Times | Title | speaker |
---|---|---|
Friday | ||
10:00 - 10:15 | Opening Remarks | AI Village Organizers |
10:15 - 10:45 | Misinformation Keynote | |
10:45 - 11:15 | Seeing is deceiving: The rise of AI-synthesized fa . . . | Siwei Lyu |
11:15 - 11:59 | Exploratory Data Analysis: Why and How (in Python) | Lauren Putvin |
12:00 - 12:45 | A 'buyers guide' to the market promise of automagi . . . | Jon Hawes |
13:00 - 13:30 | Network defenders in a data scientist world | Ryan Kovar, Dave Herrald, . . . |
13:30 - 14:15 | Fighting Malware with Deep Learning | Angelo Oliveira |
14:15 - 14:45 | Automated Injection & Removal of Medical Evidence . . . | Yisroel Mirsky |
14:45 - 15:30 | Loss Is More! Improving Malware Detectors by Learn . . . | Ethan Rudd |
15:30 - 15:59 | Backdooring Convolutional Neural Networks via Targ . . . | Walter Scheirer |
16:00 - 16:30 | How to get over your malicious ex(tensions) using . . . | Roei Amit, Tal Leibovich |
16:30 - 16:59 | Competitions in Infosec/ML | Hyrum Anderson, Ryan Kova . . . |
17:00 - 18:59 | AI Unwind | TBD |
Saturday | ||
10:00 - 10:45 | MD: Multimedia Disinformation - Is there a Doctor . . . | Rand Waltzman |
10:45 - 11:30 | Machine Learning's Privacy Problem | Jason Mancusco |
11:30 - 11:59 | A Tutorial on Hacking Facial Recognition Systems | Richard Harang, Ethan Rud . . . |
13:30 - 13:59 | Clairvoyance: concurrent lip-reading for the smart . . . | Kenya Yoshimura, Takahiro . . . |
14:00 - 14:30 | Securing your kubeflow clusters | Barton Rhodes |
14:30 - 14:59 | AI vs. Airplanes and IT-Security: What Security Re . . . | Laurin Weissinger |
15:00 - 15:30 | Deepfakes, Deep Trouble: Analyzing the Effects of . . . | Anna Skelton |
16:00 - 16:45 | Deep Fakes Panel | Samantha Cole, Danielle C . . . |
17:00 - 18:59 | AI Unwind | TBD |
Sunday | ||
10:00 - 10:30 | Behavioral Biometrics and Context Analytics: Risk . . . | Jesus Solano, David Camac . . . |
10:30 - 11:15 | From Noisy, Distorted data-sets to excellent predi . . . | Tal Leibovich, Shimon Noa . . . |
11:15 - 11:59 | Faults in our Pi Stars: Security Issues and Challe . . . | Vahid Behzadan |
Times | Title | speaker |
---|---|---|
Friday | ||
13:00 - 13:15 | Can the CAN bus fly Risks of CAN bus networks wi . . . | Patrick Kiley |
13:15 - 13:59 | Behind the scenes of hacking airplanes | Zoltan, Ben |
14:00 - 14:30 | Hacking the Air Force and Beyond | Dr. Will Roper, Jack Cabl . . . |
14:30 - 14:59 | A Hacker Walks Into A Flight School And Says Ouch: . . . | Tarah |
Saturday | ||
10:00 - 10:59 | Panel – The Long Haul: The State of Aviation . . . | Andrea, Stefan, Pete, Ren . . . |
11:00 - 11:59 | A hackers first solo: airplane avionics security 1 . . . | Ken, Alex |
Sunday | ||
10:00 - 10:30 | Ideas whose time has come: CVD, SBOM, and SOTA | Katie, Art |
10:30 - 10:59 | Wireless Attacks on Aircraft Instrument Landing Sy . . . | Harshad |
11:00 - 11:30 | In The Air And On The Air: Aviation Radio Systems | Exploding Lemur |
11:30 - 11:59 | An introduction to the ARINC standards | Karl |
Times | Title | speaker |
---|---|---|
Friday | ||
09:50 - 09:59 | Welcome Note | |
10:00 - 10:50 | Keynote: Responding to Firefox 0-days | Philip Martin |
10:50 - 11:40 | A Smart Contract Killchain. How the first Blockcha . . . | Rod Soto&Victor Fang |
11:40 - 11:59 | Contest Announcement | Peter Kacherginsky |
12:00 - 12:25 | Hacking Cryptocurrencies | Mark Nesbitt |
12:30 - 13:20 | Panel Discussion: Privacy : Enabler or Hindrance t . . . | Diego Salazar (rehrar) |
13:30 - 14:20 | Forcing a trustworthy notion of sequential time | Brian Vohaska (bvo)&J . . . |
14:30 - 16:10 | Mathematical Background of Blockchain Cryptography | Saroj |
16:20 - 17:10 | Alice and Bob's Big Secret | Mila Paul |
17:10 - 17:59 | The CryptoCurrency Security Standard (CCSS) | Ron Stoner&Michael Pe . . . |
18:00 - 18:20 | Contest Roundup | Peter Kacherginsky |
18:20 - 18:30 | Closing note | |
Saturday | ||
09:50 - 09:59 | Welcome Note | |
10:00 - 10:50 | Keynote: Blockchain-Security Symbiosis: Secu . . . | Paul Makowski |
