| PDT Times | Title | speaker | 
|  |  |  | 
| Friday |  |  | 
| 09:00 - 09:05 | AppSec Village Welcome and Introductions |  | 
| 09:05 - 09:59 | Colorful AppSec | Luis Gomes,Erez Yalon,Ped . . . | 
| 10:00 - 10:45 | Summer of Fuzz: MacOS | Jeremy Brown | 
| 11:00 - 11:45 | Vulnerability Inheritance - Attacking companies an . . . | Gal Nagli | 
| 11:00 - 10:59 | AppSec Village Capture the Flag Starts |  | 
| 12:00 - 12:45 | Cross-document messaging technology, how to hack i . . . | Chen Gour-Arie | 
| 13:00 - 13:45 | Signed, Sealed, Delivered: Abusing Trust in Softwa . . . | Cheryl Biswas | 
| 14:00 - 14:30 | Poking bots for fun and profit in the age of async . . . | Emanuel Rodrigues | 
| 15:00 - 15:45 | Scaling static analysis for free: add additional c . . . | Erin Browning,Tim Faraci . . . | 
| 16:00 - 16:59 | DFDs Ain't That Bad | Izar Tarandach,Matthew Co . . . | 
| 17:30 - 17:35 | AppSec Quiz Time! | Eden Stroet | 
|  |  |  | 
| Saturday |  |  | 
| 09:00 - 09:05 | AppSec Village Welcome and Introductions |  | 
| 09:05 - 09:59 | Borrow a mentor |  | 
| 09:05 - 09:59 | Scaling AppSec through Education | Grant Ongers (rewtd) | 
| 10:00 - 10:45 | I used AppSec skills to hack IoT, and so can you | Alexei Kojenov | 
| 11:00 - 11:45 | The Curious case of knowing the unknown | Vandana Verma Sehgal | 
| 12:00 - 12:45 | CSP is broken, let’s fix it | Amir Shaked | 
| 12:00 - 14:30 | (Workshop) - Integrating DAST tools into developer . . . | Joe Schottman | 
| 13:00 - 13:45 | When nothing goes right, push left. Designing logs . . . | Vee | 
| 14:00 - 14:45 | How I broke into Mexico City's justice system appl . . . | Alfonso Ruiz Cruz | 
| 15:00 - 15:45 | A Deep Dive Into Supply Chain Vulnerabilities: And . . . | Adam Schaal | 
| 16:00 - 16:45 | DevSecOps: Merging Security and Software Engineeri . . . | Magno Logan DELETE ME | 
| 17:00 - 17:45 | Can’t Stop the Code: Embrace the Code | Alton Crossley | 
| 17:45 - 17:50 | AppSec Quiz Time! | Eden Stroet | 
|  |  |  | 
| Sunday |  |  | 
| 09:00 - 09:05 | AppSec Village Welcome and Introductions |  | 
| 09:05 - 09:45 | "The Poisoned Diary": Supply Chain Attacks on Inst . . . | Yakov Shafranovich | 
| 09:05 - 09:45 | Borrow a mentor |  | 
| 10:00 - 10:45 | Encryption for Developers | James McKee (punkcoder) | 
| 11:00 - 11:45 | AppSec 101: A Journey from Engineer to Hacker | Arjun Gopalakrishna | 
| 12:00 - 12:45 | Car Hacking + Bug Hunting Field Guide for Appsec H . . . | Jay Turla DELETE ME | 
| 13:00 - 12:59 | AppSec Village Capture the Flag Ends |  | 
| 13:00 - 13:45 | 0-Days & Nat 20's - CVSSv3 Through the Lens of Dun . . . | Alex "RedWedgeX" Hoffman | 
| 14:00 - 14:45 | Attacking Modern Environments Series: Attack Vecto . . . | Mazin Ahmed | 
| 15:00 - 15:15 | AppSec Quiz Time! | Eden Stroet | 
| PDT Times | Title | speaker | 
|  |  |  | 
| Friday |  |  | 
| 12:00 - 12:15 | Adversary Village Kick-off | Abhijith B R | 
| 12:15 - 12:59 | Adversary Village Keynote | David Kennedy | 
| 13:00 - 13:45 | Look at me, I'm the Adversary now: Introduction to . . . | Samuel Kimmons | 
| 13:45 - 14:45 | From On-Prem to the Cloud - Hybrid AD attack path | Sergey Chubarov | 
| 14:45 - 15:45 | Exploiting Blue Team OPSEC failures with RedELK | Marc Smeets | 
| 15:45 - 16:45 | Everything is a C2 if you're brave enough | Luis Ángel Ramírez Mend . . . | 
