Village Talk List



Artificial Intelligence Village
Friday: 10:00 - 18:30, Saturday: 10:00 - 18:30, Sunday: 10:00 - 14:00
Location: Bally's, Skyview 3

Times Title speaker
Friday
10:00 - 10:15 Opening Remarks AI Village Organizers
10:15 - 10:45 Misinformation Keynote
10:45 - 11:15 Seeing is deceiving: The rise of AI-synthesized fa . . . Siwei Lyu
11:15 - 11:59 Exploratory Data Analysis: Why and How (in Python) Lauren Putvin
12:00 - 12:45 A 'buyers guide' to the market promise of automagi . . . Jon Hawes
13:00 - 13:30 Network defenders in a data scientist world Ryan Kovar, Dave Herrald, . . .
13:30 - 14:15 Fighting Malware with Deep Learning Angelo Oliveira
14:15 - 14:45 Automated Injection & Removal of Medical Evidence . . . Yisroel Mirsky
14:45 - 15:30 Loss Is More! Improving Malware Detectors by Learn . . . Ethan Rudd
15:30 - 15:59 Backdooring Convolutional Neural Networks via Targ . . . Walter Scheirer
16:00 - 16:30 How to get over your malicious ex(tensions) using . . . Roei Amit, Tal Leibovich
16:30 - 16:59 Competitions in Infosec/ML Hyrum Anderson, Ryan Kova . . .
17:00 - 18:59 AI Unwind TBD
Saturday
10:00 - 10:45 MD: Multimedia Disinformation - Is there a Doctor . . . Rand Waltzman
10:45 - 11:30 Machine Learning's Privacy Problem Jason Mancusco
11:30 - 11:59 A Tutorial on Hacking Facial Recognition Systems Richard Harang, Ethan Rud . . .
13:30 - 13:59 Clairvoyance: concurrent lip-reading for the smart . . . Kenya Yoshimura, Takahiro . . .
14:00 - 14:30 Securing your kubeflow clusters Barton Rhodes
14:30 - 14:59 AI vs. Airplanes and IT-Security: What Security Re . . . Laurin Weissinger
15:00 - 15:30 Deepfakes, Deep Trouble: Analyzing the Effects of . . . Anna Skelton
16:00 - 16:45 Deep Fakes Panel Samantha Cole, Danielle C . . .
17:00 - 18:59 AI Unwind TBD
Sunday
10:00 - 10:30 Behavioral Biometrics and Context Analytics: Risk . . . Jesus Solano, David Camac . . .
10:30 - 11:15 From Noisy, Distorted data-sets to excellent predi . . . Tal Leibovich, Shimon Noa . . .
11:15 - 11:59 Faults in our Pi Stars: Security Issues and Challe . . . Vahid Behzadan

Return to Index


Applications Security Village
Friday: 10:00 - 17:00, Saturday: 10:00 - 17:00, Sunday: 10:00 - 17:00
Location: Flamingo, Mesquite BR

Times Title speaker
Friday
10:00 - 10:59 KEYNOTE'The Abridged History of Application Securi . . . Jim Manico
11:30 - 12:15 'Automate Pen-Testing in Dockerized CI/CD Environm . . . YanYan Wang
12:30 - 13:15 'Crypto Failures- and how to avoid them' Guy Barnhart-Magen
13:30 - 13:50 'Purple Team Strategies for Application Security' Joe Schottman
14:00 - 14:45 'Vulnerabilities that Hide from Your Tools' Jillian Ratliff
15:00 - 15:45 'huskyCI: Finding Security Flaws in CI Before Depl . . . Rafael Santos
16:00 - 16:45 'How bad could it be? Inside Law Enforcement and L . . . Anthony Kava
Saturday
10:00 - 10:59 KEYNOTE'Purple is the New Black- Modern Approaches . . . Tanya Janca
11:30 - 12:15 PANEL 'Let’s All Get Technical and Hunt Harder' Alyssa Herrera, STÖK, Co . . .
12:30 - 13:15 '0day Hunting and RCE Exploitation in Web Applicat . . . Özkan M. Akkus
13:30 - 13:50 'An Introduction To Application Security Threat Mo . . . Jerry Gamblin
14:00 - 17:59 WORKSHOP 'The OWASP Top Ten for Developers- Secure . . . Jim Manico
Sunday
09:30 - 09:50 'Shifting the DevSecOps Culture, Taking away the s . . . Vandana Verma Sehgal
10:00 - 10:20 'History of the worst Android app ever: mAadhaar' fs0c131y
10:30 - 10:50 'Exploiting and Securing iOS Apps using OWASP iGoa . . . Swaroop Yermalkar
11:00 - 12:59 WORKSHOP 'Offensive Python: Custom Scripts for Pen . . . Fletcher Heisler
14:00 - 15:59 WORKSHOP 'Exploiting Bad Crypto Found in the Wild! . . . João Pena Gil
16:00 - 16:59 Networking & Challenges Networking & Challeng . . .

Return to Index


Aviation Village
Friday: 10:00 - 16:00, Saturday: 10:00 - 16:00, Sunday: 10:00 - 14:00
Location: Bally's, Event Center

Times Title speaker
Friday
13:00 - 13:15 Can the CAN bus fly ­Risks of CAN bus networks wi . . . Patrick Kiley
13:15 - 13:59 Behind the scenes of hacking airplanes Zoltan, Ben
14:00 - 14:30 Hacking the Air Force and Beyond Dr. Will Roper, Jack Cabl . . .
14:30 - 14:59 A Hacker Walks Into A Flight School And Says Ouch: . . . Tarah
Saturday
10:00 - 10:59 Panel – The Long Haul: The State of Aviation . . . Andrea, Stefan, Pete, Ren . . .
11:00 - 11:59 A hackers first solo: airplane avionics security 1 . . . Ken, Alex
Sunday
10:00 - 10:30 Ideas whose time has come: CVD, SBOM, and SOTA Katie, Art
10:30 - 10:59 Wireless Attacks on Aircraft Instrument Landing Sy . . . Harshad
11:00 - 11:30 In The Air And On The Air: Aviation Radio Systems Exploding Lemur
11:30 - 11:59 An introduction to the ARINC standards Karl

Return to Index


Block Chain Village
Friday: 10:00 - 16:00, Saturday: 10:00 - 16:00, Sunday: 10:00 - 14:00
Location: Flamingo, Laughlin III

Times Title speaker
Friday
09:50 - 09:59 Welcome Note
10:00 - 10:50 Keynote: Responding to Firefox 0-days Philip Martin
10:50 - 11:40 A Smart Contract Killchain. How the first Blockcha . . . Rod Soto&Victor Fang
11:40 - 11:59 Contest Announcement  Peter Kacherginsky
12:00 - 12:25 Hacking Cryptocurrencies Mark Nesbitt
12:30 - 13:20 Panel Discussion: Privacy : Enabler or Hindrance t . . . Diego Salazar (rehrar)
13:30 - 14:20 Forcing a trustworthy notion of sequential time Brian Vohaska (bvo)&J . . .
14:30 - 16:10 Mathematical Background of Blockchain Cryptography Saroj
16:20 - 17:10 Alice and Bob's Big Secret Mila Paul
17:10 - 17:59 The CryptoCurrency Security Standard (CCSS) Ron Stoner&Michael Pe . . .
18:00 - 18:20 Contest Roundup  Peter Kacherginsky
18:20 - 18:30 Closing note
Saturday
09:50 - 09:59 Welcome Note
10:00 - 10:50 Keynote:  Blockchain-Security Symbiosis: Secu . . . Paul Makowski
10:50 - 11:10 Contest Announcement  Peter Kacherginsky
11:10 - 11:35 FumbleChain: A Purposefully Vulnerable Blockchai Nils Amiet
11:35 - 11:59 Securing the Unknown: A Methodology for Auditing S . . . Ben
12:00 - 12:50 Secrets Worlds in Plain Web. The BlockChain DNS. Fernando Amatte
12:50 - 13:40 Jump-Oriented Programming (JOP) in Smart Contract . . . Xiaohang Yu
13:40 - 14:05 Low-Hanging Fruits in Blockchain Security Pavlo Radchuk&Serhii . . .
14:15 - 15:59 Take back control of user data with the decentrali . . . Kevin Leffew
16:10 - 17:59 Smashing Smart Contracts: Detecting and Exploiting . . . Daniel Luca&Dean Pier . . .
18:00 - 18:20 Contest Roundup  Peter Kacherginsky
18:20 - 18:30 Closing note
Sunday
09:45 - 09:50 Welcome Note
09:50 - 10:40 Crypto currency heist - the story so far ... Ryan Rubin
10:40 - 11:05 Distributed Decentralized Security for Bitcoin Wal . . . Ali Meer
11:05 - 11:30 Reflections on Blockchain Security Jan Gorzny
11:30 - 12:20 Bitcoin Honeypot - Wallet on floor of the Internet Gordon Draper
12:20 - 13:10 A single global public-utility blockchain & cr . . . Derek Moore
13:10 - 13:59 Hyperledger Fabric Security Essentials
14:00 - 14:10 Contest Results  Peter Kacherginsky
14:10 - 14:15 Vote of Thanks

Return to Index


Bio Hacking Village
Thursday: 10:00 - 18:00/19:00, Friday: 10:00 - 20:00, Saturday: 10:00 - 20:00, Sunday: 10:00 - 14:00
Location: Planet Hollywood, Melrose 1-3

