• Friday, July 28
  • Welcome to DEF CON 25

    Dark Tangent
    Fri, 10:00 - 10:20
    Track 2
  • Hacking travel routers like it's 1999

    Mikhail Sosonkin
    Fri, 10:20 - 10:40
    Track 2
  • Weaponizing the BBC Micro:Bit

    Damien Cauquil
    Fri, 11:00 - 11:45
    Track 2
  • Open Source Safe Cracking Robots - Combinations Under 1 Hour! (Is it bait? Damn straight it is.)

    Nathan Seidle
    Fri, 12:00 - 12:45
    Track 2
  • Teaching Old Shellcode New Tricks

    Joshua Pitts
    Fri, 13:00 - 13:45
    Track 2
  • Death By 1000 Installers; on macOS, it's all broken!

    Patrick Wardle
    Fri, 14:00 - 14:45
    Track 2
  • Phone system testing and other fun tricks

    Owen
    Fri, 15:00 - 15:45
    Track 2
  • The Adventures of AV and the Leaky Sandbox

    Amit Klein, Itzik Kotler
    Fri, 16:00 - 16:45
    Track 2
  • Panel: DEF CON Groups

    Grifter, Jun Li, Major Malfunction, Jeff Moss, S0ups, Jayson E. Street, Waz, Brent White
    Fri, 17:00 - 17:45
    Track 2
  • Saturday, July 29
  • $BIGNUM steps forward, $TRUMPNUM steps back: how can we tell if we're winning?

    Cory Doctorow
    Sat, 10:00 - 10:45
    Track 2
  • Secure Tokin' and Doobiekeys: How to roll your own counterfeit hardware security devices

    Joe FitzPatrick, Michael Leibowitz
    Sat, 11:00 - 11:45
    Track 2
  • When Privacy Goes Poof! Why It's Gone and Never Coming Back

    Richard Thieme
    Sat, 12:00 - 12:45
    Track 2
  • Koadic C3 - Windows COM Command & Control Framework

    Sean Dillon, Zach Harding
    Sat, 13:00 - 13:45
    Track 2
  • Trojan-tolerant Hardware & Supply Chain Security in Practice

    Dan Cvrcek, Vasilios Mavroudis
    Sat, 14:00 - 14:45
    Track 2
  • Tracking Spies in the Skies

    Jason Hernandez, Jerod MacDonald-Evoy, Sam Richards
    Sat, 15:00 - 15:45
    Track 2
  • From "One Country - One Floppy" to "Startup Nation" - the story of the early days of the Israeli hacking community, and the journey towards today's vibrant startup scene

    Inbar Raz, Eden Shochat
    Sat, 16:00 - 16:45
    Track 2
  • Taking Windows 10 Kernel Exploitation to the next level - Leveraging write-what-where vulnerabilities in Creators Update

    Morten Schenk
    Sat, 17:00 - 17:45
    Track 2
  • Sunday, July 30
  • I Know What You Are by the Smell of Your Wifi

    Denton Gentry
    Sun, 10:00 - 10:20
    Track 2
  • PEIMA (Probability Engine to Identify Malicious Activity): Using Power Laws to address Denial of Service Attacks

    Redezem
    Sun, 10:20 - 10:40
    Track 2
  • Backdooring the Lottery and Other Security Tales in Gaming over the Past 25 Years

    Gus Fritschie, Evan Teitelman
    Sun, 11:00 - 11:45
    Track 2
  • Are all BSDs are created equally? A survey of BSD kernel vulnerabilities.

    Ilja van Sprundel
    Sun, 12:00 - 12:45
    Track 2
  • Bypassing Android Password Manager Apps Without Root

    Stephan Huber, Siegfried Rasthofer
    Sun, 13:00 - 13:45
    Track 2
  • Weaponizing Machine Learning: Humanity Was Overrated Anyway

    Ben Morris, Dan Petro
    Sun, 14:00 - 14:45
    Track 2