| 16:45 - 17:45 | Designing a C2 Framework | Daniel "Rasta" Duggan | 
| 17:45 - 19:59 | (Workshop) Tradecraft Development in Adversary Sim . . . | Fatih Ozavci | 
| 20:00 - 20:59 | Panel discussion: Adversary simulation, emulation  . . . | Tomer Bar,Samuel Kimmons, . . . | 
|  |  |  | 
| Saturday |  |  | 
| 10:00 - 10:59 | The Way of The Adversary | Phillip Wylie | 
| 11:00 - 13:15 | (Workshop) From zero to hero: creating a reflectiv . . . | Jean Francois Maes | 
| 13:15 - 13:59 | (Tool Demo) Red Team Credentials Reconnaissance (O . . . | Shantanu Khandelwal | 
| 14:00 - 14:59 | Operation Bypass: Catch My Payload If You Can | Matthew Eidelberg | 
| 15:00 - 15:45 | (Tool Demo) PurpleSharp: Automated Adversary Simul . . . | Mauricio Velazco | 
| 15:45 - 16:30 | Phish Like An APT | Sanne Maasakkers | 
| 16:30 - 17:15 | (Tool Demo) Tenacity: An Adversary Emulation Tool  . . . | Atul Nair,Harshal Tupsamu . . . | 
| 17:15 - 18:15 | C2Centipede: APT level C2 communications for commo . . . | Jose Garduno | 
| 18:15 - 18:45 | Lightning talk: Autonomous lateral movement | Stephan Wampouille | 
| 18:45 - 19:45 | Game Theory: Understanding and Strategy and Decept . . . | Juneau Jones | 
| 19:45 - 20:30 | (Tool Demo) New generation of PEAS | Carlos Polop | 
| 20:30 - 21:30 | Panel discussion: Is Adversary Emulation Too ___ F . . . | Jamie Williams,Cat Self,T . . . | 
|  |  |  | 
| Sunday |  |  | 
| 10:00 - 10:59 | Panel discussion: Resilient cyber space: The role  . . . | Abhijith B R,Jay Turla,Ma . . . | 
| 11:00 - 11:45 | (Tool Demo) Prelude Operator | David Hunt,Alex Manners | 
| 11:45 - 12:30 | APT: A Short History and An Example Attack | Mark Loveless | 
| 12:30 - 13:15 | (Tool Demo) ImproHound - Identify AD tiering viola . . . | Jonas Bülow Knudsen | 
| 13:15 - 14:15 | Scaling Up Offensive Pipelines | Gil Biton | 
| 14:15 - 15:15 | Signed, Sealed, Delivered: Comparing Chinese APTs  . . . | Cheryl Biswas | 
| 15:15 - 15:59 | How I got COVID in a RedTeam: Social engineering a . . . | Daniel Isler | 
| 16:00 - 16:59 | Adversary Village Closing Ceremony | Adversary Village Team | 
| PDT Times | Title | speaker | 
|  |  |  | 
| Thursday |  |  | 
| 17:00 - 16:59 | COSTA (Coinbase Secure Trait Analyzer) | Peter Kacherginsky | 
| 17:00 - 16:59 | DeFi Must Change or Hacks Will Accelerate | Kadan Stadelmann | 
| 21:00 - 20:59 | Flash Loans Demystified | Anto Joseph | 
| 21:00 - 20:59 | Blockchain as a Threat Modeling Thinking Tool | Shinchul Park, Graduate S . . . | 
| 21:00 - 20:59 | Subtle and Not So Subtle Ways to Lose Your Cryptoc . . . | Josh McIntyre | 
| 21:00 - 20:59 | Will Secure Element Really Help Strengthen the Sec . . . | Byeongcheol Yoo | 
| 21:00 - 20:59 | Scaling Blockchains: A Novel Approach | Colin Cantrell | 
| 21:00 - 20:59 | Towards Understanding the Unlimited Approval in Et . . . | Dabao Wang | 
| 21:00 - 20:59 | Preventing Sandwich Attacks on DeFi Protocols usin . . . | Gokul Alex | 
|  |  |  | 
| Friday |  |  | 
| 10:00 - 10:15 | Welcome Note |  | 
| 10:15 - 11:30 | Key Note |  | 
| 11:30 - 11:59 | BCOS Village Contest Overview | Reddcoin | 
| 12:00 - 12:30 | Polyswarm Talk | Kevin Leffew | 
| 13:00 - 13:59 | Catching (and Fixing) an Unlimited Burn Vulnerabil . . . | Nadir Akhtar | 
| 14:30 - 15:59 | Workshop - Decentralized Cloud |  | 