Times Title speaker
Friday
10:00 - 10:15 Opening Words
10:15 - 10:59 Employ Cybersecurity Techniques Against the Threat . . . Eric D Perakslis
11:00 - 11:45 From buffer overflowing genomics tools to securing . . . Corey M. Hudson
11:45 - 12:30 How to Get Your Ass Kicked and Like It; Experienti . . . Corey M. Hudson
12:30 - 14:30 Medical Simulations Panel Corey M. Hudson
14:30 - 16:15 Amputees and Prosthetic Challenges Wayne Penn
16:15 - 16:59 Hacking Wetware with Open Source Software and Hard . . . Jay Lagorio
17:00 - 18:30 Beyond the Firmware Dr. Avi Rubin
18:30 - 19:15 0-Day Inside Mandy Logan
19:15 - 19:59 Medical Device Incident Response, Forensics, and . . . Sam Buhrow
Saturday
10:00 - 10:15 Opening Words Sam Buhrow
10:15 - 10:59 Spectra Jean Rintoul
11:00 - 11:45 DIY Medicine Alex Pearlman
11:45 - 12:30 Forensic Science and Information Security Najla Lindsay
12:30 - 14:30 Dr/Hacker Panel Najla Lindsay
14:30 - 15:15 The L33T Shall Inherit the Cosmos J.J. Hastings
15:15 - 15:59 The Story of SICGRL Vulnerability Andrea Downing
16:00 - 16:45 Cyberbiosecurity & the "Full Stack Biotechnologist . . . Steve Lewis
16:45 - 17:30 Building a New Decentralized Internet, With the No . . . Nick Titus, Zac Shannon, . . .
17:30 - 18:15 Liven Up Rachel Smith
18:15 - 18:59 Getting access to your heart's data Marie Moe
19:00 - 19:59 Digital Medicine 101 Jen Goldsack
Sunday
10:00 - 10:15 Opening Words Jen Goldsack
10:15 - 10:59 A Minor Threat Mike Kijewski
11:00 - 11:45 Blue Team Bio II - Genetic and Epigenetics Backups Mr_Br!ml3y
11:45 - 12:30 Biopiracy on the High Seas Marla Valentine
12:30 - 13:15 Getting Skin in the Game cyberlass
13:15 - 13:59 Chinese Military Combined Arms Effects - Bio-Weapo . . . Red Dragon 1949
14:00 - 14:59 Biohacking & Biosecurity Anne A. Madden

Return to Index


Blue Team Village Talks
Friday: 09:00 - 18:00, Saturday: 09:00 - 18:00, Sunday: 09:00 - 14:00
Location: Flamingo, Savoy BR

Times Title speaker
Friday
14:00 - 14:59 A Theme Of Fear: Hacking The Paradigm investigatorchi
15:00 - 15:59 Detection At Google: On Corp And Cloud fryx0r , JSteeleIR
16:30 - 16:59 Blue Team Guide For Fresh Eyes sopooped
17:00 - 17:30 The Cyber Threat Intelligence Mindset ch33r10
17:30 - 17:59 Serverless Log Analysis On AWS gkapoglis
Saturday
13:00 - 13:59 Security Strategy For Small-Medium Business
14:00 - 14:59 Anatomy Of A Megabreach: Equifax Report uncl3dumby
15:00 - 15:30 Memhunter - Automated Hunting Of Memory Resident M . . . marcosd4h , chgaray
16:30 - 16:59 When A Plan Comes Together: Building A SOC A-Team markaorlando
17:00 - 17:30 Extending Zeek For ICS Defense v4tl4, jamesdickenson
17:30 - 17:59 Killsuit - How The Equation Group Remained Out Of . . . connormorley, laciefan
Sunday
09:00 - 09:59 Evaded MicrosoftATA? **But** You Are Completely Ex . . . 9ian1i
10:00 - 10:59 Who Dis? Who Dis? The Right Way To Authenticate Lak5hmi5udheer, dhivus
11:00 - 11:59 BloodHound From Red to Blue Mathieu Saulnier
12:00 - 12:59 An Introduction To Malware Analysis Understudy77
13:00 - 13:59 Blue Team Village Closing Ceremony

Return to Index


Blue Team Village Workshops
Friday: 09:00 - 18:00, Saturday: 09:00 - 18:00, Sunday: 09:00 - 14:00
Location: Flamingo, Savoy BR

Times Title speaker
Friday
09:00 - 12:59 Threat Hunting With The Elastic Stack CyberPraesidium, politoin . . .
09:00 - 10:59 Threat Hunting With ATT&CK On Splunk
09:00 - 12:59 Deep Infrastructure Visibility With Osquery And Fl . . . thezachw
11:30 - 13:29 The "Art" of BEC
13:30 - 15:29 MEDIC! Malware Response 101 From The Trenches krypt3ia
14:00 - 17:59 Malware Traffic Analysis Workshop malware_traffic
16:00 - 17:59 Blue Teaming For Fun And The Sake Of Your Organiza . . . sirmudbl00d , apiary
Saturday
09:00 - 12:59 Introduction To Mac-Centric Incident Response Tool . . .

Return to Index


Car Hacking Village
Friday: 10:00 - 18:00, Saturday: 10:00 - 18:00, Sunday: 10:30 - 12:30
Location: Bally's, Event Center

Times Title speaker
Friday
13:00 - 13:50 Hacking into automotive clouds Rotem Bar
14:30 - 14:55 Tell Me Lies - Automotive LIDAR and Low-Tech Obfus . . . Rick Hansen
15:30 - 15:55 Lojack'd - pwning car alarms, vehicle trackers and . . . Ken Munro
15:00 - 15:25 Intro to UDS ac0rn
16:00 - 16:50 Legal Over-the-Air Spoofing of GNSS and its Effect . . . Victor Murray
17:00 - 17:50 Digital Vehicle Forensics Eoin Bates
Saturday
10:00 - 10:25 Fast, Furious and Insecure: Passive Keyless Entry . . . Lennert Wouters
10:30 - 10:25 Hacking Android and qnx (What treasures lie inside . . . Neiko Rivera
11:00 - 11:50 Reverse Engineering and Flashing ECU Firmware Upda . . . Greg Hogan
12:00 - 12:50 Weaponizing Hypervisors to protect Car Infotainmen . . . Dan Regalado

Return to Index


Cloud Village
Friday: 14:00 - 18:00, Saturday: 10:00 - 18:00, Sunday: 10:00 - 13:00
Location: Flamingo, Reno I

Times Title speaker
Friday
12:00 - 12:20 Opening Note
12:20 - 12:59 Keynote - Cloudy Vision: How Cloud Integration Com . . . Sean Metcalf
13:00 - 13:40 Exploiting IAM in the Google Cloud Platform Colin Estep
13:40 - 14:20 Battle in the Clouds: Attacker vs Defender on AWS Dani Goland & Mohsan Fari . . .
14:20 - 14:50 ATT&CKing the Sentinel – deploying a threat hunt . . .
14:50 - 15:25 Sponsored Talk - Anatomy of cloud hacking Pratik Shah
15:25 - 15:50 Security Battle Wounds from a Cloud SRE Jane Miceli
16:00 - 17:59 Pragmatic Cloud Security Automation Rich Mogull
Saturday
10:00 - 10:40 Build to Hack, Hack to Build Chris Le Roy
10:40 - 11:20 Applying Pareto's Principle for Securing AWS with . . . Ayman Elsawah
11:20 - 11:59 Here for a good time, not a long time: exploiting . . . Jenko Hwong
12:00 - 12:30 PacBot - Policy as Code from T-Mobile OSS Setu Parimi
12:30 - 13:10 Hacking into automotive clouds Rotem Bar
13:10 - 13:50 DYI Azure Security Assessment Tanya Janca & Teri Radich . . .
13:50 - 14:30 Using Splunk or ELK for Auditing AWS/GCP/Azure Sec . . .
14:30 - 15:10 Scaling Security in the Cloud With Open Source James Strassburg
15:10 - 15:50 Your Blacklist is Dead: Why the Future of Command . . . Erick Galinkin
16:00 - 17:59 An Open Source Adventure in the Cloud : Detection . . .
Sunday
10:00 - 10:45 Mining Malevolence: Cryptominers in the Cloud Cheryl Biswas
10:45 - 11:30 The Effectiveness Of Continuous Bug Hunting In Clo . . .
11:30 - 12:15 Is the cloud secure? How can you modernize your in . . .
12:15 - 12:59 Phishing in the cloud era

Return to Index


Crypto & Privacy Village
Friday: 10:00 - 19:00, Saturday: 10:00 - 19:00, Sunday: 10:00 - 13:30
Location: Planet Hollywood, Celebrity 1 & 2

Times Title speaker
Friday
10:30 - 10:59 Giving Cops the Finger: Compelled Device Decryptio . . . Riana Pfefferkorn
11:00 - 11:59 Implementing a Zero Knowledge Proof or, How to Wri . . . Cathie Yun
12:00 - 12:59 Fighting non consensual pornography the BADASS way Katelyn Bowden
13:00 - 13:59 (WS) RSA Signatures: How do they work? George Callow
13:00 - 13:30 Migrating to quantum-safe cryptography to protect . . . Christian Paquin
13:30 - 13:59 Enabling HTTPS for home network devices using Let' . . . Karl Koscher
14:00 - 14:59 (WS) Crypto for Kids
14:00 - 14:59 Who Belongs Where? How to Effectively Integrate Yo . . . Suchismita Pahi and Fred . . .
15:00 - 15:59 MITM mixed mode butterfly key privacy attack Ben Brecht
16:00 - 16:59 Black Mirror: You are your own privacy nightmare - . . . Cat Murdock
17:00 - 17:59 How PKI and SHAKEN/STIR Will Fix the Global Roboca . . . Mark B Cooper
Saturday
10:30 - 10:59 Towards Usable Dining Cryptographer Networks with . . . Tyler Kell
11:00 - 11:59 (WS) Using Privacy Badger and discovering trackers . . . Andrs Arrieta
11:00 - 11:59 TLS decryption attacks and back-doors to secure sy . . . Chris Hanlon
12:00 - 12:30 Stop right now! Quantum-Safe Instantaneous Vehicle . . . Sarah McCarthy
12:30 - 12:59 Scrubber: An open source compilation to protect jo . . . Ethan Gregory Dodge
13:00 - 13:59 Tiplines Today Harlo Holmes
14:00 - 14:59 (WS) Crypto for Kids
14:00 - 14:59 Adversarial Fashion - Sartorial Hacking to Combat . . . Kate Rose
15:00 - 16:30 (WS) I2P For Application Developers (Workshop) idk
15:00 - 15:59 I am Spartacus! (And You Can Be Too!) Ensuring Pri . . . Mike Kiser
16:00 - 16:30 Stop Facebook From Buying Your Brain: Facial Recog . . . Tiffany Li
16:30 - 17:30 Easy PAKE Oven Steve Thomas
17:30 - 17:59 Snoop all Telegram messages Vitor Ventura
Sunday
10:30 - 10:59 Don't Forget to Wipe Michael Portera
11:00 - 11:59 Empowering Gateways with Functional Encryption Yolan Romailler
12:00 - 12:59 Security and privacy of dating apps Alex Lomas and Alan Monie
13:00 - 13:59 Ironically, iOS robocall-blocking apps are violati . . . Dan Hastings