10:50 - 11:10 | Contest Announcement | Peter Kacherginsky |
11:10 - 11:35 | FumbleChain: A Purposefully Vulnerable Blockchai | Nils Amiet |
11:35 - 11:59 | Securing the Unknown: A Methodology for Auditing S . . . | Ben |
12:00 - 12:50 | Secrets Worlds in Plain Web. The BlockChain DNS. | Fernando Amatte |
12:50 - 13:40 | Jump-Oriented Programming (JOP) in Smart Contract . . . | Xiaohang Yu |
13:40 - 14:05 | Low-Hanging Fruits in Blockchain Security | Pavlo Radchuk&Serhii . . . |
14:15 - 15:59 | Take back control of user data with the decentrali . . . | Kevin Leffew |
16:10 - 17:59 | Smashing Smart Contracts: Detecting and Exploiting . . . | Daniel Luca&Dean Pier . . . |
18:00 - 18:20 | Contest Roundup | Peter Kacherginsky |
18:20 - 18:30 | Closing note | |
Sunday | ||
09:45 - 09:50 | Welcome Note | |
09:50 - 10:40 | Crypto currency heist - the story so far ... | Ryan Rubin |
10:40 - 11:05 | Distributed Decentralized Security for Bitcoin Wal . . . | Ali Meer |
11:05 - 11:30 | Reflections on Blockchain Security | Jan Gorzny |
11:30 - 12:20 | Bitcoin Honeypot - Wallet on floor of the Internet | Gordon Draper |
12:20 - 13:10 | A single global public-utility blockchain & cr . . . | Derek Moore |
13:10 - 13:59 | Hyperledger Fabric Security Essentials | |
14:00 - 14:10 | Contest Results | Peter Kacherginsky |
14:10 - 14:15 | Vote of Thanks |
Times | Title | speaker |
---|---|---|
Friday | ||
14:00 - 14:59 | A Theme Of Fear: Hacking The Paradigm | investigatorchi |
15:00 - 15:59 | Detection At Google: On Corp And Cloud | fryx0r , JSteeleIR |
16:30 - 16:59 | Blue Team Guide For Fresh Eyes | sopooped |
17:00 - 17:30 | The Cyber Threat Intelligence Mindset | ch33r10 |
17:30 - 17:59 | Serverless Log Analysis On AWS | gkapoglis |
Saturday | ||
13:00 - 13:59 | Security Strategy For Small-Medium Business | |
14:00 - 14:59 | Anatomy Of A Megabreach: Equifax Report | uncl3dumby |
15:00 - 15:30 | Memhunter - Automated Hunting Of Memory Resident M . . . | marcosd4h , chgaray |
16:30 - 16:59 | When A Plan Comes Together: Building A SOC A-Team | markaorlando |
17:00 - 17:30 | Extending Zeek For ICS Defense | v4tl4, jamesdickenson |
17:30 - 17:59 | Killsuit - How The Equation Group Remained Out Of . . . | connormorley, laciefan |
Sunday | ||
09:00 - 09:59 | Evaded MicrosoftATA? **But** You Are Completely Ex . . . | 9ian1i |
10:00 - 10:59 | Who Dis? Who Dis? The Right Way To Authenticate | Lak5hmi5udheer, dhivus |
11:00 - 11:59 | BloodHound From Red to Blue | Mathieu Saulnier |
12:00 - 12:59 | An Introduction To Malware Analysis | Understudy77 |
13:00 - 13:59 | Blue Team Village Closing Ceremony |
Times | Title | speaker |
---|---|---|
Friday | ||
09:00 - 12:59 | Threat Hunting With The Elastic Stack | CyberPraesidium, politoin . . . |
09:00 - 10:59 | Threat Hunting With ATT&CK On Splunk | |
09:00 - 12:59 | Deep Infrastructure Visibility With Osquery And Fl . . . | thezachw |
11:30 - 13:29 | The "Art" of BEC | |
13:30 - 15:29 | MEDIC! Malware Response 101 From The Trenches | krypt3ia |
14:00 - 17:59 | Malware Traffic Analysis Workshop | malware_traffic |
16:00 - 17:59 | Blue Teaming For Fun And The Sake Of Your Organiza . . . | sirmudbl00d , apiary |
Saturday | ||
09:00 - 12:59 | Introduction To Mac-Centric Incident Response Tool . . . |
Times | Title | speaker |
---|---|---|
Friday | ||
13:00 - 13:50 | Hacking into automotive clouds | Rotem Bar |
14:30 - 14:55 | Tell Me Lies - Automotive LIDAR and Low-Tech Obfus . . . | Rick Hansen |
15:30 - 15:55 | Lojack'd - pwning car alarms, vehicle trackers and . . . | Ken Munro |
15:00 - 15:25 | Intro to UDS | ac0rn |
16:00 - 16:50 | Legal Over-the-Air Spoofing of GNSS and its Effect . . . | Victor Murray |
17:00 - 17:50 | Digital Vehicle Forensics | Eoin Bates |
Saturday | ||
10:00 - 10:25 | Fast, Furious and Insecure: Passive Keyless Entry . . . | Lennert Wouters |
10:30 - 10:25 | Hacking Android and qnx (What treasures lie inside . . . | Neiko Rivera |
11:00 - 11:50 | Reverse Engineering and Flashing ECU Firmware Upda . . . | Greg Hogan |