| 14:00 - 14:30 | Blockchain Security Tools | Mila Paul | 
| 16:00 - 16:30 | Surviving 51% Attacks on Blockchains | Yaz Khoury | 
| 16:30 - 17:30 | Do You Really Own Your NFTs? | Francesco Piccoli,Steven  . . . | 
|  |  |  | 
| Saturday |  |  | 
| 10:00 - 10:15 | Welcome Note | Nathan,Ron Stoner | 
| 10:15 - 11:30 | Key Note – The Three Amigos: Money Laundering, C . . . | Daniel Garrie,David Cass | 
| 11:30 - 11:59 | Tryptich Talk | Sarang Noether, Ph.D. | 
| 12:00 - 12:59 | Ethereum Hacks & How to Stop Them | Michael Lewellen | 
| 13:00 - 13:30 | Certified Ethereum Professional (CEP) Overview | Abstrct | 
| 13:30 - 13:59 | Sla(sh*t)ing happens when you stake | Nadir Akhtar,Y L | 
| 14:00 - 14:59 | EIP-1559 Panel |  | 
| 15:00 - 15:59 | Evils in the DeFi world | Minzhi He,Peiyu Wang | 
| 16:00 - 16:30 | The Wild West of DeFi Exploits | Anna Szeto | 
|  |  |  | 
| Sunday |  |  | 
| 10:15 - 11:30 | Surviving DeFi: How to Prevent Economic Attacks | Jan Gorzny | 
| 10:00 - 10:15 | Welcome Note | Nathan,Ron Stoner | 
| 11:30 - 12:30 | Breaking Future Crypto Custody | Mehow Powers,Chris Odom | 
| PDT Times | Title | speaker | 
|  |  |  | 
| Thursday |  |  | 
| 07:00 - 06:59 | Table Top Exercise - Deus Ex Machina (Pre-registra . . . |  | 
| 10:00 - 13:59 | Biohacking Village CTF: Hospital Under Siege (Pre- . . . |  | 
|  |  |  | 
| Friday |  |  | 
| 10:00 - 10:45 | Biohacking Village Welcome Keynote | Nina Alli | 
| 10:00 - 17:59 | Biohacking Village CTF: Hospital Under Siege (Pre- . . . |  | 
| 11:00 - 11:45 | The Digital Physiome - How wearables can (and are) . . . | Jennifer Goldsack,Jessily . . . | 
| 12:00 - 12:59 | The Next Critical Infrastructure: Understanding th . . . | Charles Fracchia,Nathan C . . . | 
| 13:30 - 14:30 | At least ten questions for “Bad HIPPA Takes” ( . . . | Lucia Savage | 
| 13:00 - 13:30 | "Who Bears the Risk?" Why a Market Incentives Pers . . . | Matt McMahon,Shannon Lant . . . | 
| 14:30 - 14:59 | Open-Source Vaccine Developer Kits (VDKs) with RaD . . . | Alex Hoekstra | 
| 15:00 - 15:30 | Truth, Trust, and Biodefense | Eric Perakslis | 
| 15:30 - 15:59 | Healthcare Innovation With People of All Abilities | Joel Isaac,Pia Zaragoza | 
| 16:00 - 16:59 | No Aggregation Without Representation | Andrea Downing | 
| 17:00 - 17:30 | Lets Get Real About The Future State of Healthcare | Christian Dameff,Jeff 'R3 . . . | 
|  |  |  | 
| Saturday |  |  | 
| 10:00 - 10:59 | How to Not Miss The Point: Reflections on Race, He . . . | Nia Johnson | 
| 10:00 - 17:59 | CTF: Hospital Under Siege (Pre-registration requir . . . |  | 
| 11:00 - 11:59 | Chinese Military Bioweapons and Intimidation Opera . . . | RedDragon | 
| 12:30 - 13:30 | Cloud security for healthcare and life sciences | MIchelle Holko | 
| 13:30 - 13:59 | Securing the Internet of Biological Things | Thom Dixon | 
| 14:00 - 14:59 | The Real Story on Patching Medical Devices | Michael Murray | 
| 15:00 - 16:45 | OWASP & CSA IoT: Impacting Medical Security | Aaron Guzman | 
| 16:45 - 16:59 | A Cohort of Pirate Ships | Alex Pearlman | 
| 17:00 - 17:30 | The Little Things | Mixæl Laufer | 
| 17:30 - 17:59 | Playing with FHIR: hacking and securing healthcare . . . | Alissa Knight,Mitch Parke . . . | 
|  |  |  | 
| Sunday |  |  | 
| 07:00 - 06:59 | Table Top Exercise - Biologia et Machina (Pre-regi . . . |  | 