Return to Index


DEFCON Talk Tracks
Paris Hotel

Times Title speaker
Thursday
10:00 - 10:45 DC101, Paris Theatre
Exploiting Windows Exploit Mitigation for ROP Expl . . .
Omer Yair
11:00 - 11:45 DC101, Paris Theatre
Breaking Google Home: Exploit It with SQLite(Magel . . .
Wenxiang Qian, YuXiang Li . . .
12:00 - 12:45 DC101, Paris Theatre
Are Quantum Computers Really A Threat To Cryptogra . . .
Andreas Baumhof
13:00 - 13:45 DC101, Paris Theatre
Intro to Embedded Hacking—How you too can fi . . .
Philippe Laulheret
14:00 - 14:45 DC101, Paris Theatre
Web2Own: Attacking Desktop Apps From Web Security' . . .
Junyu Zhou, Ce Qin, Jiani . . .
15:00 - 16:45 DC101, Paris Theatre
DEF CON 101 Panel
Highwiz, Nikita, Will, n0 . . .
Friday
09:00 - 09:45 Paris - Track 1
DEF CON wants to help hackers anonymously submit b . . .
Jeff Moss, Corbin Souffra . . .
10:00 - 10:45 Paris - Track 1
Behind the Scenes of the DEF CON 27 Badge
Joe Grand (Kingpin)
10:00 - 10:45 Paris - Track 2
Hacking Congress: The Enemy Of My Enemy Is My Frie . . .
Former Rep. Jane Harman, . . .
10:00 - 10:45 Paris - Track 3
Behind the Scenes: The Industry of Social Media Ma . . .
Olivier Bilodeau, Masarah . . .
10:00 - 10:45 Paris - Track 4
Duplicating Restricted Mechanical Keys
Bill Graydon, Robert Gray . . .
11:00 - 11:45 Paris - Track 1
Don't Red-Team AI Like a Chump
Ariel Herbert-Voss
11:00 - 11:45 Paris - Track 2
The Tor Censorship Arms Race: The Next Chapter
Roger Dingledine
11:00 - 11:45 Paris - Track 3
All the 4G modules Could be Hacked
XiaoHuiHui, Ye Zhang, Zhe . . .
11:00 - 11:45 Paris - Track 4
Evil eBPF In-Depth: Practical Abuses of an In-Kern . . .
Jeff Dileo
12:00 - 12:45 Paris - Track 1
Process Injection Techniques - Gotta Catch Them Al . . .
Itzik Kotler, Amit Klein
12:00 - 12:45 Paris - Track 2
Phreaking Elevators
WillC
12:00 - 12:45 Paris - Track 3
Infiltrating Corporate Intranet Like NSA ̶Pre-aut . . .
Orange Tsai, Meh Chang
12:00 - 12:45 Paris - Track 4
API-Induced SSRF: How Apple Pay Scattered Vulnerab . . .
Joshua Maddux
13:00 - 13:45 Paris - Track 1
HackPac: Hacking Pointer Authentication in iOS Use . . .
Xiaolong Bai, Min (Spark) . . .
13:00 - 13:45 Paris - Track 2
HVACking: Understand the Difference Between Securi . . .
Douglas McKee, Mark Berez . . .
13:00 - 13:45 Paris - Track 3
No Mas – How One Side-Channel Flaw Opens Atm, Ph . . .
phar
13:00 - 13:45 Paris - Track 4
More Keys Than A Piano: Finding Secrets In Publicl . . .
xBen "benmap" Morris
14:00 - 14:45 Paris - Track 1
Harnessing Weapons of Mac Destruction
Patrick Wardle
14:00 - 14:45 Paris - Track 2
Are Your Child's Records at Risk? The Current Stat . . .
Bill Demirkapi
14:00 - 14:45 Paris - Track 3
A Hacker Guide To Deep-Learning Based Side Channel . . .
Elie Bursztein, Jean Mich . . .
14:00 - 14:45 Paris - Track 4
Practical Key Search Attacks Against Modern Symmet . . .
Daniel "ufurnace" Crowley . . .
15:00 - 15:45 Paris - Track 1
MOSE: Using Configuration Management for Evil
Jayson Grace
15:00 - 15:45 Paris - Track 2
Change the World, cDc Style: Cow tips from the fir . . .
Joseph Menn, Peiter Mudge . . .
15:00 - 15:45 Paris - Track 3
100 Seconds of Solitude: Defeating Cisco Trust Anc . . .
Jatin Kataria, Rick Housl . . .
15:00 - 15:45 Paris - Track 4
Relaying Credentials Has Never Been Easier: How to . . .
Marina Simakov, Yaron Zin . . .
16:30 - 16:50 Paris - Track 1
Poking the S in SD cards
Nicolas Oberli
16:00 - 16:30 Paris - Track 1
Please Inject Me, a x64 Code Injection
Alon Weinberg
16:30 - 16:50 Paris - Track 2
Can You Track Me Now? Why The Phone Companies Are . . .
U.S. Senator Ron Wyden
16:00 - 16:30 Paris - Track 2
I Know What You Did Last Summer: 3 Years of Wirele . . .
d4rkm4tter (Mike Spicer)
16:00 - 16:30 Paris - Track 3
Surveillance Detection Scout - Your Lookout on Aut . . .
Truman Kain
16:30 - 16:50 Paris - Track 3
Breaking The Back End! It Is Not Always A Bug. S . . .
Gregory Pickett
16:30 - 16:50 Paris - Track 4
Re: What's up Johnny? – Covert Content Attacks o . . .
Jens Müller
16:00 - 16:30 Paris - Track 4
The JOP ROCKET: A Supremely Wicked Tool for JOP Ga . . .
Dr. Bramwell Brizendine, . . .
20:00 - 21:59 Planet Hollywood - Firesides Lounge
D0 N0 H4RM: A Healthcare Security Conversation
Christian “quaddi” Da . . .
22:15 - 22:59 Planet Hollywood - Firesides Lounge
Panel: DEF CON Groups
Brent White / B1TK1LL3R, . . .
Saturday
10:00 - 10:45 Paris - Track 1
Weaponizing Hypervisors to Fight and Beat Car and . . .
Ali Islam, Dan Regalado ( . . .
10:00 - 10:45 Paris - Track 2
Rise of the Hypebots: Scripting Streetwear
finalphoenix
10:00 - 10:45 Paris - Track 3
Information Security in the Public Interest
Bruce Schneier
10:00 - 10:45 Paris - Track 4
EDR Is Coming; Hide Yo Sh!t
Michael Leibowitz, Topher . . .
11:00 - 11:45 Paris - Track 1
Your Car is My Car
Jmaxxz
11:00 - 11:45 Paris - Track 2
HAKC THE POLICE
Bill Swearingen
11:00 - 11:45 Paris - Track 3
Hacking Your Thoughts - Batman Forever meets Black . . .
Katherine Pratt/GattaKat
11:00 - 11:45 Paris - Track 4
Meticulously Modern Mobile Manipulations
Leon Jacobs
12:00 - 12:45 Paris - Track 1
How You Can Buy AT&T, T-Mobile, and Sprint Real-Ti . . .
Joseph Cox
12:00 - 12:45 Paris - Track 2
Defeating Bluetooth Low Energy 5 PRNG for Fun and . . .
Damien Cauquil (virtualab . . .
12:00 - 12:45 Paris - Track 3
Why You Should Fear Your “mundane” Office Equi . . .
Daniel Romero, Mario Riva . . .
12:00 - 12:45 Paris - Track 4
Zombie Ant Farm: Practical Tips for Playing Hide a . . .
Dimitry Snezhkov
13:00 - 13:45 Paris - Track 1
RACE - Minimal Rights and ACE for Active Directory . . .
Nikhil Mittal
13:00 - 13:45 Paris - Track 2
GSM: We Can Hear Everyone Now!
Campbell Murray, Eoin Buc . . .
13:00 - 13:45 Paris - Track 3
Tag-side attacks against NFC
Christopher Wade
13:00 - 13:45 Paris - Track 4
SSO Wars: The Token Menace
Alvaro Muñoz, Oleksandr . . .
14:00 - 14:45 Paris - Track 1
SELECT code_execution FROM * USING SQLite;—G . . .
Omer Gull
14:00 - 14:45 Paris - Track 2
I'm on your phone, listening - Attacking VoIP Conf . . .
Stephan Huber, Philipp Ro . . .
14:00 - 14:45 Paris - Track 3
Zero bugs found? Hold my Beer AFL! How To Improve . . .
Maksim Shudrak
14:00 - 14:45 Paris - Track 4
Next Generation Process Emulation with Binee
Kyle Gwinnup, John Holowc . . .
15:00 - 15:45 Paris - Track 1
Get off the Kernel if you can’t Drive
Jesse Michael, Mickey Shk . . .
15:00 - 15:45 Paris - Track 2
Reverse-Engineering 4g Hotspots for Fun, Bugs and . . .
g richter
15:00 - 15:45 Paris - Track 3
State of DNS Rebinding - Attack & Prevention Techn . . .
Gerald Doussot, Roger Mey . . .
15:00 - 15:45 Paris - Track 4
.NET Malware Threats: Internals And Reversing
Alexandre Borges
16:30 - 16:50 Paris - Track 1
Unpacking Pkgs: A Look Inside Macos Installer Pack . . .
Andy Grant
16:00 - 16:30 Paris - Track 1
Reverse Engineering 17+ Cars in Less Than 10 Minut . . .
Brent Stone
16:00 - 17:45 Paris - Track 2
NOC NOC. Who's there? All. All who? All the things . . .
The DEF CON NOC
16:30 - 16:50 Paris - Track 3
Go NULL Yourself or: How I Learned to Start Worryi . . .
droogie
16:00 - 16:30 Paris - Track 3
Confessions of an Nespresso Money Mule: Free Stuff . . .
Nina Kollars, Kitty Hegem . . .
16:00 - 16:30 Paris - Track 4
Vacuum Cleaning Security—Pinky and the Brain Edi . . .
jiska, clou (Fabian Ullri . . .
16:30 - 16:50 Paris - Track 4
Apache Solr Injection
Michael Stepankin
20:00 - 21:59 Planet Hollywood - Firesides Lounge
Meet the EFF - Meetup Panel
Kurt Opsahl, Camille Fisc . . .
22:15 - 22:59 Planet Hollywood - Firesides Lounge
We Hacked Twitter… And the World Lost Their Sh*t . . .
Mike Godfrey, Matthew Car . . .
Sunday
10:00 - 10:45 Paris - Track 1
Backdooring Hardware Devices By Injecting Maliciou . . .
Sheila Ayelen Berta
10:00 - 10:45 Paris - Track 2
Adventures In Smart Buttplug Penetration (testing)
smea
10:00 - 10:45 Paris - Track 3
Hacking WebAssembly Games with Binary Instrumentat . . .
Jack Baker
10:00 - 10:45 Paris - Track 4
Your Secret Files Are Mine: Bug Finding And Exploi . . .
Xiangqian Zhang, Huiming . . .
11:00 - 11:45 Paris - Track 1
The ABC of Next-Gen Shellcoding
Hadrien Barral, Rémi Gé . . .
11:00 - 11:45 Paris - Track 2
SDR Against Smart TVs: URL and Channel Injection A . . .
Pedro Cabrera Camara
11:00 - 11:45 Paris - Track 3
Exploiting Qualcomm WLAN and Modem Over The Air
Xiling Gong, Peter Pi
11:00 - 11:45 Paris - Track 4
Say Cheese - How I Ransomwared Your DSLR Camera
Eyal Itkin
12:00 - 12:45 Paris - Track 1
I'm In Your Cloud... Pwning Your Azure Environemen . . .
Dirk-jan Mollema
12:00 - 12:45 Paris - Track 2
Malproxying: Leave Your Malware at Home
Hila Cohen, Amit Waisel
12:00 - 12:45 Paris - Track 3
HTTP Desync Attacks: Smashing into the Cell Next D . . .
albinowax
12:00 - 12:45 Paris - Track 4
Help Me, Vulnerabilities. You're My Only Hope
Jacob Baines
13:00 - 13:45 Paris - Track 1
[ MI CASA-SU CASA ] My 192.168.1.1 is Your 192.168 . . .
Elliott Thompson
13:00 - 13:45 Paris - Track 2
Sound Effects: Exploring Acoustic Cyber-weapons
Matt Wixey
13:00 - 13:45 Paris - Track 3
Owning The Cloud Through Server-Side Request Forge . . .
Ben Sadeghipour, Cody Bro . . .
13:00 - 13:45 Paris - Track 4
Want Strong Isolation? Just Reset Your Processor
Anish Athalye
14:00 - 14:45 Paris - Track 1
Firmware Slap: Automating Discovery of Exploitable . . .
Christopher Roberts
14:00 - 14:45 Paris - Track 2
Cheating in eSports: How to Cheat at Virtual Cycli . . .
Brad Dixon
14:00 - 15:30 Paris - Track 4
Contests Awards Ceremony
Contests & Events Goons
16:00 - 17:59 Tracks 1,2,3
Closing Ceremonies
The Dark Tangent & Goons