12:00 - 12:50 | Weaponizing Hypervisors to protect Car Infotainmen . . . | Dan Regalado |
Times | Title | speaker |
---|---|---|
Thursday | ||
10:00 - 10:45 | DC101, Paris Theatre Exploiting Windows Exploit Mitigation for ROP Expl . . . |
Omer Yair |
11:00 - 11:45 | DC101, Paris Theatre Breaking Google Home: Exploit It with SQLite(Magel . . . |
Wenxiang Qian, YuXiang Li . . . |
12:00 - 12:45 | DC101, Paris Theatre Are Quantum Computers Really A Threat To Cryptogra . . . |
Andreas Baumhof |
13:00 - 13:45 | DC101, Paris Theatre Intro to Embedded Hacking—How you too can fi . . . |
Philippe Laulheret |
14:00 - 14:45 | DC101, Paris Theatre Web2Own: Attacking Desktop Apps From Web Security' . . . |
Junyu Zhou, Ce Qin, Jiani . . . |
15:00 - 16:45 | DC101, Paris Theatre DEF CON 101 Panel |
Highwiz, Nikita, Will, n0 . . . |
Friday | ||
09:00 - 09:45 | Paris - Track 1 DEF CON wants to help hackers anonymously submit b . . . |
Jeff Moss, Corbin Souffra . . . |
10:00 - 10:45 | Paris - Track 1 Behind the Scenes of the DEF CON 27 Badge |
Joe Grand (Kingpin) |
10:00 - 10:45 | Paris - Track 2 Hacking Congress: The Enemy Of My Enemy Is My Frie . . . |
Former Rep. Jane Harman, . . . |
10:00 - 10:45 | Paris - Track 3 Behind the Scenes: The Industry of Social Media Ma . . . |
Olivier Bilodeau, Masarah . . . |
10:00 - 10:45 | Paris - Track 4 Duplicating Restricted Mechanical Keys |
Bill Graydon, Robert Gray . . . |
11:00 - 11:45 | Paris - Track 1 Don't Red-Team AI Like a Chump |
Ariel Herbert-Voss |
11:00 - 11:45 | Paris - Track 2 The Tor Censorship Arms Race: The Next Chapter |
Roger Dingledine |
11:00 - 11:45 | Paris - Track 3 All the 4G modules Could be Hacked |
XiaoHuiHui, Ye Zhang, Zhe . . . |
11:00 - 11:45 | Paris - Track 4 Evil eBPF In-Depth: Practical Abuses of an In-Kern . . . |
Jeff Dileo |
12:00 - 12:45 | Paris - Track 1 Process Injection Techniques - Gotta Catch Them Al . . . |
Itzik Kotler, Amit Klein |
12:00 - 12:45 | Paris - Track 2 Phreaking Elevators |
WillC |
12:00 - 12:45 | Paris - Track 3 Infiltrating Corporate Intranet Like NSA ̶Pre-aut . . . |
Orange Tsai, Meh Chang |
12:00 - 12:45 | Paris - Track 4 API-Induced SSRF: How Apple Pay Scattered Vulnerab . . . |
Joshua Maddux |
13:00 - 13:45 | Paris - Track 1 HackPac: Hacking Pointer Authentication in iOS Use . . . |
Xiaolong Bai, Min (Spark) . . . |
13:00 - 13:45 | Paris - Track 2 HVACking: Understand the Difference Between Securi . . . |
Douglas McKee, Mark Berez . . . |
13:00 - 13:45 | Paris - Track 3 No Mas – How One Side-Channel Flaw Opens Atm, Ph . . . |
phar |
13:00 - 13:45 | Paris - Track 4 More Keys Than A Piano: Finding Secrets In Publicl . . . |
xBen "benmap" Morris |
14:00 - 14:45 | Paris - Track 1 Harnessing Weapons of Mac Destruction |
Patrick Wardle |
14:00 - 14:45 | Paris - Track 2 Are Your Child's Records at Risk? The Current Stat . . . |
Bill Demirkapi |
14:00 - 14:45 | Paris - Track 3 A Hacker Guide To Deep-Learning Based Side Channel . . . |
Elie Bursztein, Jean Mich . . . |
14:00 - 14:45 | Paris - Track 4 Practical Key Search Attacks Against Modern Symmet . . . |
Daniel "ufurnace" Crowley . . . |
15:00 - 15:45 | Paris - Track 1 MOSE: Using Configuration Management for Evil |
Jayson Grace |
15:00 - 15:45 | Paris - Track 2 Change the World, cDc Style: Cow tips from the fir . . . |
Joseph Menn, Peiter Mudge . . . |
15:00 - 15:45 | Paris - Track 3 100 Seconds of Solitude: Defeating Cisco Trust Anc . . . |
Jatin Kataria, Rick Housl . . . |
15:00 - 15:45 | Paris - Track 4 Relaying Credentials Has Never Been Easier: How to . . . |
Marina Simakov, Yaron Zin . . . |
16:30 - 16:50 | Paris - Track 1 Poking the S in SD cards |
Nicolas Oberli |
16:00 - 16:30 | Paris - Track 1 Please Inject Me, a x64 Code Injection |
Alon Weinberg |
16:30 - 16:50 | Paris - Track 2 Can You Track Me Now? Why The Phone Companies Are . . . |
U.S. Senator Ron Wyden |
16:00 - 16:30 | Paris - Track 2 I Know What You Did Last Summer: 3 Years of Wirele . . . |
d4rkm4tter (Mike Spicer) |
