I want these * bugs off my * Internet
|
Dan Kaminsky
,
White Ops
|
I Hunt Penetration Testers: More Weaknesses in Tools and Procedures
|
Wesley McGrew
,
Mississippi State University
|
Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web
|
Peter Eckersley
,
James Kasten
,
Yan Zhu
,
Electronic Frontier Foundation
|
Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey
|
LosT
|
Sorry, Wrong Number: Mysteries Of The Phone System - Past and Present
|
"Unregistered436" Patrick McNeil
,
"Snide" Owen
|
Exploring Layer 2 Network Security in Virtualized Environments
|
Ronny L. Bull
,
Jeanna N. Matthews
,
Clarkson University
|
Alice and Bob are Really Confused
|
David Huerta
|
Put on your tinfo_t hat if you're my type
|
miaubiz
,
Azimuth Security
|
Canary: Keeping Your Dick Pics Safe(r)
|
Rob Bathurst (evilrob)
,
Jeff Thomas (xaphan)
|
I Will Kill You
|
Chris Rock
,
Kustodian Pty Ltd
|
Shall We Play a Game?
|
Tamas Szakaly
,
PR-Audit Ltd., Hungary
|
USB Attack to Decrypt Wi-Fi Communications
|
Jeremy Dorrough
,
Genworth Financial
|
Fighting Back in the War on General Purpose Computers
|
Cory Doctorow
,
Electronic Frontier Foundation
|
Remote Access, the APT
|
Ian Latter
,
Midnight Code
|
Knocking my neighbor’s kid’s cruddy drone offline
|
Michael Robinson
,
Stevenson University
|
Harness: Powershell Weaponization Made Easy (or at least easier)
|
Rich Kelley
,
Gray Tier Technologies
|
High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC
|
Joshua Smith
,
Zero Day Initiative, HP Security Research
|
One Device to Pwn Them All
|
Dr. Phil Polstra
,
Bloomsburg University
|
Do Export Controls on “Intrusion Software” Threaten Vulnerability Research?
|
Tom Cross aka Decius
,
Collin Anderson
,
Drawbridge Networks
|
HamSammich – long distance proxying over radio
|
Robert Graham
,
David Maynor
,
Erratasec.com
|
Cracking Cryptocurrency Brainwallets
|
Ryan Castellucci
,
White Ops
|
Drive It Like You Hacked It: New Attacks and Tools to Wirelessly Steal Cars
|
Samy Kamkar
|
From 0 To Secure In 1 Minute — Securing IAAS
|
Nir Valtman
,
Moshe Ferber
,
NCR Retail
,
Cloud Security Alliance Israel
|
Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simplex Data Service
|
Colby Moore
,
Synack
|
Hacking Electric Skateboards: Vehicle Research For Mortals
|
Mike Ryan
,
Richo Healey
,
Red Team, eBay
,
Stripe
|
Advances in Linux Process Forensics Using ECFS
|
Ryan O'Neill
,
Leviathan Security Group
|
Forensic Artifacts From a Pass the Hash Attack
|
Gerard Laygui
|
Fun with Symboliks
|
atlas
,
Grimm
|
Red vs. Blue: Modern Active Directory Attacks & Defense
|
Sean Metcalf
,
DAn Solutions, Inc.
|
Ask the EFF: The Year in Digital Civil Liberties
|
Kurt Opsahl
,
Nate Cardozo
,
Mark Jaycox
,
Corynne McSherry
,
Nadia Kayyali
,
Peter Eckersley
,
Electronic Frontier Foundation
,
EFF
,
EFF Technology
|
Hacking SQL Injection for Remote Code Execution on a LAMP stack
|
Nemus
|
"Quantum" Classification of Malware
|
John Seymour
,
University of Maryland
|
Hooked Browser Meshed-Networks with WebRTC and BeEF
|
Christian (@xntrik) Frichot
,
Asterisk Information Security
|
Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0
|
Richard Thieme
,
ThiemeWorks
|
How to Shot Web: Web and mobile hacking in 2015
|
Jason Haddix
,
Bugcrowd
|
Remote Exploitation of an Unaltered Passenger Vehicle
|
Charlie Miller
,
Chris Valasek
,
Twitter
,
Vehicle Security Research at IOActive
|
How to secure the keyboard chain
|
Paul Amicelli
,
Baptiste David
,
IT Engineer School - ESIEA in Laval, France
|
Secure Messaging for Normal People
|
Justin Engler
,
iSEC Partners
|
Paranoia and ProxyHam: High-Stakes Anonymity on the Internet
|
Benjamin Caudill
,
Rhino Security Labs
|
How to hack your way out of home detention
|
AmmonRa
|
Who Will Rule the Sky? The Coming Drone Policy Wars
|
Matt Cagle
,
Eric Cheng
,
ACLU of Northern California
,
Aerial Imaging, DJI
,
DJI SF
|
Goodbye Memory Scraping Malware: Hold Out Till "Chip And Pin”
|
Weston Hecker
,
"KLJ Security”
|
Key-Logger, Video, Mouse — How To Turn Your KVM Into a Raging Key-logging Monster
|
Yaniv Balmas
,
Lior Oppenheim
,
Check Point Software Technologies
|
Abusing native Shims for Post Exploitation
|
Sean Pierce
,
iSIGHT Partners
|
REvisiting RE:DoS
|
Eric (XlogicX) Davisson
|
Hacking Web Apps
|
Brent White
,
Solutionary, Inc.