Return to Index


DEFCON Demo Labs
Friday: 10:00 - 16:00, Saturday: 10:00 - 16:00, Sunday: 10:00 - 12:00
Location: Planet Hollywood, Sunset 1 - 6

Times Title speaker
Friday
10:00 - 11:50 Antennas for Surveillance applications Kent Britain, Alexander Z . . .
10:00 - 11:50 PhanTap (Phantom Tap) Diana Dragusin, Etienne C . . .
10:00 - 11:50 BEEMKA – Electron Post-Exploitation Framework Pavel Tsakalidis
10:00 - 11:50 Reverse Engineering Embedded ARM with Ghidra Max Compston
10:00 - 11:50 Hachi: An Intelligent threat mapper Parmanand Mishra
10:00 - 11:50 soFrida - Dynamic Analysis Tool for Mobile Apps w . . . Hyunjun Park, Soyeon Kim
12:00 - 13:50 EAPHammer Gabriel Ryan
12:00 - 13:50 PcapXray Srinivas Piskala Ganesh B . . .
12:00 - 13:50 Spartacus as a Service (SaaS) Mike Kiser
12:00 - 13:50 Flatline East
12:00 - 13:50 Phishing Simulation Jyoti Raval
12:00 - 13:50 TaintedLove Benoit Côté-Jodoin
14:00 - 15:50 Browser extension to hunt low hanging fruits (Hack . . . Rewanth Cool
14:00 - 15:50 Let's Map Your Network Pramod Rana
14:00 - 15:50 EXPLIoT - IoT Security Testing and Exploitation Fr . . . Aseem Jakhar, Murtuja Bha . . .
14:00 - 15:50 Chaos Drive, because USB is still too trustworthy Mike Rich
14:00 - 15:50 Combo Password Fabian Obermaier
14:00 - 15:50 OSfooler-NG: Next Generation of OS fingerprinting . . . Jaime Sanchez
Saturday
10:00 - 11:50 WiFi Kraken – Scalable Wireless Monitoring Mike Spicer
10:00 - 11:50 CIRCO: Cisco Implant Raspberry Controlled Operatio . . . Emilio Couto
10:00 - 11:50 Cotopaxi: IoT Protocols Security Testing Toolkit Jakub Botwicz
10:00 - 11:50 Srujan: Safer Networks for Smart Homes Sanket Karpe, Parmanand M . . .
10:00 - 11:50 Go Reverse Engineering Tool Kit Joakim Kennedy
10:00 - 11:50 Memhunter - Automated hunting of memory resident m . . . Marcos Oviedo
12:00 - 13:50 Burp Plugin: Cyber Security Transformation Chef (C . . . Ralf Almon, Sebastian Put . . .
12:00 - 13:50 ioc2rpz Vadim Pavlov
12:00 - 13:50 Local Sheriff Konark Modi
12:00 - 13:50 PCILeech and MemProcFS Ulf Frisk, Ian Vitek
12:00 - 13:50 Dr.ROBOT: Organized Chaos and the Shotgun Approach Aleksandar Straumann, Jay . . .
12:00 - 13:50 bedr Mark Ignacio
14:00 - 15:50 Burpsuite Team Server for Collaborative Web App Te . . . Tanner Barnes
14:00 - 15:50 OWASP Amass Jeff Foley, Anthony Rhode . . .
14:00 - 15:50 PivotSuite: Hack The Hidden Network - A Network Pi . . . Manish Gupta
14:00 - 15:50 SILENTTRINITY Marcello Salvati
14:00 - 15:50 Shellcode Compiler Ionut Popescu
14:00 - 15:50 Shadow Workers: Backdooring with Service Workers Emmanuel Law, Claudio Con . . .
Sunday
10:00 - 11:50 Zigbee Hacking: Smarter Home Invasion with ZigDig . . . Francis Brown, Matt Gleas . . .
10:00 - 11:50 Vulmap: Online Local Vulnerability Scanners Projec . . . Yavuz Atlas, Fatih Ozel
10:00 - 11:50 USB-Bootkit – New Bookit via USB Interface in Su . . . Haowen Bai
10:00 - 11:50 Rhodiola Utku Sen
10:00 - 11:50 QiLing KaiJern, Lau, Dr. Nguyen . . .

Return to Index


Ethics Village
Friday: 12:00 - 18:00, Saturday: 12:00 - 18:00, Sunday: 11:00 - 14:00
Location: Flamingo, Reno II

Times Title speaker
Friday
11:00 - 11:59 Keynote: A Rant on Ethical Disclosure
13:00 - 13:59 Law Professor Round Robin
14:00 - 14:59 Coffee Talk With Anthony Ferrante Anthony Ferrante
15:00 - 15:59 Coffee Talk With Dr. Suzanne Schwartz Dr. Suzanne Schwartz
16:00 - 16:59 Coffee Talk With Joshua Steinman Joshua Steinman
17:00 - 17:59 Coffee Talk With Erie Meyer Erie Meyer
Saturday
10:00 - 10:59 Void If Removed: Securing Our Right TO Repair
12:00 - 12:59 Is It Ethical To Work On Autonomous Weapon Systems . . .
14:00 - 14:59 Ethical Issues In Cyber Attribution
16:00 - 16:59 National Collegiate Penetration Testing Competitio . . .
Sunday
10:00 - 10:59 Who's Tracking Your Body? Health Apps And Your Pri . . .
12:00 - 12:59 Ethics Training Workshop

Return to Index


Hardware Hacking Village
Friday: 10:00 - 19:00, Saturday: 10:00 - 19:00, Sunday: 10:00 - 13:00
Location: Bally's, Event Center

Times Title speaker
Friday
10:00 - 10:50 Reversing Corruption In Seagate Hdd Translators, T . . . Allison Marie Naaktgebore . . .
11:00 - 11:50 Another Car Hacking Approach Benjamin Lafois, Vladan N . . .
11:00 - 12:50 Rapid Prototyping For Badges Securelyfitz and friends
12:00 - 12:30 Infrared: New Threats Meet Old Devices Wang Kang
14:00 - 14:50 Making A Less Shitty Sao: How To Use Kicad To Buil . . . Steve Ball (hamster)
15:00 - 15:50 Ebolaphone Or Bust SciaticNerd
Saturday
11:00 - 11:50 Understanding & Making Pcb Art TwinkleTwinkie
12:00 - 12:50 What You Print Is Not What You Get Anymore: Mitm A . . . Hamza Alkofahi
14:00 - 14:50 Hacking Con Badges for Fun and Profit Rob Rehr
17:00 - 17:50 Fireside Chat Style Followup To Main Track Talk: T . . . Christopher Wade