16:00 - 16:30 | Paris - Track 3 Surveillance Detection Scout - Your Lookout on Aut . . . |
Truman Kain |
16:30 - 16:50 | Paris - Track 3 Breaking The Back End! It Is Not Always A Bug. S . . . |
Gregory Pickett |
16:30 - 16:50 | Paris - Track 4 Re: What's up Johnny? – Covert Content Attacks o . . . |
Jens Müller |
16:00 - 16:30 | Paris - Track 4 The JOP ROCKET: A Supremely Wicked Tool for JOP Ga . . . |
Dr. Bramwell Brizendine, . . . |
20:00 - 21:59 | Planet Hollywood - Firesides Lounge D0 N0 H4RM: A Healthcare Security Conversation |
Christian “quaddi” Da . . . |
22:15 - 22:59 | Planet Hollywood - Firesides Lounge Panel: DEF CON Groups |
Brent White / B1TK1LL3R, . . . |
Saturday | ||
10:00 - 10:45 | Paris - Track 1 Weaponizing Hypervisors to Fight and Beat Car and . . . |
Ali Islam, Dan Regalado ( . . . |
10:00 - 10:45 | Paris - Track 2 Rise of the Hypebots: Scripting Streetwear |
finalphoenix |
10:00 - 10:45 | Paris - Track 3 Information Security in the Public Interest |
Bruce Schneier |
10:00 - 10:45 | Paris - Track 4 EDR Is Coming; Hide Yo Sh!t |
Michael Leibowitz, Topher . . . |
11:00 - 11:45 | Paris - Track 1 Your Car is My Car |
Jmaxxz |
11:00 - 11:45 | Paris - Track 2 HAKC THE POLICE |
Bill Swearingen |
11:00 - 11:45 | Paris - Track 3 Hacking Your Thoughts - Batman Forever meets Black . . . |
Katherine Pratt/GattaKat |
11:00 - 11:45 | Paris - Track 4 Meticulously Modern Mobile Manipulations |
Leon Jacobs |
12:00 - 12:45 | Paris - Track 1 How You Can Buy AT&T, T-Mobile, and Sprint Real-Ti . . . |
Joseph Cox |
12:00 - 12:45 | Paris - Track 2 Defeating Bluetooth Low Energy 5 PRNG for Fun and . . . |
Damien Cauquil (virtualab . . . |
12:00 - 12:45 | Paris - Track 3 Why You Should Fear Your “mundane” Office Equi . . . |
Daniel Romero, Mario Riva . . . |
12:00 - 12:45 | Paris - Track 4 Zombie Ant Farm: Practical Tips for Playing Hide a . . . |
Dimitry Snezhkov |
13:00 - 13:45 | Paris - Track 1 RACE - Minimal Rights and ACE for Active Directory . . . |
Nikhil Mittal |
13:00 - 13:45 | Paris - Track 2 GSM: We Can Hear Everyone Now! |
Campbell Murray, Eoin Buc . . . |
13:00 - 13:45 | Paris - Track 3 Tag-side attacks against NFC |
Christopher Wade |
13:00 - 13:45 | Paris - Track 4 SSO Wars: The Token Menace |
Alvaro Muñoz, Oleksandr . . . |
14:00 - 14:45 | Paris - Track 1 SELECT code_execution FROM * USING SQLite;—G . . . |
Omer Gull |
14:00 - 14:45 | Paris - Track 2 I'm on your phone, listening - Attacking VoIP Conf . . . |
Stephan Huber, Philipp Ro . . . |
14:00 - 14:45 | Paris - Track 3 Zero bugs found? Hold my Beer AFL! How To Improve . . . |
Maksim Shudrak |
14:00 - 14:45 | Paris - Track 4 Next Generation Process Emulation with Binee |
Kyle Gwinnup, John Holowc . . . |
15:00 - 15:45 | Paris - Track 1 Get off the Kernel if you can’t Drive |
Jesse Michael, Mickey Shk . . . |
15:00 - 15:45 | Paris - Track 2 Reverse-Engineering 4g Hotspots for Fun, Bugs and . . . |
g richter |
15:00 - 15:45 | Paris - Track 3 State of DNS Rebinding - Attack & Prevention Techn . . . |
Gerald Doussot, Roger Mey . . . |
15:00 - 15:45 | Paris - Track 4 .NET Malware Threats: Internals And Reversing |
Alexandre Borges |
16:30 - 16:50 | Paris - Track 1 Unpacking Pkgs: A Look Inside Macos Installer Pack . . . |
Andy Grant |
16:00 - 16:30 | Paris - Track 1 Reverse Engineering 17+ Cars in Less Than 10 Minut . . . |
Brent Stone |
16:00 - 17:45 | Paris - Track 2 NOC NOC. Who's there? All. All who? All the things . . . |
The DEF CON NOC |
16:30 - 16:50 | Paris - Track 3 Go NULL Yourself or: How I Learned to Start Worryi . . . |
droogie |
16:00 - 16:30 | Paris - Track 3 Confessions of an Nespresso Money Mule: Free Stuff . . . |
Nina Kollars, Kitty Hegem . . . |
16:00 - 16:30 | Paris - Track 4 Vacuum Cleaning Security—Pinky and the Brain Edi . . . |
jiska, clou (Fabian Ullri . . . |
16:30 - 16:50 | Paris - Track 4 Apache Solr Injection |
Michael Stepankin |
20:00 - 21:59 | Planet Hollywood - Firesides Lounge Meet the EFF - Meetup Panel |
Kurt Opsahl, Camille Fisc . . . |
