#
Title
1

The Dark Tangent - DEF CON 24 Closing Ceremonies

2

Aaron Luo - Drones Hijacking - multi-dimensional attack vectors and countermeasures

3

Adam Donenfeld - Stumping the Mobile Chipset

4

Alex Chapman & Paul Stone - Toxic Proxies - Bypassing HTTPS and VPNs to Pwn Your Online Identity

5

Allan Cecil - Robot Hacks Video Games: How TASBot Exploits Consoles with Custom Controllers

6

Amro Abdelgawad - The Remote Metamorphic Engine: Detecting, Evading, Attacking the AI and Reverse Engineering

7

Anch - So You Think You Want To Be a Penetration Tester

8

Andy Robbins (@_wald0), Rohan Vazarkar (@cptjesus), Will Schroeder (@harmj0y) - Six Degrees of Domain Admin - Using Graph Theory to Accelerate Red Team Operations

9

Ang Cui & Jatin Kataria - A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors

10

Anthony Ros & Ben Ramsey - Picking Bluetooth Low Energy Locks from a Quarter Mile Away

11

L0sT & The Dark Tangent - DEF CON Welcome and Badge Talk

12

3AlarmLampScooter - DIY Nukeproofing: A New Dig at 'Datamining'

13

Bigezy & saci - An Introduction to Pinworm: Man in the Middle for your Metadata

14

Kai Zhong & Kenneth Lee - 411: A framework for managing security alerts

15

Zero_Chaos & Granolocks - Realtime Bluetooth Device Detection with Blue Hydra

16

Mudge Zatko & Sarah Zatko - Project CITL

17

Bryant Zadegan & Ryan Lester - Abusing Bleeding Edge Web Standards for AppSec Glory

18

Luke Young - Attacking Network Infrastructure to Generate a 4 Tb/s DDoS for $5

19

Brad Woodberg - Malware Command and Control Channels: A journey into darkness

20

Patrick Wardle - I've got 99 Problems, but Little Snitch ain't one

21

Terrell McSweeny & Lorrie Cranor - Research on the Machines: Help the FTC Protect Privacy & Security

22

Elie Bursztein & Celine Bursztein - Cheating at Poker. Ripping Off People at Poker, James Bond Style

23

JusticeBeaver (Eric Escobar) - Discovering and Triangulating Rogue Cell Towers

24

Mike Walker & Dr. Arati - DARPA Cyber Grand Challenge Award Ceremony

25

Dr. Phil - Mouse Jiggler Offense and Defense

26

Dr. Paul Vixie - Frontrunning the Frontrunners

27

Javier Vazquez & Ferdinand Noelscher - CAN i haz car secret plz?

28

Richard Thieme - Playing Through the Pain? - The Impact of Secrets and Dark Knowledge on Security and Intelligence Professionals

29

Tamas Szakaly - Help, I've got ANTs!!!

30

Shane Steiger - Maelstrom - Are You Playing with a Full Deck? : Using a Newly Developed Attack Life Cycle Game to Educate, Demonstrate and Evangelize.

31

Six_Volts & Haystack - Cheap Tools for Hacking Heavy Trucks

32

Panel - Team Shellphish - Cyber Grand Shellphish

33

Mickey Shkatov and Panel - How to Make Your Own DEF CON Black Badge

34

Haoqi Shan & Wanqiao Zhang - Forcing a Targeted LTE Cellphone into an Unsafe Network

35

Hunter Scott - Retweet to Win: How 50 lines of Python made me the luckiest guy on Twitter

36

Henrik Schmidt & Brian Butterly - Attacking BaseStations - an Odyssey through a Telco's Network

37

The Bob Ross Fan Club - Propaganda and You (and your devices) - How media devices can be used to coerce, and how the same devices can be used to fight back.

38

Nicholas Rosario (MasterChen) - Weaponize Your Feature Codes

39

Chris Rock - How to Overthrow a Government

40

WIlla Cassandra Riggins(abyssknight) - Esoteric Exfiltration

41

Regilero - Hiding Wookiees in HTTP - HTTP smuggling is a thing we should know better and care about

42

Plore - Side-channel Attacks on High-security Electronic Safe Locks

43

Panel - Ask the EFF

44

Dan ‘AltF4’ Petro - Game over, man! – Reversing Video Games to Create an Unbeatable AI Player

45

Radia Perlman - How to Design Distributed Systems Resilient Despite Malicious Participants

46

Guevara Noubir and Amirali Sanatinia - Honey Onions: Exposing Snooping Tor HSDir Relays

47

Marc Newlin - MouseJack: Injecting Keystrokes into Wireless Mice

48

Mike - Use Their Machines Against Them: Loading Code with a Copier

49

Sean Metcalf - Beyond the MCSE: Red Teaming Active Directory

50

Salvador Mendoza - Samsung Pay: Tokenized Numbers, Flaws and Issues

51

Wesley McGrew - Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools

52

Panel - Meet the Feds

53

Linuz & Medic - Sticky Keys To The Kingdom: Pre-auth RCE Is More Common Than You Think

54

Lucas Lundgren & Neal Hindocha - Light-Weight Protocol! Serious Equipment! Critical Implications!