Return to Index


Hack the Sea Village
Friday: 10:00 - 18:00, Saturday: 10:00 - 18:00, Sunday: 10:00 - 13:00
Location: Bally's, Event Center

Times Title speaker
Friday
11:00 - 11:30 Sinking Ships & Stealing Containers from Ports . . . Ken Munro
11:30 - 11:59 Maritime Pen Testing 101: Don’t poop on the . . . Andrew Tierney Neil Boy
11:00 - 11:30 Opening Remarks Brian Satira
12:00 - 12:30 National Security Council and Special Assistant fo . . . Keynote: Josh Steinman
12:30 - 13:30 SeaSteading: A home on the Waves Carly Jackson
13:30 - 14:15 Firmware Rewriting to Gain Persistence on Satcom T . . . David Belasco
14:15 - 14:30 Propulsion REdoubt
14:30 - 14:59 TROMMEL Demo – Sift through embedded device . . . Kyle O’Meara
15:00 - 15:30 Maritime cyber policy and regulation Cris DeWitt
15:30 - 15:59 GMDSS including Automated Identification System (p . . . Julian Blanco
16:00 - 16:30 Navigation including ECDIS, GPS, and radar Stephan Gerling
Saturday
11:00 - 11:30 Propulsion REdoubt
11:30 - 11:59 Design your own seastead game Carly Jackson
13:30 - 13:59 Communications including Satcom and NMEA protocols Stephan Gerling
13:30 - 13:59 Finding Flaws in a Satcom Terminal Kyle O’Meara & . . .
14:00 - 14:59 Pwning a mobile drilling rig Andrew Tierney and Chris . . .
14:00 - 14:59 Creating a Maritime Cybersecurity Community Zachary Staples
14:00 - 14:59 From IT to OT – How to segue into hacking ma . . . Weston Hecker
15:00 - 15:30 Maritime Cyber Policy 101 Cris DeWitt
15:00 - 15:59 ByteSweep Firmware Analysis Automation Project nmatt
15:00 - 15:59 Development of the Maritime Cyberphysical Testbeds Zachary Staples
15:30 - 15:59 Maritime Cyber Policy Panel Cris DeWitt
Sunday
10:00 - 10:30 AIS C2 Julian Blacno
10:30 - 11:30 Yacht Hacking – from SatCom to Engine contro . . . Stephan Gerling
11:30 - 11:59 Surviving Maritime Vulnerability Disclosure R3doubt
12:00 - 12:59 Closing Ceremony and Awards R3doubt

Return to Index


Industrial Control Systems Village
Friday: 10:00 - 18:00, Saturday: 10:00 - 18:00, Sunday: 10:00 - 13:00
Location: Bally's, Event Center

Times Title speaker
Friday
15:00 - 15:30 Pin the tail on the cyber owner Ryan Leirvik
15:30 - 15:59 IT/OT Convergence - Are We There Yet? Jack Oden
16:00 - 16:30 Nation State Supply Chain Attacks for Dummies -or . . . Monta Elkins
16:30 - 16:59 ICS Threats - A Short Summary of the Past Year Bryson Bort
17:00 - 17:30 Changium IPiosa: most magical change IP packets in . . . Sharon Brizinov, Tal Kere . . .
Saturday
12:00 - 12:30 Hack the World & Galaxy with OSINT Chris Kubecka
12:30 - 12:59 SCADA: What the next Stuxnet will look like and ho . . . Joseph Bingham
13:00 - 13:30 HVACking: Understand the difference Between Securi . . . Douglas McKee, Mark Berez . . .
13:30 - 13:59 CRASHOVERRIDE: Re-Assessing the 2016 Ukraine Elect . . . Joe Slowik
14:00 - 14:30 Abusing the IoT in Smart Buildings Daniel dos Santos
14:30 - 14:59 Purple Teaming ICS Networks Austin Scott

Return to Index




Times Title speaker
Friday
10:15 - 10:59 A Security Researchers Guide into the Fitbit Ecosy . . . DanielAW, Jiska, Carolin
11:30 - 11:59 SOHOpelessly Broken 2.0: Circumventing Security Co . . . Rick Ramgattie @RRamgatti . . .
12:30 - 12:59 A glorious celebration of IoT security Lee Brotherston @synackps . . .
13:15 - 13:59 Regulatory Trends in IoT Security and impact on th . . . Amit Elazari @amitelazari
14:15 - 14:59 GAS THE RAMEN: Hacking the Unhackable Bitfi from J . . . Ken Munro @thekenmunrosho . . .
15:15 - 15:59 Privacy leaks in smart devices: Extracting data fr . . . Dennis Giese @dgi_de
16:15 - 16:59 Next-gen IoT Botnets 3 - moar ownage Alex "Jay" Balan @jaymzu
Saturday
10:15 - 10:59 Hacking the Zyxel NAS 326 from the Perspective of . . . Maxwell Dulin
11:30 - 11:59 Mixing industrial protocols with web application s . . . Bertin Bervis @bertinjose . . .
12:15 - 12:59 IoT Security and Manufacturers Panel with Q&A Jun Du - Zingbox, Hagai S . . .
13:15 - 13:59 H(ACK)DMI: PWNING HDMI FOR FUN AND PROFIT Hyejin Jeong @moraeh23, J . . .
14:15 - 14:59 Greenwaves and Ham Elvis Collado @b1ack0wl
15:15 - 15:59 Get your next roadtrip for free! Long live the vul . . . M. Can Kurnaz @0x43414e
16:15 - 16:59 Spy vs. Spy - who's watching who? Michael Raggo @mikeraggo, . . .

Return to Index


Lock Bypass Village
Friday: 11:00 - 17:00, Saturday: 10:00 - 19:00, Sunday: 10:00 - 13:00
Location: Flamingo, Carson City I

Times Title speaker
Friday
13:00 - 13:59 So You Want to Rob a Bank: Overt Ops Timing & Prac . . .
15:00 - 15:59 Lock Bypass 101
Saturday
11:00 - 11:59 Lock Bypass 101
15:00 - 15:59 Lock Bypass 101
18:00 - 18:59 The Human Body's Promise: How Your Bare Hands can . . .
Sunday
11:00 - 11:59 Lock Bypass 101

Return to Index


Lock Pick Village
Friday: 10:00 - 18:00, Saturday: 10:00 - 18:00, Sunday: 10:00 - 14:00
Location: Bally's, Platinum BR

Times Title speaker
Friday
10:15 - 10:45 Intro to Lockpicking
11:00 - 11:40 Insider Attacks on Master Key Systems Matt Burrough
12:00 - 12:30 Intro to Lockpicking
13:00 - 13:59 History of Lockpicking Matt Ploessel
14:15 - 14:45 Intro to Lockpicking
15:00 - 15:45 Safecracking, the insecurity you (probably) never . . . Jared Dygert
16:00 - 16:45 Law School for Lock Pickers Preston Thomas
Saturday
10:15 - 10:45 Intro to Lockpicking
11:00 - 11:50 Implantable RFID: Is Cyborgification Right For You Deviant Ollam, Max Power, . . .
12:00 - 12:30 Intro to Lockpicking
13:00 - 13:20 Practical Approaches to Picking Medeco Locks skonkworks
14:15 - 14:45 Intro to Lockpicking
15:00 - 15:45 What I Wish I Knew When I Started Picking Harry
16:00 - 16:30 Crazed Lockpick Idea to Crazed Lockpick "Inventor" . . . d1dymu5
Sunday
10:15 - 10:45 Intro to Lockpicking
11:00 - 11:15 Hurt by high security Cryo
12:00 - 12:30 Intro to Lockpicking
12:45 - 13:45 The Right Way To Do Wrong: Physical security secre . . . Patrick McNeil

Return to Index


Meetups: Various gatherings, activities, or Contests

Times Title speaker
Thursday
06:00 - 06:59 DEFCON 27 4X5K run
12:00 - 12:59 Friends of Bill W.
16:00 - 21:59 Toxic BBQ
17:00 - 17:59 Friends of Bill W.
17:00 - 18:59 DEFCON Ladies Meetup
Friday
06:00 - 07:59 2019 8th Annual Defcon Bike Ride
06:00 - 06:59 DEFCON 27 4X5K run
12:00 - 12:59 Book Signing - Alex Matrosov & Eugene Rodionov - R . . . Alex Matrosov, Eugene Rod . . .
12:00 - 12:59 Friends of Bill W.
13:00 - 13:59 Book Signing - Travis Goodspeed - POC||GTFO Travis Goodspeed
13:00 - 14:59 Beverage Cooling Contest
15:05 - 16:30 SpellCheck: The Hacker Spelling Bee
15:00 - 17:59 BADASS/Cyber SeXurity
17:00 - 18:59 EFF Trivia
17:00 - 17:59 Friends of Bill W.
18:00 - 19:59 /r/defcon DEF CON 27 Meetup
18:30 - 17:59 Hackers Against Brexit
18:00 - 19:59 Lawyers Meet
19:00 - 20:59 Blacks in Cybersecurity Meetup
Saturday
06:00 - 06:59 DEFCON 27 4X5K run
11:00 - 12:59 dstruction
12:00 - 12:59 Book Signing - Georgia Weidman - Penetration Testi . . . Georgia Weidma
12:00 - 12:59 Friends of Bill W.
13:00 - 14:59 DEFCON Sticker Swap
13:00 - 13:59 Book Signing - Jean-Philippe Aumasson - Serious Cr . . . Jean-Philippe Aumasson
13:00 - 14:59 Beard and Mustache Contest
15:00 - 16:59 Homebrew Hardware Contest
17:00 - 17:59 Tinfoil Hat Contest
17:00 - 17:59 Friends of Bill W.
19:30 - 25:59 Hacker Flairgrounds
Sunday
06:00 - 06:59 DEFCON 27 4X5K run
10:30 - 12:30 Hackaday Breakfast at DEFCON
12:00 - 12:59 Book Signing - Matt Burrough - Pentesting Azure Ap . . . Matt Burrough
12:00 - 12:59 Friends of Bill W.