22:15 - 22:59 | Planet Hollywood - Firesides Lounge We Hacked Twitter… And the World Lost Their Sh*t . . . |
Mike Godfrey, Matthew Car . . . |
Sunday | ||
10:00 - 10:45 | Paris - Track 1 Backdooring Hardware Devices By Injecting Maliciou . . . |
Sheila Ayelen Berta |
10:00 - 10:45 | Paris - Track 2 Adventures In Smart Buttplug Penetration (testing) |
smea |
10:00 - 10:45 | Paris - Track 3 Hacking WebAssembly Games with Binary Instrumentat . . . |
Jack Baker |
10:00 - 10:45 | Paris - Track 4 Your Secret Files Are Mine: Bug Finding And Exploi . . . |
Xiangqian Zhang, Huiming . . . |
11:00 - 11:45 | Paris - Track 1 The ABC of Next-Gen Shellcoding |
Hadrien Barral, Rémi Gé . . . |
11:00 - 11:45 | Paris - Track 2 SDR Against Smart TVs: URL and Channel Injection A . . . |
Pedro Cabrera Camara |
11:00 - 11:45 | Paris - Track 3 Exploiting Qualcomm WLAN and Modem Over The Air |
Xiling Gong, Peter Pi |
11:00 - 11:45 | Paris - Track 4 Say Cheese - How I Ransomwared Your DSLR Camera |
Eyal Itkin |
12:00 - 12:45 | Paris - Track 1 I'm In Your Cloud... Pwning Your Azure Environemen . . . |
Dirk-jan Mollema |
12:00 - 12:45 | Paris - Track 2 Malproxying: Leave Your Malware at Home |
Hila Cohen, Amit Waisel |
12:00 - 12:45 | Paris - Track 3 HTTP Desync Attacks: Smashing into the Cell Next D . . . |
albinowax |
12:00 - 12:45 | Paris - Track 4 Help Me, Vulnerabilities. You're My Only Hope |
Jacob Baines |
13:00 - 13:45 | Paris - Track 1 [ MI CASA-SU CASA ] My 192.168.1.1 is Your 192.168 . . . |
Elliott Thompson |
13:00 - 13:45 | Paris - Track 2 Sound Effects: Exploring Acoustic Cyber-weapons |
Matt Wixey |
13:00 - 13:45 | Paris - Track 3 Owning The Cloud Through Server-Side Request Forge . . . |
Ben Sadeghipour, Cody Bro . . . |
13:00 - 13:45 | Paris - Track 4 Want Strong Isolation? Just Reset Your Processor |
Anish Athalye |
14:00 - 14:45 | Paris - Track 1 Firmware Slap: Automating Discovery of Exploitable . . . |
Christopher Roberts |
14:00 - 14:45 | Paris - Track 2 Cheating in eSports: How to Cheat at Virtual Cycli . . . |
Brad Dixon |
14:00 - 15:30 | Paris - Track 4 Contests Awards Ceremony |
Contests & Events Goons |
16:00 - 17:59 | Tracks 1,2,3 Closing Ceremonies |
The Dark Tangent & Goons |
Times | Title | speaker |
---|---|---|
Friday | ||
10:00 - 11:50 | Antennas for Surveillance applications | Kent Britain, Alexander Z . . . |
10:00 - 11:50 | PhanTap (Phantom Tap) | Diana Dragusin, Etienne C . . . |
10:00 - 11:50 | BEEMKA – Electron Post-Exploitation Framework | Pavel Tsakalidis |
10:00 - 11:50 | Reverse Engineering Embedded ARM with Ghidra | Max Compston |
10:00 - 11:50 | Hachi: An Intelligent threat mapper | Parmanand Mishra |
10:00 - 11:50 | soFrida - Dynamic Analysis Tool for Mobile Apps w . . . | Hyunjun Park, Soyeon Kim |
12:00 - 13:50 | EAPHammer | Gabriel Ryan |
12:00 - 13:50 | PcapXray | Srinivas Piskala Ganesh B . . . |
12:00 - 13:50 | Spartacus as a Service (SaaS) | Mike Kiser |
12:00 - 13:50 | Flatline | East |
12:00 - 13:50 | Phishing Simulation | Jyoti Raval |
12:00 - 13:50 | TaintedLove | Benoit Côté-Jodoin |
14:00 - 15:50 | Browser extension to hunt low hanging fruits (Hack . . . | Rewanth Cool |
14:00 - 15:50 | Let's Map Your Network | Pramod Rana |
14:00 - 15:50 | EXPLIoT - IoT Security Testing and Exploitation Fr . . . | Aseem Jakhar, Murtuja Bha . . . |
14:00 - 15:50 | Chaos Drive, because USB is still too trustworthy | Mike Rich |
14:00 - 15:50 | Combo Password | Fabian Obermaier |
14:00 - 15:50 | OSfooler-NG: Next Generation of OS fingerprinting . . . | Jaime Sanchez |
Saturday | ||
10:00 - 11:50 | WiFi Kraken – Scalable Wireless Monitoring | Mike Spicer |
10:00 - 11:50 | CIRCO: Cisco Implant Raspberry Controlled Operatio . . . | Emilio Couto |
10:00 - 11:50 | Cotopaxi: IoT Protocols Security Testing Toolkit | Jakub Botwicz |
10:00 - 11:50 | Srujan: Safer Networks for Smart Homes | Sanket Karpe, Parmanand M . . . |
10:00 - 11:50 | Go Reverse Engineering Tool Kit | Joakim Kennedy |
10:00 - 11:50 | Memhunter - Automated hunting of memory resident m . . . | Marcos Oviedo |