| 10:30 - 10:59 | Internet-of-Ingestible-Things Security by Design | Mariam Elgabry | 
| 10:00 - 10:30 | Cyber Defense Matrix in Healthcare | Sounil Yu | 
| 10:00 - 12:59 | CTF: Hospital Under Siege (Pre-registration requir . . . |  | 
| 11:00 - 11:59 | Fishing or Hunting | Ohad Zaidenberg | 
| 12:00 - 12:59 | Red vs Blue vs Green : The ultimate battle of opin . . . | Ken Kato,Vee Schmitt | 
| 13:30 - 13:59 | It takes a village: Why you should join the Biohac . . . | Rob Suárez | 
| 13:00 - 13:30 | The Security of Your Digital DNA, from Inception t . . . | Garrett Schumacher | 
| 14:00 - 14:30 | Biohacking Village Wrap-Up |  | 
| PDT Times | Title | speaker | 
|  |  |  | 
| Friday |  |  | 
| 09:30 - 10:30 | Yeet the leet with Osquery (Effective Threathuntin . . . | Sebastiaan Provost | 
| 09:30 - 10:59 | Attack and Detect with Prelude Operator and Securi . . . | Wes Lambert | 
| 10:45 - 11:45 | Velociraptor - Dig Deeper | Mike Cohen | 
| 10:45 - 12:15 | Windows Forensics 101 (Beginner) | Surya Teja Masanam | 
| 12:00 - 12:30 | This is what we thought would happen in 2021 | Gert-Jan Bruggink | 
| 13:30 - 13:59 | Forensicating Endpoint Artifacts in the World of C . . . | Renzon Cruz | 
| 14:15 - 15:15 | Adventures in Pro Bono Digital Forensics Work | John Bambenek | 
| 14:00 - 17:59 | MacOs Workshop - Hunt for Red Apples: Ocean Lotus  . . . | Cat Self,plug,Ben Bornhol . . . | 
| 15:30 - 16:30 | Uncovering covert network behaviors within critica . . . | Michael Raggo,Chester Hos . . . | 
| 16:45 - 17:15 | A SERVERLESS SIEM: DETECTING ALL BADDIES ON A BUDG . . . | Chen Cao | 
| 16:30 - 17:59 | Watch Out! And just skip the packer | Felipe Duarte | 
| 17:30 - 17:59 | Scope X: Hunt in the Ocean! | Meisam Eslahi | 
|  |  |  | 
| Saturday |  |  | 
| 09:00 - 09:15 | I know who has access to my cloud, do you? | Igal Flegmann | 
| 09:00 - 10:30 | Wireshark for Incident Response & Threat Hunting | Michael Wylie | 
| 10:15 - 11:15 | Use DNS to detect your domains are abused for phis . . . | Karl Lovink a.k.a. Cyb0rg . . . | 
| 11:30 - 11:59 | What Machine Learning Can and Can't Do for Securit . . . | Wendy Edwards | 
| 11:00 - 12:30 | Tricks for the Triage of Adversarial Software | Dylan Barker,Quinten Bowe . . . | 
| 11:00 - 12:30 | BTV Presents: Malware Station - Maldoc Workshop | Clay (ttheveii0x) | 
| 12:15 - 12:45 | How do you ALL THE CLOUDS? | henry | 
| 13:45 - 14:15 | Leveraging NGFWs for Threat Hunting | Drimacus | 
| 14:30 - 15:30 | Modern Authentication for the Security Admin | Bailey Bercik,Mark Morowc . . . | 
| 14:00 - 15:30 | BTV Presents: Forensics Station - Workshop 1 | Omenscan | 
| 14:00 - 17:59 | MacOs Workshop - Hunt for Red Apples: Ocean Lotus  . . . | Cat Self,plug,Ben Bornhol . . . | 
| 15:45 - 16:45 | Uncomfortable Networking | Charles Rumford | 
| 16:30 - 17:59 | Ransomware ATT&CK and Defense with the Elastic Sta . . . | Ben Hughes,Daniel Chen,Fr . . . | 
| 17:00 - 17:30 | Structured Analytical Techniques for Improving Inf . . . | Rabbit | 
|  |  |  | 
| Sunday |  |  | 
| 10:00 - 10:59 | BTV Presents: Threat Report Roulette | Blind Hacker JoeB,Will Th . . . | 
| 11:15 - 12:15 | BTV Presents: Welcome to #IRLIFE. A live IR TableT . . . | Clay (ttheveii0x),plug,Ch . . . | 
| 12:30 - 12:59 | Year of Mentoring: BTV’s Meet-a-Mentor Turns One | muteki | 
| 13:30 - 13:59 | BTV Closing Ceremony |  | 
