• Friday, August 10
  • De-anonymizing Programmers from Source Code and Binaries

    Dr. Aylin Caliskan, Rachel Greenstadt
    Fri, 10:00 - 10:45
    Track 2
  • One-liners to Rule Them All

    egypt, William Vu
    Fri, 11:00 - 11:45
    Track 2
  • Breaking Paser Logic: Take Your Path Normalization Off and Pop 0days Out!

    Orange Tsai
    Fri, 12:00 - 12:45
    Track 2
  • Finding Xori: Malware Analysis Triage with Automated Disassembly

    Amanda Rousseau, Rich Seymour
    Fri, 13:00 - 13:20
    Track 2
  • Hacking the Brain: Customize Evil Protocol to Pwn an SDN Controller

    Jianwei Huang, Peng Liu, Feng Xiao
    Fri, 13:30 - 13:50
    Track 2
  • 4G—Who is paying your cellular phone bill?

    Dr. Silke Holtmanns, Isha Singh
    Fri, 14:00 - 14:45
    Track 2
  • Playback: a TLS 1.3 story

    Alfonso Garcia Alguacil, Alejo Murillo Moya
    Fri, 15:00 - 15:45
    Track 2
  • Practical & Improved Wifi MitM with Mana

    singe
    Fri, 16:00 - 16:45
    Track 2
  • The L0pht Testimony, 20 Years Later (and Other Things You Were Afraid to Ask)

    DilDog, Joe Grand, Elinor Mills, Mudge, Weld Pond, Space Rogue, Silicosis, John Tan
    Fri, 17:00 - 17:45
    Track 2
  • Saturday, August 11
  • You're just complaining because you're guilty: A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System

    Nathan Adams, Jerome Greco, Dr. Jeanna N. Matthews
    Sat, 10:00 - 10:45
    Track 2
  • Compression Oracle Attacks on VPN Networks

    Ahamed Nafeez
    Sat, 11:00 - 11:45
    Track 2
  • You'd better secure your BLE devices or we'll kick your butts !

    Damien Cauquil
    Sat, 12:00 - 12:45
    Track 2
  • Reaping and breaking keys at scale: when crypto meets big data

    Nils Amiet, Yolan Romailler
    Sat, 13:00 - 13:20
    Track 2
  • Detecting Blue Team Research Through Targeted Ads

    0x200b
    Sat, 13:30 - 13:50
    Track 2
  • Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from huge to little ones

    Rodrigo Colli, Eduardo Izycki
    Sat, 14:00 - 14:20
    Track 2
  • Sex Work After SESTA/FOSTA

    Maggie Mayhem
    Sat, 14:30 - 14:50
    Track 2
  • Reverse Engineering Windows Defender's Emulator

    Alex Bulazel
    Sat, 15:00 - 15:45
    Track 2
  • All your family secrets belong to us—Worrisome security issues in tracker apps

    Dr. Steven Arzt, Stephan Huber, Siegfried Rasthofer
    Sat, 16:00 - 16:45
    Track 2
  • Relocation Bonus: Attacking the Windows Loader Makes Analysts Switch Careers

    Nick Cano
    Sat, 17:00 - 17:45
    Track 2
  • Sunday, August 12
  • Defending the 2018 Midterm Elections from Foreign Adversaries

    Joshua Franklin, Kevin Franklin
    Sun, 10:00 - 10:45
    Track 2
  • Politics and the Surveillance State. The story of a young politician's successful efforts to fight surveillance and pass the nation's strongest privacy bills.

    Daniel Zolnikov
    Sun, 11:00 - 11:45
    Track 2
  • Attacking the macOS Kernel Graphics Driver

    Yu Wang
    Sun, 12:00 - 12:45
    Track 2
  • Micro-Renovator: Bringing Processor Firmware up to Code

    Matt King
    Sun, 13:00 - 13:20
    Track 2
  • Lost and Found Certificates: dealing with residual certificates for pre-owned domains

    Dylan Ayrey, Ian Foster
    Sun, 13:30 - 13:50
    Track 2
  • Hacking BLE Bicycle Locks for Fun and a Small Profit

    Vincent Tan
    Sun, 14:00 - 14:45
    Track 2
  • What the Fax!?

    Yaniv Balmas, Eyal Itkin
    Sun, 15:00 - 15:45
    Track 2