12:00 - 13:50 | Burp Plugin: Cyber Security Transformation Chef (C . . . | Ralf Almon, Sebastian Put . . . |
12:00 - 13:50 | ioc2rpz | Vadim Pavlov |
12:00 - 13:50 | Local Sheriff | Konark Modi |
12:00 - 13:50 | PCILeech and MemProcFS | Ulf Frisk, Ian Vitek |
12:00 - 13:50 | Dr.ROBOT: Organized Chaos and the Shotgun Approach | Aleksandar Straumann, Jay . . . |
12:00 - 13:50 | bedr | Mark Ignacio |
14:00 - 15:50 | Burpsuite Team Server for Collaborative Web App Te . . . | Tanner Barnes |
14:00 - 15:50 | OWASP Amass | Jeff Foley, Anthony Rhode . . . |
14:00 - 15:50 | PivotSuite: Hack The Hidden Network - A Network Pi . . . | Manish Gupta |
14:00 - 15:50 | SILENTTRINITY | Marcello Salvati |
14:00 - 15:50 | Shellcode Compiler | Ionut Popescu |
14:00 - 15:50 | Shadow Workers: Backdooring with Service Workers | Emmanuel Law, Claudio Con . . . |
Sunday | ||
10:00 - 11:50 | Zigbee Hacking: Smarter Home Invasion with ZigDig . . . | Francis Brown, Matt Gleas . . . |
10:00 - 11:50 | Vulmap: Online Local Vulnerability Scanners Projec . . . | Yavuz Atlas, Fatih Ozel |
10:00 - 11:50 | USB-Bootkit – New Bookit via USB Interface in Su . . . | Haowen Bai |
10:00 - 11:50 | Rhodiola | Utku Sen |
10:00 - 11:50 | QiLing | KaiJern, Lau, Dr. Nguyen . . . |
Times | Title | speaker |
---|---|---|
Friday | ||
11:00 - 11:59 | Keynote: A Rant on Ethical Disclosure | |
13:00 - 13:59 | Law Professor Round Robin | |
14:00 - 14:59 | Coffee Talk With Anthony Ferrante | Anthony Ferrante |
15:00 - 15:59 | Coffee Talk With Dr. Suzanne Schwartz | Dr. Suzanne Schwartz |
16:00 - 16:59 | Coffee Talk With Joshua Steinman | Joshua Steinman |
17:00 - 17:59 | Coffee Talk With Erie Meyer | Erie Meyer |
Saturday | ||
10:00 - 10:59 | Void If Removed: Securing Our Right TO Repair | |
12:00 - 12:59 | Is It Ethical To Work On Autonomous Weapon Systems . . . | |
14:00 - 14:59 | Ethical Issues In Cyber Attribution | |
16:00 - 16:59 | National Collegiate Penetration Testing Competitio . . . | |
Sunday | ||
10:00 - 10:59 | Who's Tracking Your Body? Health Apps And Your Pri . . . | |
12:00 - 12:59 | Ethics Training Workshop |
Times | Title | speaker |
---|---|---|
Friday | ||
10:00 - 10:50 | Reversing Corruption In Seagate Hdd Translators, T . . . | Allison Marie Naaktgebore . . . |
11:00 - 11:50 | Another Car Hacking Approach | Benjamin Lafois, Vladan N . . . |
11:00 - 12:50 | Rapid Prototyping For Badges | Securelyfitz and friends |
12:00 - 12:30 | Infrared: New Threats Meet Old Devices | Wang Kang |
14:00 - 14:50 | Making A Less Shitty Sao: How To Use Kicad To Buil . . . | Steve Ball (hamster) |
15:00 - 15:50 | Ebolaphone Or Bust | SciaticNerd |
Saturday | ||
11:00 - 11:50 | Understanding & Making Pcb Art | TwinkleTwinkie |
12:00 - 12:50 | What You Print Is Not What You Get Anymore: Mitm A . . . | Hamza Alkofahi |
14:00 - 14:50 | Hacking Con Badges for Fun and Profit | Rob Rehr |
17:00 - 17:50 | Fireside Chat Style Followup To Main Track Talk: T . . . | Christopher Wade |
Times | Title | speaker |
---|---|---|
Friday | ||
11:00 - 11:30 | Sinking Ships & Stealing Containers from Ports . . . | Ken Munro |
11:30 - 11:59 | Maritime Pen Testing 101: Don’t poop on the . . . | Andrew Tierney Neil Boy |
11:00 - 11:30 | Opening Remarks | Brian Satira |
12:00 - 12:30 | National Security Council and Special Assistant fo . . . | Keynote: Josh Steinman |
12:30 - 13:30 | SeaSteading: A home on the Waves | Carly Jackson |
13:30 - 14:15 | Firmware Rewriting to Gain Persistence on Satcom T . . . | David Belasco |
14:15 - 14:30 | Propulsion | REdoubt |
14:30 - 14:59 | TROMMEL Demo – Sift through embedded device . . . | Kyle O’Meara |
15:00 - 15:30 | Maritime cyber policy and regulation | Cris DeWitt |
15:30 - 15:59 | GMDSS including Automated Identification System (p . . . | Julian Blanco |
16:00 - 16:30 | Navigation including ECDIS, GPS, and radar | Stephan Gerling |
Saturday | ||
11:00 - 11:30 | Propulsion | REdoubt |
11:30 - 11:59 | Design your own seastead game | Carly Jackson |
13:30 - 13:59 | Communications including Satcom and NMEA protocols | Stephan Gerling |
