:00 - 14:50
    Track Three
  • REvisiting RE:DoS

    Eric Davisson
    Fri, 15:00 - 15:50
    Track Three
  • When the Secretary of State says: “Please Stop Hacking Us…”

    David An
    Fri, 16:00 - 16:25
    Track Three
  • Put on your tinfo_t hat if you're my type

    miaubiz
    Fri, 16:30 - 16:55
    Track Three
  • NetRipper - Smart traffic sniffing for penetration testers

    Ionut Popescu
    Fri, 17:00 - 17:50
    Track Three
  • Hooked Browser Meshed-Networks with WebRTC and BeEF

    Christian Frichot
    Fri, 18:00 - 18:50
    Track Three
  • Saturday, August 8
  • Do Export Controls on “Intrusion Software” Threaten Vulnerability Research?

    Collin Anderson, Tom Cross
    Sat, 10:00 - 10:50
    Track Three
  • 'DLL Hijacking' on OS X? #@%& Yeah!

    Patrick Wardle
    Sat, 11:00 - 11:50
    Track Three
  • I Hunt Penetration Testers: More Weaknesses in Tools and Procedures

    Wesley McGrew
    Sat, 12:00 - 12:50
    Track Three
  • WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis

    William Ballenthin, Matthew Graeber, Claudiu Teodorescu
    Sat, 13:00 - 14:50
    Track Three
  • High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC

    Joshua Smith
    Sat, 15:00 - 15:50
    Track Three
  • Investigating the Practicality and Cost of Abusing Memory Errors with DNS

    Luke Young
    Sat, 16:00 - 16:50
    Track Three
  • 802.11 Massive Monitoring

    Andres Blanco, Andres Gazzoli
    Sat, 17:00 - 17:50
    Track Three
  • DEF CON Comedy Inception: How many levels deep can we go?

    Amanda Berlin, Chris Blow, Adam Crain, Katie Moussouris, Larry Pesce, Chris Sistrunk, Dan Tentler
    Sat, 18:00 - 19:50
    Track Three
  • Sunday, August 9
  • How to Hack Government: Technologists as Policy Makers

    Terrell McSweeny, Ashkan Soltani
    Sun, 10:00 - 10:50
    Track Three
  • REpsych: Psychological Warfare in Reverse Engineering

    Christopher Domas
    Sun, 11:00 - 11:50
    Track Three
  • Stick That In Your (root)Pipe & Smoke It

    Patrick Wardle
    Sun, 12:00 - 12:50
    Track Three
  • "Quantum" Classification of Malware

    John Seymour
    Sun, 13:00 - 13:50
    Track Three
  • Advances in Linux Process Forensics Using ECFS

    Ryan O'Neill
    Sun, 14:00 - 14:50
    Track Three