| PDT Times | Title | speaker | 
|  |  |  | 
| Thursday |  |  | 
| 07:00 - 19:59 | DEF CON Human Registration (Badge Pickup) Open |  | 
| 09:00 - 20:59 | Chillout Lounges | djdead,DJ Pie & Darren,ka . . . | 
|  |  |  | 
| Friday |  |  | 
| 08:00 - 16:59 | DEF CON Human Registration (Badge Pickup) and Vacc . . . |  | 
| 09:00 - 20:59 | Chillout Lounges | djdead,DJ Pie & Darren,ka . . . | 
| 09:00 - 09:59 | Welcome to Discord | Dark Tangent | 
| 09:00 - 09:59 | Making the DEF CON 29 Badge | Katie Whiteley,Michael Wh . . . | 
| 10:00 - 10:59 | Welcome To DEF CON - Dark Tangent & Making the DEF . . . | Dark Tangent,Katie Whitel . . . | 
| 10:00 - 10:45 | Gone Apple Pickin': Red Teaming macOS Environments . . . | Cedric Owens | 
| 10:00 - 10:59 | HTTP/2: The Sequel is Always Worse | James Kettle | 
| 10:00 - 19:59 | DEF CON Vendor Area Open |  | 
| 10:00 - 10:59 | Community Roundtable - (De)Criminalizing Hacking A . . . |  | 
| 11:00 - 11:45 | 2021 - Our Journey Back To The Future Of Windows V . . . | Eran Segal,Tomer Bar | 
| 11:00 - 11:59 | Caught you - reveal and exploit IPC logic bugs ins . . . | Chuanda Ding,Yuebin Sun,Z . . . | 
| 11:30 - 12:30 | Community Roundtable - We can build it. We have th . . . |  | 
| 11:30 - 12:30 | Community Roundtable - Toward a Global IoT Code of . . . |  | 
| 12:00 - 12:59 | DHS REBOOTING CRITICAL INFRASTRUCTURE PROTECTION P . . . | Lily Newman,Alexander Kli . . . | 
| 12:00 - 12:20 | Your House is My House: Use of Offensive Enclaves  . . . | Dimitry "Op_Nomad" Snezhk . . . | 
| 12:00 - 12:20 | Do you like to read? I know how to take over your  . . . | Slava Makkaveev | 
| 12:30 - 12:50 | The Mechanics of Compromising Low Entropy RSA Keys | Austin Allshouse | 
| 12:30 - 12:50 | Worming through IDEs | David Dworken | 
| 13:00 - 13:59 | Ransomeware’s Big Year – from nuisance to “s . . . | DEF CON Policy Panel | 
| 13:00 - 13:45 | Sleight of ARM: Demystifying Intel Houdini | Brian Hong | 
| 13:00 - 13:59 | eBPF, I thought we were friends! | Guillaume Fournier,Sylvai . . . | 
| 13:00 - 13:59 | Policy Debrief - Myths and Legends of Section 230 |  | 
| 14:00 - 14:45 | MAVSH> Attacking from Above | Sach | 
| 14:00 - 14:45 | Hacking Humans with AI as a Service | Eugene Lim,Glenice Tan,Ta . . . | 
| 14:00 - 14:59 | Rotten code, aging standards, & pwning IPv4 parsin . . . | Kelly Kaoudis,Sick Codes | 
| 14:30 - 15:30 | Community Roundtable - Zero Trust, Critical Softwa . . . |  | 
| 14:30 - 15:30 | Policy Debrief - Global Cyber Capacity Building -  . . . |  | 
| 15:00 - 15:59 | UFOs: Misinformation, Disinformation, and the Basi . . . | Richard Thieme AKA neural . . . | 
| 15:00 - 15:45 | Abusing SAST tools! When scanners do more than jus . . . | Rotem Bar | 
| 15:00 - 15:59 | ProxyLogon is Just the Tip of the Iceberg, A New A . . . | Orange Tsai | 
| 15:30 - 16:30 | Community Roundtable - 10 years after SOPA: where  . . . |  | 
| 16:00 - 16:59 | Defending against nation-state (legal) attack: how . . . | Bill "Woody" Woodcock | 
| 16:00 - 16:45 | Bundles of Joy: Breaking macOS via Subverted Appli . . . | Patrick Wardle | 
| 16:00 - 16:59 | The Unbelievable Insecurity of the Big Data Stack: . . . | Sheila A. Berta | 
| 16:00 - 16:59 | Community Roundtable - Volunteer Hacker Fire Depar . . . |  | 