Return to Index


Monero Village
Thursday: 10:00 - 18:00, Friday: 10:00 - 18:00, Saturday: 10:00 - 18:00, Sunday: 10:00 - 14:00
Location: Ballys, Skyview 4

Times Title speaker
Thursday
13:00 - 14:45 Documentary – The Internet's Own Boy: The Story . . .
14:45 - 16:10 Documentary – Revolution OS
16:00 - 16:59 Getting Started with Monero Workshop Justin Ehrenhofer
Friday
10:00 - 10:30 Welcome to the Monero Village! Diego “rehrar” Salaza . . .
10:30 - 11:30 Keynote Speech: Monero Introduction and Investor P . . . Daniel Kim
11:45 - 12:15 Houston, we have a problem: 86(R) H.B. 4371 is a n . . . A.J. Santos
12:15 - 13:15 Regulation Station A.J. Santos
12:15 - 13:08 Selected Short Films
13:15 - 13:45 AirBNB for Retail Internet / A Distributed Interne . . . Allan Stevo
14:00 - 14:30 Creating Cake from Scratch Vik Sharma
14:45 - 15:15 Perspectives of Privacy: Blockchain as a Boundary . . . Robin “midipoet” Renw . . .
15:15 - 18:59 i2p Workshop for Cryptocurrencies zzz
15:15 - 16:30 How to Reach People in the Developing World Zcash Foundation
15:15 - 16:15 Documentary - Code Rush
16:45 - 17:15 If You Like It, Then You Should Have Put a Ring Si . . . Sarang Noether
17:30 - 17:59 Film – Kung Fury
Saturday
10:00 - 10:59 Keynote Speech: Mass Surveillance, Mass Incarcerat . . . Jeremy Gillula
11:15 - 11:45 The Cost of Good Open-Source Software Amir Montazery
11:45 - 13:30 OSTIF Station Amir Montazery
12:00 - 12:45 Monero is UGLY and DIFFICULT to use! Diego “rehrar” Salaza . . .
13:00 - 13:30 What Happens when the Block Reward Runs Out? The C . . . Francisco “ArticMine” . . .
13:30 - 14:59 Documentary – Nothing to Hide
13:30 - 15:15 Core Team Meet and Greet
13:30 - 15:15 Narratives of Privacy Discussion Zcash Foundation
13:30 - 14:15 Hardware and Badge Demonstrations Michael “msvb” Schloh . . .
14:15 - 15:15 Cryptography Playtime Workshop Sarang Noether
15:15 - 16:15 Keynote Speech: Building a Secure, Open Smartphone Todd Weaver
16:30 - 16:59 Improving Monero’s Release Schedule Justin Ehrenhofer
17:15 - 17:59 InfoSec v Hacker: The War for the Soul of a Techno . . . Allan Stevo
18:00 - 18:15 Monero Party Announcement Cinnamonflower and pwrcyc . . .
18:15 - 19:59 Monero Village “Warm-up” Party
Sunday
10:00 - 10:45 MimbleWimble, a Story of Blockchain Privacy Gus Clarke and Leland Lee
11:00 - 11:30 Handling broken cryptography and building a new on . . . Reuben Yap
11:30 - 13:30 Zcoin Station
11:45 - 12:30 Walking Through the High-Level Math Behind Bulletp . . . Cathie Yun
12:30 - 12:59 The Future of Accessible Mining Kristy-Leigh Minehan
13:30 - 13:59 Where We Go from Here: Closing Remarks and Game Diego “rehrar” Salaza . . .

Return to Index


Night Life: Parties, Music acts or DJ, or other night time gatherings

Times Title speaker
Thursday
20:00 - 21:59 Cubcon 2019 Noid
21:00 - 21:59 Music - Tineh Nimjeh Tineh Nimjeh
22:00 - 22:59 Music - Archwisp Archwisp
23:00 - 23:59 Music - CTRL CTRL
24:00 - 24:59 Music - Rodman Rodman
25:00 - 25:59 Music - Seeker Seeker
Friday
19:30 - 25:59 Diversity Party
19:30 - 25:59 Hacker Karaoke
20:00 - 26:15 Blanketfort Con Party
20:00 - 21:30 Movie Night - Logan's Run
20:00 - 21:59 Hacker Jeopardy
21:00 - 24:59 303/Skytalks Pajama Dance Party
21:00 - 21:59 Music - Steph Infection Steph Infection
21:00 - 24:59 VETCON II
21:00 - 21:59 Music - E.ghtB.t - GLOWZONE E.ghtB.t
21:00 - 25:59 Florida Man Party
21:00 - 21:59 Music - Terrestrial Access Network - GLOWZONE Terrestrial Access Networ . . .
22:00 - 22:59 Music - S7a73farm S7a73farm
22:00 - 22:59 Music - Amplitude Problem ft. YT Cracker - GLOWZON . . . Amplitude Problem
22:00 - 22:59 Music - Icetre Normal - GLOWZONE Icetre Normal
22:00 - 25:59 SecKC the work, Again party SecKC
22:00 - 23:30 Movie Night - Star Trek: The Motion Picture
22:00 - 23:59 Who's Slide is it anyway?
23:00 - 23:59 Music - Acid-T a.k.a DJ SmOke Acid-T a.k.a DJ SmOke
23:45 - 24:30 Music - Dualcore - GLOWZONE Dualcore
23:00 - 23:45 Music - YT Cracker - GLOWZONE YT Cracker
23:00 - 23:59 Music - Miss Jackalope - GLOWZONE Miss Jackalope
24:00 - 24:59 Music - Wil Austin Wil Austin
24:30 - 25:15 Music - MC Frontalot - GLOWZONE MC Frontalot
24:00 - 24:59 Music - DJ St3rling - GLOWZONE DJ St3rling
25:00 - 25:59 Music - ASHSLAY ASHSLAY
25:15 - 26:15 Music - Magik Plan Magik Plan
25:00 - 25:59 Music - DJ%27 - GLOWZONE DJ%27
Saturday
18:00 - 18:59 H@ck3r Runw@y
19:30 - 25:59 Hacker Karaoke
19:00 - 21:59 Dallas Hackers Party
20:00 - 21:30 Movie Night - GATTICA
20:00 - 21:59 Hacker Jeopardy
20:00 - 24:59 DC801 Party
21:00 - 26:59 DEFCON Monero Party
21:00 - 21:59 Music - DJ Th@d DJ Th@d
21:30 - 25:59 Arcade Party
21:00 - 25:59 303/Skytalks Party
21:00 - 21:59 Music - Skittish & Bus Skittish & Bus
21:00 - 25:59 Car Hacking Village Party
21:00 - 21:59 Music - Kampf Kampf
21:00 - 24:30 IoT Village Party
22:00 - 22:59 Music - Azuki Azuki
22:00 - 22:59 Music - Miss Jackalope Miss Jackalope
22:00 - 25:59 GothCON party
22:00 - 22:59 Music - Icetre Normal Icetre Normal
22:00 - 23:30 Movie Night - Demolition Man
22:00 - 23:59 Drunk Hacker History
23:00 - 23:59 Music - Magik Plan Magik Plan
23:00 - 23:59 Music - Zebbler Encanti Experience Zebbler Encanti Experienc . . .
23:00 - 23:59 Music - ScotchAndBubbles ScotchAndBubbles
24:00 - 24:59 Music - E.ghtB.t E.ghtB.t
24:00 - 24:59 Music - Rabbit In The Moon Rabbit In The Moon
24:00 - 24:59 Music - Acid-T a.k.a dj SmOke Acid-T a.k.a dj SmOke
25:00 - 25:59 Music - Yurk Yurk
25:00 - 25:59 Music - Ninjula Ninjula
25:00 - 25:59 Music - Clockwork Echo Clockwork Echo

Return to Index


Packet Hacking Village Talks
Friday: 10:00 - 18:00, Saturday: 09:00 - 18:00, Sunday: 10:00 - 14:30
Location: Ballys, Skyview 5-6, 1-2 (Resort (Indigo) Tower, 26th Floor)

Times Title speaker
Friday
10:00 - 10:59 4 years and 10,000+ Hours Later: Lessons Learned f . . . Tom Kopchak and Dan Borge . . .
11:00 - 11:59 Hacking Kubernetes: Choose Your Own Adventure Styl . . . Jay Beale
12:00 - 12:59 StegoAugmented Malware Mike Raggo and Chet Hosme . . .
13:00 - 13:59 The Art of Detection Jay Dimartino
14:00 - 14:30 Bestsellers in the Underground Economy: Measuring . . . Winnona DeSombre
14:30 - 14:59 Hunting Certificates and Servers Sam Erb
15:00 - 15:59 Old Tech vs New Adversaries. Round 1... Fight! Joseph Muniz and Aamir La . . .
16:00 - 16:59 Patching: It's Complicated Cheryl Biswas
17:00 - 17:59 Your Phone is Using Tor and Leaking Your PII Milind Bhargava and Adam . . .
18:00 - 18:59 Beyond Sandboxes. How to Execute IoT Malware and A . . . María José Erquiaga, Se . . .
Saturday
10:00 - 10:59 Hacking Corporate Org Socialization: One Day You A . . . D9
11:00 - 11:59 Solving Crimes with Wireless GeoFencing and Multi- . . . Gleb Esman
12:00 - 12:59 "First-Try" DNS Cache Poisoning with IPv4 and IPv6 . . . Travis Palmer and Brian S . . .
13:00 - 13:59 Phishing Freakonomics Russell Butturini
14:30 - 14:59 Security to Make the CFO Happy Adam
15:00 - 15:30 Generating Personalized Wordlists With NLP by Anal . . . Utku Sen
15:30 - 15:59 Sandbox Creative Usage For Fun and Pro...Blems Cesare Pizzi
16:00 - 16:59 (Re)Thinking Security Given the Spectre of a Meltd . . . Jeff Man
17:00 - 17:59 State Sponsored Hacking: How to Intercept/Decrypt . . . Chris Hanlon
18:00 - 18:59 Leveraging Passive Network Mapping with Raspberry . . . Chet Hosmer
19:00 - 19:59 The Cyberlous Mrs. Maisel: A Comedic (and slightly . . . Jessica "Zhanna" Malekos . . .
Sunday
10:00 - 10:59 Wi-Fi Threat Modeling and Monitoring Besim Altinok and Can Kur . . .
11:00 - 11:59 Head in the Clouds Matt Nash
12:00 - 12:59 CIRCO: [Cisco Implant Raspberry Controlled Operati . . . Emilio Couto
13:00 - 13:59 Augmenting the (Security) Onion: Facilitating Enha . . . Wes Lambert