13:30 - 13:59 | Finding Flaws in a Satcom Terminal | Kyle O’Meara & . . . |
14:00 - 14:59 | Pwning a mobile drilling rig | Andrew Tierney and Chris . . . |
14:00 - 14:59 | Creating a Maritime Cybersecurity Community | Zachary Staples |
14:00 - 14:59 | From IT to OT – How to segue into hacking ma . . . | Weston Hecker |
15:00 - 15:30 | Maritime Cyber Policy 101 | Cris DeWitt |
15:00 - 15:59 | ByteSweep Firmware Analysis Automation Project | nmatt |
15:00 - 15:59 | Development of the Maritime Cyberphysical Testbeds | Zachary Staples |
15:30 - 15:59 | Maritime Cyber Policy Panel | Cris DeWitt |
Sunday | ||
10:00 - 10:30 | AIS C2 | Julian Blacno |
10:30 - 11:30 | Yacht Hacking – from SatCom to Engine contro . . . | Stephan Gerling |
11:30 - 11:59 | Surviving Maritime Vulnerability Disclosure | R3doubt |
12:00 - 12:59 | Closing Ceremony and Awards | R3doubt |
Times | Title | speaker |
---|---|---|
Friday | ||
15:00 - 15:30 | Pin the tail on the cyber owner | Ryan Leirvik |
15:30 - 15:59 | IT/OT Convergence - Are We There Yet? | Jack Oden |
16:00 - 16:30 | Nation State Supply Chain Attacks for Dummies -or . . . | Monta Elkins |
16:30 - 16:59 | ICS Threats - A Short Summary of the Past Year | Bryson Bort |
17:00 - 17:30 | Changium IPiosa: most magical change IP packets in . . . | Sharon Brizinov, Tal Kere . . . |
Saturday | ||
12:00 - 12:30 | Hack the World & Galaxy with OSINT | Chris Kubecka |
12:30 - 12:59 | SCADA: What the next Stuxnet will look like and ho . . . | Joseph Bingham |
13:00 - 13:30 | HVACking: Understand the difference Between Securi . . . | Douglas McKee, Mark Berez . . . |
13:30 - 13:59 | CRASHOVERRIDE: Re-Assessing the 2016 Ukraine Elect . . . | Joe Slowik |
14:00 - 14:30 | Abusing the IoT in Smart Buildings | Daniel dos Santos |
14:30 - 14:59 | Purple Teaming ICS Networks | Austin Scott |
Times | Title | speaker |
---|---|---|
Friday | ||
13:00 - 13:59 | So You Want to Rob a Bank: Overt Ops Timing & Prac . . . | |
15:00 - 15:59 | Lock Bypass 101 | |
Saturday | ||
11:00 - 11:59 | Lock Bypass 101 | |
15:00 - 15:59 | Lock Bypass 101 | |
18:00 - 18:59 | The Human Body's Promise: How Your Bare Hands can . . . | |
Sunday | ||
11:00 - 11:59 | Lock Bypass 101 |
Times | Title | speaker |
---|---|---|
Thursday | ||
20:00 - 21:59 | Cubcon 2019 | Noid |
21:00 - 21:59 | Music - Tineh Nimjeh | Tineh Nimjeh |
22:00 - 22:59 | Music - Archwisp | Archwisp |
23:00 - 23:59 | Music - CTRL | CTRL |
24:00 - 24:59 | Music - Rodman | Rodman |
25:00 - 25:59 | Music - Seeker | Seeker |
Friday | ||
19:30 - 25:59 | Diversity Party | |
19:30 - 25:59 | Hacker Karaoke | |
20:00 - 26:15 | Blanketfort Con Party | |
20:00 - 21:30 | Movie Night - Logan's Run | |
20:00 - 21:59 | Hacker Jeopardy | |
21:00 - 24:59 | 303/Skytalks Pajama Dance Party | |
21:00 - 21:59 | Music - Steph Infection | Steph Infection |
21:00 - 24:59 | VETCON II | |
21:00 - 21:59 | Music - E.ghtB.t - GLOWZONE | E.ghtB.t |
21:00 - 25:59 | Florida Man Party | |
21:00 - 21:59 | Music - Terrestrial Access Network - GLOWZONE | Terrestrial Access Networ . . . |
22:00 - 22:59 | Music - S7a73farm | S7a73farm |
22:00 - 22:59 | Music - Amplitude Problem ft. YT Cracker - GLOWZON . . . | Amplitude Problem |
22:00 - 22:59 | Music - Icetre Normal - GLOWZONE | Icetre Normal |
22:00 - 25:59 | SecKC the work, Again party | SecKC |
22:00 - 23:30 | Movie Night - Star Trek: The Motion Picture | |
22:00 - 23:59 | Who's Slide is it anyway? | |
23:00 - 23:59 | Music - Acid-T a.k.a DJ SmOke | Acid-T a.k.a DJ SmOke |
23:45 - 24:30 | Music - Dualcore - GLOWZONE | Dualcore |
23:00 - 23:45 | Music - YT Cracker - GLOWZONE | YT Cracker |
23:00 - 23:59 | Music - Miss Jackalope - GLOWZONE | Miss Jackalope |
24:00 - 24:59 | Music - Wil Austin | Wil Austin |
24:30 - 25:15 | Music - MC Frontalot - GLOWZONE | MC Frontalot |
24:00 - 24:59 | Music - DJ St3rling - GLOWZONE | DJ St3rling |
25:00 - 25:59 | Music - ASHSLAY | ASHSLAY |
25:15 - 26:15 | Music - Magik Plan | Magik Plan |
25:00 - 25:59 | Music - DJ%27 - GLOWZONE | DJ%27 |