| 17:00 - 18:59 | Do No harm; Health Panel : Live version - A DEF CO . . . | DEF CON Policy Panel | 
| 17:00 - 17:45 | Phantom Attack: Evading System Call Monitoring | Junyuan Zeng,Rex Guo | 
| 17:00 - 17:59 | Warping Reality - creating and countering the next . . . | PatH | 
| 18:00 - 18:45 | Response Smuggling: Pwning HTTP/1.1 Connections | Martin Doyhenard | 
| 18:00 - 18:59 | How I use a JSON Deserialization 0day to Steal You . . . | Hao Xing,Zekai Wu | 
| 20:00 - 21:59 | DEF CON Movie Night - Tron |  | 
|  |  |  | 
| Saturday |  |  | 
| 09:00 - 16:59 | DEF CON Human Registration (Badge Pickup) and Vacc . . . |  | 
| 09:00 - 20:59 | Chillout Lounges | djdead,DJ Pie & Darren,ka . . . | 
| 10:00 - 19:59 | DEF CON Vendor Area Open |  | 
| 10:00 - 10:59 | Privacy Without Monopoly: Paternalism Works Well,  . . . | Cory Doctorow | 
| 10:00 - 10:45 | High-Stakes Updates | BIOS RCE OMG WTF BBQ | Jesse Michael,Mickey Shka . . . | 
| 10:00 - 10:45 | Crossover Episode: The Real-Life Story of the Firs . . . | Chad Rikansrud (Bigendian . . . | 
| 10:00 - 10:59 | Community Roundtable - Supply Chain in the COVID E . . . |  | 
| 10:00 - 10:59 | Community Roundtable - We need to talk about Norm  . . . |  | 
| 11:00 - 11:59 | Wibbly Wobbly, Timey Wimey – What's Really Insid . . . | Alexander Heinrich,jiska | 
| 11:00 - 11:45 | UPnProxyPot: fake the funk, become a blackhat prox . . . | Chad Seaman | 
| 11:30 - 12:30 | Community Roundtable - If only you knew |  | 
| 12:00 - 12:59 | Bring Your Own Print Driver Vulnerability | Jacob Baines | 
| 12:00 - 12:20 | Racketeer Toolkit. Prototyping Controlled Ransomwa . . . | Dimitry "Op_Nomad" Snezhk . . . | 
| 12:00 - 12:20 | Time Turner - Hacking RF Attendance Systems (To Be . . . | Vivek Nair | 
| 12:30 - 12:50 | Hack the hackers: Leaking data over SSL/TLS | Ionut Cernica | 
| 12:30 - 12:50 | A new class of DNS vulnerabilities affecting many  . . . | Ami Luttwak,Shir Tamari | 
| 13:00 - 13:59 | TEMPEST radio station | Paz Hameiri | 
| 13:00 - 13:45 | PINATA: PIN Automatic Try Attack | Salvador Mendoza | 
| 13:00 - 13:45 | Defeating Physical Intrusion Detection Alarm Wires | Bill Graydon | 
| 13:00 - 14:59 | Community Roundtable - RANSOMWARE: Combatting Rans . . . |  | 
| 14:00 - 14:59 | Sneak into buildings with KNXnet/IP | Claire Vacherot | 
| 14:00 - 14:45 | SPARROW: A Novel Covert Communication Scheme Explo . . . | Chuck McAuley,Reza Soosah . . . | 
| 14:00 - 14:45 | Over-the-air remote code execution on the DEF CON  . . . | Seth Kintigh | 
| 15:00 - 15:45 | Hacking G Suite: The Power of Dark Apps Script Mag . . . | Matthew Bryant | 
| 15:00 - 15:45 | Central bank digital currency, threats and vulnera . . . | Ian Vitek | 
| 15:00 - 15:59 | Breaking Secure Bootloaders | Christopher Wade | 
| 16:00 - 16:45 | New Phishing Attacks Exploiting OAuth Authenticati . . . | Jenko Hwong | 
| 16:00 - 16:45 | PunkSPIDER and IOStation: Making a Mess All Over t . . . | _hyp3ri0n aka Alejandro C . . . | 
| 16:00 - 16:59 | Adventures in MitM-land: Using Machine-in-the-Midd . . . | Eyal Karni,Sagi Sheinfeld . . . | 
| 16:00 - 16:59 | Community Roundtable - Thinking About Election Sec . . . |  | 
| 16:00 - 16:59 | Community Roundtable - Implementing Cyber Solarium . . . |  | 
| 17:00 - 17:45 | You're Doing IoT RNG | Allan Cecil - dwangoAC,Da . . . | 
| 17:00 - 17:45 | Hacking the Apple AirTags | Thomas Roth | 