Return to Index


Packet Hacking Village Workshops
Friday: 10:00 - 18:00, Saturday: 09:00 - 18:00, Sunday: 10:00 - 14:30
Location: Ballys, Skyview 5-6, 1-2 (Resort (Indigo) Tower, 26th Floor)

Times Title speaker
Friday
09:00 - 11:59 Reverse Engineering Malware 101 Amanda Rousseau
12:15 - 14:15 Wireshark for Incident Response & Threat Hunti . . . Michael Wylie
14:30 - 16:30 Hacking Kubernetes - Choose Your Own Adventure Sty . . . Jay Beale
16:45 - 18:45 Intel-driven Hunts for Nation-state Activity Using . . . Sean Donnelly, Peter Hay
Saturday
09:00 - 10:59 Burp Suite Workshop Sunny Wear, Nestor Torres
11:20 - 13:20 Tools? We Don’t Need No Stinkin’ Tools: Hands- . . . Jason Nickola, Wayne Mars . . .
13:40 - 15:40 Writing Wireshark Plugins for Security Analysis Nishant Sharma, Jeswin Ma . . .
16:00 - 17:59 Advanced APT Hunting with Splunk John Stoner, Ryan Kovar
Sunday
11:00 - 13:59 Threat Hunting with Suricata Josh Stroschein, Jason Wi . . .

Return to Index


Recon Village
Friday: 12:00 - 18:00, Saturday: 10:00 - 18:00, Sunday: 10:00 - 13:00
Location: Planet Hollywood, Celebrity 5 and Some Celebrity 6

Times Title speaker
Friday
10:20 - 10:59 The OSINT Space is Growing! Are we Ready? Adrian Korn
11:00 - 11:40 A URL Shortened By Any Other Name Master Chen
11:40 - 12:20 Building an OSINT and Recon Program to address Hea . . . MITCHELL PARKER
12:20 - 12:45 Social Media: The New Court of Public opinion (exp . . . Susan
13:20 - 13:50 Let’s get technical and hunt harder! BugCrowd
13:50 - 14:40 Asset Discovery: Making Sense of the Ocean of OSIN . . . Richard Gold
14:40 - 15:15 Advanced Recon with OWASP Amass Jeff Foley
15:15 - 15:40 OSINT Approach in Big-Data Seyfullah KILIÇ
15:40 - 16:30 Hack the Planet! Hackers Influencing Positive Chan . . . Robert Sell
16:30 - 16:59 Generating Personalized Wordlists by Analyzing Tar . . . Utku Sen
Saturday
10:00 - 10:50 Hack to Basics – Adapting Exploit Frameworks to . . . Anthony “C01И” Rose . . .
10:50 - 11:30 DECEPTICON: OPSEC to Slow the OSINT Joe Gray
11:30 - 11:55 Finding the needle in the twitter haystack. Wicked Clown
11:55 - 12:30 Use Responsibly: Recon Like an insider threat for . . . Kala Kinyon
12:30 - 13:05 “Can you add a conference line, please?” - Usi . . . Alina Dorina
13:05 - 15:10 Manhunting 101 - OSINT Crash Course vs Human Targe . . . Jason Edison
15:10 - 15:50 Derevolutionizing OS Fingerprinting: the cat and m . . . Jaime Sanchez
15:50 - 16:15 From email address to phone number Martin Vigo
16:15 - 16:59 PIE - A hardware based Prebellico Intelligence Exf . . . William Suthers
Sunday
10:00 - 10:25 Using OSINT for Competitive Intelligence Chris Kirsch
10:25 - 10:59 Mining for Gold: A Framework for Accessing Pastebi . . . Mike Landeck
11:00 - 11:25 AttackSurfaceMapper: Automate and Simplify the OSI . . . Andreas Georgiou and Jaco . . .
11:25 - 11:59 Prize Distribution / Closing Note

Return to Index


Rogue's Village
Friday: 13:00-19:00, Saturday: 13:00-19:00, Sunday: -
Location: Flamingo, Carson City II

Times Title speaker
Friday
14:00 - 14:59 Modern Rogue Brian Brushwood
16:00 - 16:59 Pickpocketing James Harrison
17:00 - 17:59 Pickpocketing Workshop James Harrison
Saturday
14:00 - 14:59 A Life of Advantage Play R.X. Gambler
16:00 - 16:59 Verbal Steganography Four Suites Co.
17:00 - 17:59 Verbal Steganography Workshop Four Suites Co.
Sunday
13:00 - 13:59 Lockpicking "Extras" Jared Dygert

Return to Index


Red Team Offense Village
Friday: 09:00 - 19:00, Saturday: 09:00 - 19:00, Sunday: 09:00 - 13:00
Location: Flamingo, Laughlin I and II

Times Title speaker
Friday
09:00 - 09:59 Kube-Red C2 Operations on Kubernetes Larry Suto
10:30 - 11:30 Puny Charge your Phishing Campaigns Michael Wylie
13:00 - 13:59 Bypassing MacOS Detections with Swift Cedric Owens
14:30 - 15:30 (Ab)using GPOs for Active Directory Pwnage Petros Koutroumpis&De . . .
16:00 - 16:59 Injections Without Borders: An anatomy of Serverle . . . Tal Melamed
17:30 - 18:30 Introduction and Application of Covert Channels Aaron Grattafiori
Saturday
09:00 - 09:59 SiestaTime, A Red Team Automation Tool for Generat . . . Alvaro Folgado
10:30 - 11:30 Breaking NBAD and UEBA Detection  Charles Herring
13:00 - 13:59 BadSalt (Adversarial DevOps)  Casey Erdmann
14:30 - 15:30 Red Team Framework (RTF)   Joe Gray
16:00 - 16:59 Through the Looking Glass: Own the Data Center&nbs . . . Chris McCoy
17:30 - 18:30 Casting with the Pros: Tips and Tricks for Effecti . . . Nathan Sweaney
Sunday
09:00 - 09:59 State of Red Team Services Roundtable Wesley McGrew
10:30 - 11:30 Your Adversary Within Adam Mashinchi
12:00 - 12:59 WebSploit 2.0 Release and an Intense Introduction . . . Omar Santos

Return to Index


Social Engineering Village
Thursday: 10:00 - 19:20, Friday: 10:00 - 19:20, Saturday: 10:00 - 19:20, Sunday: 10:00 - 13:00
Location: Bally's, Jubilee Tower - Las Vegas BR - 3rd Floor

Times Title speaker
Thursday
15:30 - 16:20 Sizing People Up Robin Dreeke
16:30 - 16:59 Leveraging the Insider Threat, oh, and how to be A . . . Marcus Liotta
17:05 - 17:35 Rideshare OSINT - Car Based SE For Fun & Profit Edward Miro
17:40 - 18:09 The Basics of Social Engineering aKa How I break i . . . Chris Pritchard
18:15 - 18:45 Hacking Hollywood Andrew Nicholson
18:50 - 19:20 TBD
Friday
15:30 - 16:20 SEVillage - 10 Year Anniversary - a Look Back at w . . . Chris Hadnagy
16:30 - 16:59 Why vigilantism doesn't work Shane McCombs
17:05 - 17:35 OSINT in the Real World Ryan MacDougall
17:40 - 18:09 Swing Away: How to Conquer Impostor Syndrome Billy Boatright
18:15 - 18:45 Red Teaming Insights and Examples from Beyond the . . . Micah Zenko
18:50 - 19:20 TBD
Saturday
15:30 - 16:20 I PWN thee, I PWN thee not! Jayson Street
16:30 - 16:59 Getting Psychic: Cold Reading Techniques for Fortu . . . Chris Kirsch
17:05 - 17:35 Hacking Your Career Through Social Engineering Rebecca Long
17:40 - 18:09 Executives Seeing Red Wayne Ronaldson
18:15 - 18:45 The Voice Told Me To Do It Daniel Isler
18:50 - 19:20 The Aspie's Guide to Social Engineering Your Way T . . . Perry Carpenter

Return to Index


SkyTalks 303
Thursday: 18:30 - end of a party?, Friday: 09:00 - 19:00, Saturday: 09:00 - 19:00, Sunday: 09:00 - 14:00
Location: Bally's, Jubilee Tower - Jubilee BR - 2nd Floor

Times Title speaker
Saturday
09:00 - 09:59 How to detect and take down a drone f(x)
10:00 - 10:59 The Cyberlous Mrs. Maisel: A Comedic (and slightly . . . Zhanna Malekos Smith
11:00 - 11:59 The Art of Defeating Facial Recognition Vic Harkness
12:00 - 12:59 Safe (op)SEC: Using Protection While Dating Online Steve Pordon
13:00 - 13:59 Forums and Fuckery - Mainframe Style Soldier of FORTRAN, Bigen . . .
14:00 - 14:59 Two Talk Block: "88 Pints: The Story of an Ic . . . noodle, Oryx
15:00 - 15:59 Two Talk Block: "Securing Enterprise Systems: . . . 3ncr1pt3d, Audie
16:00 - 16:59 Healthcare Horror Stories tyercel
17:00 - 17:59 LET'S TALK ABOUT WAF (BYPASS) BABY Security Panda
18:00 - 18:59 Sex & Drugs Go Great Together: Hashtags and Ha . . . Maggie Mayhem
Sunday
09:00 - 09:59 Cyber Ninjas and YOU Dr. Russ Handorf, Kurt Op . . .
10:00 - 10:59 Hacking LE Systems: A Hacker Cop Makes a Case for . . . karver
11:00 - 11:59 How to hack like a journalist Nodyah (@nodyah_)
12:00 - 12:59 Broken Arrow Anon.
13:00 - 13:59 Lotta Years Pyr0, Liz Borden