Saturday | ||
18:00 - 18:59 | H@ck3r Runw@y | |
19:30 - 25:59 | Hacker Karaoke | |
19:00 - 21:59 | Dallas Hackers Party | |
20:00 - 21:30 | Movie Night - GATTICA | |
20:00 - 21:59 | Hacker Jeopardy | |
20:00 - 24:59 | DC801 Party | |
21:00 - 26:59 | DEFCON Monero Party | |
21:00 - 21:59 | Music - DJ Th@d | DJ Th@d |
21:30 - 25:59 | Arcade Party | |
21:00 - 25:59 | 303/Skytalks Party | |
21:00 - 21:59 | Music - Skittish & Bus | Skittish & Bus |
21:00 - 25:59 | Car Hacking Village Party | |
21:00 - 21:59 | Music - Kampf | Kampf |
21:00 - 24:30 | IoT Village Party | |
22:00 - 22:59 | Music - Azuki | Azuki |
22:00 - 22:59 | Music - Miss Jackalope | Miss Jackalope |
22:00 - 25:59 | GothCON party | |
22:00 - 22:59 | Music - Icetre Normal | Icetre Normal |
22:00 - 23:30 | Movie Night - Demolition Man | |
22:00 - 23:59 | Drunk Hacker History | |
23:00 - 23:59 | Music - Magik Plan | Magik Plan |
23:00 - 23:59 | Music - Zebbler Encanti Experience | Zebbler Encanti Experienc . . . |
23:00 - 23:59 | Music - ScotchAndBubbles | ScotchAndBubbles |
24:00 - 24:59 | Music - E.ghtB.t | E.ghtB.t |
24:00 - 24:59 | Music - Rabbit In The Moon | Rabbit In The Moon |
24:00 - 24:59 | Music - Acid-T a.k.a dj SmOke | Acid-T a.k.a dj SmOke |
25:00 - 25:59 | Music - Yurk | Yurk |
25:00 - 25:59 | Music - Ninjula | Ninjula |
25:00 - 25:59 | Music - Clockwork Echo | Clockwork Echo |
Times | Title | speaker |
---|---|---|
Friday | ||
09:00 - 11:59 | Reverse Engineering Malware 101 | Amanda Rousseau |
12:15 - 14:15 | Wireshark for Incident Response & Threat Hunti . . . | Michael Wylie |
14:30 - 16:30 | Hacking Kubernetes - Choose Your Own Adventure Sty . . . | Jay Beale |
16:45 - 18:45 | Intel-driven Hunts for Nation-state Activity Using . . . | Sean Donnelly, Peter Hay |
Saturday | ||
09:00 - 10:59 | Burp Suite Workshop | Sunny Wear, Nestor Torres |
11:20 - 13:20 | Tools? We Don’t Need No Stinkin’ Tools: Hands- . . . | Jason Nickola, Wayne Mars . . . |
13:40 - 15:40 | Writing Wireshark Plugins for Security Analysis | Nishant Sharma, Jeswin Ma . . . |
16:00 - 17:59 | Advanced APT Hunting with Splunk | John Stoner, Ryan Kovar |
Sunday | ||
11:00 - 13:59 | Threat Hunting with Suricata | Josh Stroschein, Jason Wi . . . |
Times | Title | speaker |
---|---|---|
Friday | ||
14:00 - 14:59 | Modern Rogue | Brian Brushwood |
16:00 - 16:59 | Pickpocketing | James Harrison |
17:00 - 17:59 | Pickpocketing Workshop | James Harrison |
Saturday | ||
14:00 - 14:59 | A Life of Advantage Play | R.X. Gambler |
16:00 - 16:59 | Verbal Steganography | Four Suites Co. |
17:00 - 17:59 | Verbal Steganography Workshop | Four Suites Co. |
Sunday | ||
13:00 - 13:59 | Lockpicking "Extras" | Jared Dygert |
Times | Title | speaker |
---|---|---|
Thursday | ||
15:30 - 16:20 | Sizing People Up | Robin Dreeke |
16:30 - 16:59 | Leveraging the Insider Threat, oh, and how to be A . . . | Marcus Liotta |
17:05 - 17:35 | Rideshare OSINT - Car Based SE For Fun & Profit | Edward Miro |
17:40 - 18:09 | The Basics of Social Engineering aKa How I break i . . . | Chris Pritchard |
18:15 - 18:45 | Hacking Hollywood | Andrew Nicholson |
18:50 - 19:20 | TBD | |
Friday | ||
15:30 - 16:20 | SEVillage - 10 Year Anniversary - a Look Back at w . . . | Chris Hadnagy |
16:30 - 16:59 | Why vigilantism doesn't work | Shane McCombs |
17:05 - 17:35 | OSINT in the Real World | Ryan MacDougall |
17:40 - 18:09 | Swing Away: How to Conquer Impostor Syndrome | Billy Boatright |
18:15 - 18:45 | Red Teaming Insights and Examples from Beyond the . . . | Micah Zenko |
18:50 - 19:20 | TBD | |
Saturday | ||
15:30 - 16:20 | I PWN thee, I PWN thee not! | Jayson Street |
16:30 - 16:59 | Getting Psychic: Cold Reading Techniques for Fortu . . . | Chris Kirsch |
17:05 - 17:35 | Hacking Your Career Through Social Engineering | Rebecca Long |
17:40 - 18:09 | Executives Seeing Red | Wayne Ronaldson |
18:15 - 18:45 | The Voice Told Me To Do It | Daniel Isler |
18:50 - 19:20 | The Aspie's Guide to Social Engineering Your Way T . . . | Perry Carpenter |