| 17:00 - 17:59 | Don't Dare to Exploit - An Attack Surface Tour of  . . . | Steven Seeley,Yuhao Weng, . . . | 
| 18:00 - 18:59 | HACKERS INTO THE UN? Engaging in the cyber discuss . . . | DEF CON Policy Panel | 
| 18:00 - 18:45 | Offensive Golang Bonanza: Writing Golang Malware | Benjamin Kurtz | 
| 18:00 - 18:59 | Vulnerability Exchange: One Domain Account For Mor . . . | Tianze Ding | 
| 19:00 - 19:59 | (Replay) UFOs: Misinformation, Disinformation, and . . . | Richard Thieme AKA neural . . . | 
| 19:00 - 19:30 | (Replay) Racketeer Toolkit. Prototyping Controlled . . . | Dimitry "Op_Nomad" Snezhk . . . | 
| 20:00 - 21:59 | DEF CON Movie Night - Upgrade |  | 
|  |  |  | 
| Sunday |  |  | 
| 09:00 - 13:59 | DEF CON Human Registration (Badge Pickup) and Vacc . . . |  | 
| 09:00 - 20:59 | Chillout Lounges | DJ Pie & Darren,Louigi Ve . . . | 
| 10:00 - 15:59 | DEF CON Vendor Area Open |  | 
| 10:00 - 10:45 | A Discussion with Agent X | Agent X | 
| 10:00 - 10:59 | Hi! I'm DOMAIN\Steve, please let me access VLAN2 | Justin Perdok | 
| 10:00 - 10:59 | Taking Apart and Taking Over ICS & SCADA Ecosystem . . . | Mars Cheng,Selmon Yang | 
| 11:00 - 11:45 | The PACS-man Comes For Us All: We May Be Vaccinate . . . | Anze Jensterle,Babak Java . . . | 
| 11:00 - 11:45 | Glitching RISC-V chips: MTVEC corruption for harde . . . | Adam 'pi3' Zabrocki,Alex  . . . | 
| 11:00 - 11:59 | Fuzzing Linux with Xen | Tamas K Lengyel | 
| 12:00 - 12:45 | DoS: Denial of Shopping – Analyzing and Exploiti . . . | Joseph Gabay | 
| 12:00 - 12:45 | No Key? No PIN? No Combo? No Problem! P0wning ATMs . . . | Roy Davis | 
| 12:00 - 12:59 | Breaking TrustZone-M: Privilege Escalation on LPC5 . . . | Laura Abbott,Rick Altherr | 
| 13:00 - 13:45 | Extension-Land: exploits and rootkits in your brow . . . | Barak Sternberg | 
| 13:00 - 13:45 | Why does my security camera scream like a Banshee? . . . | Rion Carter | 
| 13:00 - 13:59 | Timeless Timing Attacks | Mathy Vanhoef,Tom Van Goe . . . | 
| 14:00 - 14:45 | Robots with lasers and cameras (but no security):  . . . | Dennis Giese | 
| 14:00 - 14:45 | Old MacDonald Had a Barcode, E-I-E-I CAR | Richard Henderson | 
| 14:00 - 14:20 | Instrument and Find Out: Writing Parasitic Tracers . . . | Jeff Dileo | 
| 14:30 - 14:50 | The Agricultural Data Arms Race: Exploiting a Trac . . . | Sick Codes | 
| 15:00 - 15:59 | (CANCELED) Discord Closing Ceremonies | Dark Tangent | 
| 16:00 - 16:59 | DEF CON Closing Ceremonies, Black Badge Ceremonies | Dark Tangent | 
| PDT Times | Title | speaker | 
|  |  |  | 
| Friday |  |  | 
| 07:00 - 07:59 | Tabletop Exercise - GRIMM |  | 
| 10:00 - 10:59 | Keynote - PW Singer | PW Singer | 
| 10:30 - 11:30 | Tabletop Exercise - GRIMM |  | 
| 11:30 - 12:30 | Your Infrastructure is Encrypted: Protecting Criti . . . | David Etue,Ernie Bio,Jami . . . | 
| 12:30 - 12:59 | Do We Really Want to Live in the Cyberpunk World? | Mert Can Kilic | 
| 13:00 - 13:59 | Tabletop Exercise - GRIMM |  | 
| 13:00 - 13:30 | Beetlejuice: The Lessons We Should Have Learned Fo . . . | Tim Yardley | 
| 13:30 - 13:59 | Scripts and Tools to Help Your ICS InfoSec Journey | Don C. Weber | 
| 14:00 - 14:59 | Consider the (Data) Source | Dan Gunter | 
| 15:00 - 15:30 | Approaches to Attract, Develop, and Retain an Indu . . . | John Ellis,Julia Atkinson | 