Return to Index


Voting Machine Hacking Village
Friday: 10:00 - 18:00, Saturday: 10:00 - 18:00, Sunday: 10:00 - 14:00
Location: Planet Hollywood, Wilshire Ballroom A-B

Times Title speaker
Friday
10:00 - 10:45 Welcome and Kick-off Harri Hursti, Matt Blaze, . . .
10:45 - 10:59 Remarks by CISA Director Chris Krebs Christopher Krebs
11:00 - 11:30 DARPA SSITH Program at DEF CON Linton Salmon
11:30 - 12:30 What Role Can Journalists Play in Securing Electio . . . Kevin Collier, Kim Zetter . . .
12:30 - 12:59 While the Bots Distracted You: Hacking the Elector . . . Evanna Hu, Ben Dubow
13:00 - 13:30 Trustworthy Elections: Evidence and Dispute Resolu . . . Philip Stark
13:30 - 13:59 Keynote Remarks: Senator Ron Wyden (OR) Senator Ron Wyden (OR)P
14:00 - 14:30 If the Voting Machines are Insecure, Lets Just Vo . . . Marian Schneider
14:30 - 15:30 State and Local Preparations on Election Security . . . Secretary Alex Padilla, N . . .
15:30 - 15:59 2020 - Ready? Or Not? Sherri Ramsay
16:00 - 16:30 Beyond the Voting Machine: Other High Value Target . . . Brian Varner
16:30 - 16:59 Putting Voters First: Expanding Options to Vote Amber McReynolds
17:00 - 17:30 Thirty Years Behind the Ballot Box: A firsthand lo . . . Ion Sancho
17:30 - 17:59 UnclearBallot: Automated Ballot Image Manipulation Kartikeya Kandula, Jeremy . . .
Saturday
10:00 - 11:59 Unhack the Ballot
12:00 - 12:30 Organizational Cybernetics: A Key to Resilience fo . . . Kimberly Young-McLear
12:30 - 12:59 Ideas Whose Time Has Come: CVD, SBOM, and SOTA Katie Trimble, Art Manion
13:00 - 13:30 Incident Lifecycle and Incident Response Managemen . . . Rahul K. Patel, Tonya Ric . . .
13:30 - 13:59 Assessing Election Infrastructure Jason Hill, Genevieve Mar . . .
14:00 - 15:30 Securing America: How DHS, States, and Cybersecuri . . . Alissa Starzak, Jay Kapla . . .
15:30 - 15:59 Bootstrapping Vulnerability Disclosure for Electio . . . Jack Cable, Katie Trimble . . .
16:00 - 16:30 The Election System: Can We Fix It? YES WE CAN! . . . Bianca Lewis
16:30 - 16:59 Securing Voting Systems (Beyond Paper Ballots!) Tod Beardsley
17:00 - 17:30 Machine Voting: The Bulgarian Experience Alex Stanev
17:30 - 17:59 Addressing the election security threats posed by . . . John Odum
18:00 - 18:59 Devil Went Down to Georgia. Did He Steal Souls? (G . . . Marilyn Marks, Rich DeMil . . .
Sunday
10:00 - 10:30 Exploring Voter Roll Manipulation and Fraud Detect . . . Nakul Bajaj
10:30 - 10:59 Defending Democracy: Working with Election Officia . . . Liz Howard, Justin Burns_ . . .
11:30 - 11:59 Securing Your Election Infrastructure: Plan and Pr . . . Robert Anderson
12:00 - 13:00 Keynote Remarks: Representative Eric Swalwell (CA- . . . Representative Eric Swalw . . .

Return to Index


Wireless Village
Thursday: 12:00-17:00, Friday: 10:00 - 19:00, Saturday: 10:00 - 19:00, Sunday: 10:00 - 13:00
Location: Ballys, Palace Meeting Rooms 1-7

Times Title speaker
Friday
10:30 - 11:25 News from Proxmark land Iceman
11:30 - 12:25 Developing WiFi Access Point Rootkits Nishant Sharma
12:30 - 12:55 Are you inteRESTed in Kismet? Ted
13:00 - 13:55 Optimizing Antennas, Filters, and Amps for your SD . . . Alex Zakharov and Kent Br . . .
14:00 - 15:55 Wi-Fi 6 Tech deep dive Eric Johnson
16:00 - 16:55 Introducing new Hak5 gear! The Signal Owl, Screen . . . Hak5 Crew
17:00 - 17:55 Gear Talk Part 1 WiFi and Bluetooth
18:00 - 18:55 Gear Talk Part 2 Everything but WiFi and Bluetooth
Saturday
11:00 - 12:25 Hacking Wifi Guillermo Pilleux
12:30 - 12:55 Love is in the Air Andrés Blanco
13:00 - 13:55 War Never Changes: Attacks Against WPA3's "Enhance . . . s0lst1c3 and wytshadow
14:00 - 14:25 edu-driving Besim ALTINOK and Legenda . . .
14:30 - 14:55 Reversing a wireless model railroad control system Eric Reuter
15:00 - 15:55 nzyme - a new WiFi Defense System Lennart Koopmann
16:00 - 16:55 Ghosting the PACS-man: Basics of Hacking Physical . . . Babak Javadi
17:00 - 17:55 The Ford Hack (Raptor Captor) Woody
18:00 - 18:55 Hunting Mobile Rogue Access Points with Wireless M . . . m1n1 and t0ddpar0dy

Return to Index


Workshops
Thursday: 10:00-18:30, Friday: 10:00 - 18:30, Saturday: 10:00 - 18:30
Location: Flamingo Lower Level - Valley of Fire, Lake Mead, and Red Rock Rooms

Times Title speaker
Thursday
10:00 - 13:59 From EK to DEK: Analyzing Document Exploit Kits Josh Reynolds
10:00 - 13:59 Hacking Medical Devices Jay Radcliffe, Fotios Cha . . .
10:00 - 13:59 Hacking Wi-Fi for Beginners Alex Hammer, Penelope 'Pi . . .
10:00 - 13:59 Learning to Hack Bluetooth Low Energy with BLE CTF Ryan Holeman
10:00 - 13:59 Pwning Serverless Applications Abhay Bhargav, Nithin Joi . . .
10:00 - 13:59 Constructing Kerberos Attacks with Delegation Prim . . . Elad Shamir, Matt Bush
10:00 - 13:59 Introduction to Cryptographic Attacks Matt Cheung
14:30 - 18:30 An Introduction to Deploying Red Team Infrastructu . . . Troy Defty, Erik Dul
14:30 - 18:30 Advanced Wireless Exploitation for Red Team and Bl . . . Besim Altinok, Bahtiyar B . . .
14:30 - 18:30 Purple Team CTF Sam Bowne, Elizabeth Bidd . . .
14:30 - 18:30 Analysis 101 for Hackers and Incident Responders Kristy Westphal
14:30 - 18:30 Hacking the Android APK Ben Hughes, Liana Parakes . . .
14:30 - 18:30 Advanced Wireless Attacks Against Enterprise Netwo . . . Gabriel "solstice" Ryan
14:30 - 18:30 Hacking Wifi Philippe Delteil, Victor . . .
Friday
10:00 - 13:59 Evil Mainframe Jr: Mainframe hacking from recon to . . . Soldier of Fortran, Big E . . .
10:00 - 13:59 Malware Triage - Analyzing The Modern Malware Deli . . . Sergei Frankoff, Sean Wil . . .
10:00 - 13:59 Understanding and Analyzing Weaponized Carrier Fil . . . Ryan Chapman
10:00 - 13:59 Finding Vulnerabilities at Ecosystem-Scale Isaac Evans
10:00 - 13:59 Hacking ICS: From Open Source Tools to Custom Scri . . . Valerie Thomas, Harry Reg . . .
10:00 - 13:59 Hands on Adversarial Machine Learning Yacin Nadji
10:00 - 13:59 Exploit Development for Beginners Sam Bowne, Elizabeth Bidd . . .
14:30 - 18:30 Attacking Layer 2 Network Protocols Erik Dul, Troy Defty
14:30 - 18:30 Reverse Engineering Android Apps Sam Bowne, Elizabeth Bidd . . .
14:30 - 18:30 Introduction to Sandbox Evasion and AMSI Bypasses Anthony Rose, Jacob "Hubb . . .
14:30 - 18:30 Introduction to Reverse Engineering With Ghidra Wesley McGrew, Tyler Holl . . .
14:30 - 18:30 Advanced Custom Network Protocol Fuzzing Joshua Pereyda, Carl Pear . . .
14:30 - 18:30 Defending environments and hunting malware with os . . . Guillaume Ross
Saturday
10:00 - 13:59 Mind the Gap Between Attacking Windows and Mac: Br . . . Richard Gold
10:00 - 13:59 Writing custom backdoor payloads using C# Mauricio Velazco, Olindo . . .
10:00 - 13:59 Red Teaming Techniques for Electronic Physical Sec . . . Valerie Thomas, Terry Gol . . .
10:00 - 13:59 Functional Programming for the Blue Team eigentourist
14:30 - 18:30 scapy_dojo_v_1 Hugo Trovao, Rushikesh D. . . .
14:30 - 18:30 Modern Debugging^HWarfare with WinDbg Preview Chris Alladoum, Axel Souc . . .
14:30 - 18:30 Hack to Basics - x86 Windows Based Buffer Overflow . . . Dino Covotsos
14:30 - 18:30 Pentesting ICS 102 Alexandrine Torrents, Arn . . .

Return to Index