55

James Loureiro & Georgi Geshev - Platform agnostic kernel fuzzing

56

Jianhao Liu, Chen Yan & Wenyuan Xu - Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-driving Vehicle

57

Ricky ‘HeadlessZeke’ Lawshae - Let’s Get Physical: Network Attacks Against Physical Security Systems

58

Ladar Levison - Compelled Decryption - State of the Art in Doctrinal Perversions

59

LosT - Hacker Fundamentals and Cutting Through Abstraction

60

Jake Kouns - 'Cyber' Who Done It?! Attribution Analysis Through Arrest History

61

Tom Kopchak - 101 Sentient Storage - Do SSDs Have a Mind of Their Own?

62

Yonathan Klijnsma & Dan Tentler - Stargate: Pivoting Through VNC to Own Internal Networks

63

Jake Kambic - Cunning with CNG: Soliciting Secrets from Schannel

64

K2 - Blockfighting with a Hooker -- BlockfFghter2!

65

Jmaxxz - Backdooring the Frontdoor

66

Przemek Jaroszewski - How to get good seats in the security theater? Hacking boarding passes for fun and profit.

67

Int0x80 (of Dual Core) - Anti-Forensics AF

68

Stephan Huber & Siegfried Rasthofer - How to Do it Wrong: Smartphone Antivirus and Security Applications Under Fire

69

Benjamin Holland - Developing Managed Code Rootkits for the Java Runtime Environment

70

Weston Hecker - Hacking Hotel Keys and Point of Sale Systems: Attacking Systems Using Magnetic Secure Transmission

71

Weston Hecker - Hacking Next-Gen ATM's From Capture to Cashout

72

Jay Healey - Feds and 0Days: From Before Heartbleed to After FBI-Apple

73

Marco Grassi & Qidan He - Escaping The Sandbox By Not Breaking It

74

Jennifer S. Granick - Slouching Towards Utopia: The State of the Internet Dream

75

Joe Grand & Zoz - BSODomizer HD: A Mischievous FPGA and HDMI Platform for the (M)asses

76

Brian Gorenc & Fritz Sands - Hacker-Machine Interface - State of the Union for SCADA HMI Vulnerabilities

77

Ulf Frisk - Direct Memory Attack the Kernel

78

Goldfisk & Follower - Breaking the Internet of Vibrating Things : What We Learned Reverse Engineering Bluetooth- and Internet-Enabled Adult Toys

79

Joe FitzPatrick & Joe Grand - 101 Ways to Brick your Hardware

80

Zack Fasel & Erin Jacobs - I Fight For The Users, Episode I - Attacks Against Top Consumer Products

81

Tim ‘t0rch’ Estell & Katea Murray - Eavesdropping on the Machines

82

Chris Eagle - Sk3wlDbg: Emulating All (well many) of the Things with Ida

83

Joshua Drake & Steve Christey - Vulnerabilities 101: How to Launch or Improve Your Vulnerability Research Game

84

Delta Zero & KingPhish3r - Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter

85

Brad Dixon - pin2pwn: How to Root an Embedded Linux Box with a Sewing Needle

86

DC101 - DEF CON 101 Panel

87

Jonathan-Christofer Demay, Adam Reziouk & Arnaud Lebrun - Auditing 6LoWPAN Networks using Standard Penetration Testing Tools

88

Jonathan-Christofer Demay & Arnaud Lebrun - CANSPY: a Framework for Auditing CAN Devices

89

Rogan Dawes & Dominic White - Universal Serial aBUSe: Remote Physical Access Attacks

90

Clarence Chio - Machine Duping 101: Pwning Deep Learning Systems

91

CINCVolFLT & AK3R303 - NG9-1-1: The Next Generation of Emergency Ph0nage

92

Nate Cardozo - Crypto: State of the Law

93

Ronny Bull & Panel - VLAN hopping, ARP Poisoning and Man-In-The-Middle Attacks in Virtualized Environments

94

Grant Bugher - Bypassing Captive Portals and Limited Networks

95

Jonathan Brossard - Introduction the Wichcraft Compiler Collection : Towards Universal Code Theft

96

Fred Bret-Mounet - All Your Solar Panels are Belong to Me

97

Bertin Bervis Bonilla & James Jara - Exploiting and Attacking Seismological Networks... Remotely

98

Evan Booth - Jittery MacGyver: Lessons Learned from Building a Bionic Hand out of a Coffee Maker

99

Karyn Benson - Examining the Internet's pollution

100

Matteo Beccaro & Matteo Collura - (Ab)using Smart Cities: The Dark Age of Modern Mobility

101

Jay Beale & Larry Pesce - Phishing without Failure and Frustration

102

Max Bazaliy - A Journey Through Exploit Mitigation Techniques in iOS

103

Ashmastaflash - SITCH - Inexpensive, Coordinated GSM Anomaly Detection

104

Kor Adana & Panel - MR. ROBOT Panel