| 15:30 - 15:59 | It Takes a Village (and a generous grant): Student . . . | Alexander Vigovskiy,Chris . . . | 
|  |  |  | 
| Saturday |  |  | 
| 10:00 - 11:59 | CybatiWorks Mission Station Workshop | Matthew Luallen | 
| 12:00 - 12:59 | Fireside Chat - August Cole | August Cole | 
| 13:00 - 13:30 | Toward a Collaborative Cyber Defense and Enhanced  . . . | Lauren Zabierek | 
| 13:30 - 13:59 | Fortifying ICS - Hardening and Testing | Dieter Sarrazyn | 
| 14:00 - 14:30 | Crippling the Grid: Examination of Dependencies an . . . | Joe Slowik | 
| 14:30 - 14:59 | Leveraging SBOMs to Enhance ICS Security | Thomas Pace | 
| 15:00 - 15:30 | Smart Meters: I'm Hacking Infrastructure and So Sh . . . | Hash Salehi | 
|  |  |  | 
| Sunday |  |  | 
| 10:00 - 10:30 | Bottom-Up and Top-Down: Exploiting Vulnerabilities . . . | Sharon Brizinov,Uri Katz | 
| 10:30 - 10:59 | Detecting Attackers Using Your Own Sensors with St . . . | Stefan Stephenson-Moe | 
| 11:00 - 11:59 | Top 20 Secure PLC Coding Practices | Sarah Fluchs,Vivek Ponnad . . . | 
| 12:00 - 12:59 | ICS Cyber Threat Intelligence (CTI) Information Sh . . . | Helio Sant'ana,John Felke . . . | 
| 13:00 - 13:30 | ICS Intrusion KillChain explained with real simula . . . | Javier Perez,Juan Escobar | 
| 13:30 - 13:59 | Building an ICS Firing Range (in our kitchen): Sha . . . | Moritz Thomas,Nico Leidec . . . | 
| 14:00 - 14:59 | ICS Jeopardy | Chris Sistrunk,Maggie Mor . . . | 
| PDT Times | Title | speaker | 
|  |  |  | 
| Friday |  |  | 
| 10:00 - 13:59 | The Joy of Reverse Engineering: Learning With Ghid . . . | Wesley McGrew | 
| 10:00 - 13:59 | Inspecting Signals from Satellites to Shock Collar . . . | Eric Escobar,Trenton Ivey | 
| 10:00 - 13:59 | Analysis 101 and 102 for the Incident Responder | Kristy Westphal | 
| 10:00 - 13:59 | House of Heap Exploitation | James Dolan,Maxwell Dulin . . . | 
| 15:00 - 18:59 | Windows Internals | Sam Bowne,Elizabeth Biddl . . . | 
| 15:00 - 18:59 | Secure messaging over unsecured transports | Ash | 
| 15:00 - 18:59 | Learning to Hack Bluetooth Low Energy with BLE CTF | Ryan Holeman | 
| 15:00 - 18:59 | Writing Golang Malware | Benjamin Kurtz | 
|  |  |  | 
| Saturday |  |  | 
| 10:00 - 13:59 | From Zero to Hero in Web Security Research | Dikla Barda,Oded Vanunu,R . . . | 
| 10:00 - 13:59 | Bug bounty Hunting Workshop | David Patten,Philippe Del . . . | 
| 10:00 - 13:59 | Hacking the Metal: An Introduction to Assembly Lan . . . | eigentourist | 
| 10:00 - 13:59 | Digital Forensics and Incident Response Against th . . . | Michael Register,Michael  . . . | 
| 15:00 - 18:59 | Network Analysis with Wireshark | Sam Bowne,Elizabeth Biddl . . . | 
| 15:00 - 18:59 | Analysis 101 and 102 for the Incident Responder | Kristy Westphal | 
| 15:00 - 18:59 | Evading Detection a Beginner's Guide to Obfuscatio . . . | Anthony "Cx01N" Rose,Jake . . . | 
| 15:00 - 18:59 | Advanced Wireless Attacks Against Enterprise Netwo . . . | Solstice | 
|  |  |  | 
| Sunday |  |  | 
| 10:00 - 13:59 | Windows Internals | Sam Bowne,Elizabeth Biddl . . . | 
| 10:00 - 13:59 | From Zero to Hero in Web Security Research | Dikla Barda,Oded Vanunu,R . . . | 
| 10:00 - 13:59 | Modern Malware Analysis for Threat Hunters | Aaron Rosenmund,Ryan Chap . . . | 
| 10:00 - 13:59 | Hacking the Metal: An Introduction to Assembly Lan . . . | eigentourist |