|
Breaking SSL Using Time Synchronisation Attacks
|
Jose Selvi
,
NCC Group
|
Hacker in the Wires
|
Dr. Phil Polstra
,
Bloomsburg University
|
Staying Persistent in Software Defined Networks
|
Gregory Pickett
,
Hellfire Security
|
Malware in the Gaming Micro-economy
|
Zack Allen
,
Rusty Bower
,
ZeroFOX
|
Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities
|
Aditya K Sood
,
Elastica inc.
,
Threat Research Labs, Elastica inc.
|
Backdooring Git
|
John Menerick
,
NetSuite
|
Security Necromancy: Further Adventures in Mainframe Hacking
|
Philip Young
,
Chad "Bigendian Smalls” Rikansrud
,
Mainframe Hacking
|
ThunderStrike 2: Sith Strike
|
Trammel Hudson
,
Xeno Kovah
,
Corey Kallenberg
,
Two Sigma Investments
,
LegbaCore, LLC
|
Seeing through the Fog
|
Zack Fasel
,
Urbane Security
|
Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts
|
Omer Coskun
,
KPN REDteam
|
Separating Bots from the Humans
|
Ryan Mitchell
,
LinkeDrive Inc
|
802.11 Massive Monitoring
|
Andres Blanco
,
Andres Gazzoli
,
Core Security
|
Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion
|
Marina Krotofil
,
Jason Larsen
,
European Network for Cyber Security
,
IOActive, Inc.
|
Inter-VM data exfiltration: The art of cache timing covert channel on x86 multi-core
|
Etienne Martineau
,
Cisco Systems
|
Are We Really Safe? - Bypassing Access Control Systems
|
Dennis Maldonado
,
KLC Consulting
|
Docker, Docker, Give Me The News, I Got A Bad Case Of Securing You
|
David Mortman
,
Dell Software
|
'DLL Hijacking' on OS X? #@%& Yeah!
|
Patrick Wardle
|
Build a free cellular traffic capture tool with a vxworks based femoto
|
Yuwei Zheng
,
Haoqi Shan
,
Qihoo 360 Technology Co., Ltd
|
BurpKit - Using WebKit to Own the Web
|
Nadeem Douba
,
Red Canari
|
Unbootable: Exploiting the PayLock SmartBoot Vehicle Immobilizer
|
fluxist
,
Entrepreneur
|
NSM 101 for ICS
|
Chris Sistrunk
,
FireEye, Inc.
|
I Am Packer And So Can You
|
Mike Sconzo
|
How to Hack a Tesla Model S
|
Marc Rogers
,
Kevin Mahaffey
,
CloudFlare
,
Lookout Inc
|
QARK: Android App Exploit and SCA Tool
|
Tony Trummer
,
Tushar Dalvi
,
LinkedIn
|
Scared Poopless – LTE and *your* laptop
|
Mickey Shkatov
,
Jesse Michael
,
Intel Advanced Threat Research.
|
Switches Get Stitches
|
Colin Cassidy
,
Éireann Leverett
,
Robert M. Lee
,
IOActive, Inc.
|
How to Hack Government: Technologists as Policy Makers
|
Terrell McSweeny
,
Ashkan Soltani
,
Federal Trade Commission
|
Looping Surveillance Cameras through Live Editing of Network Streams
|
Eric Van Albert
,
Zach Banks
|
F*ck the attribution, show us your .idb!
|
Morgan Marquis-Boire
,
Marion Marschalek
,
Claudio Guarnieri
,
Citizen Lab
,
Cyphort Inc
,
Cuckoo Sandbox
|
The Bieber Project: Ad Tech 101, Fake Fans and Adventures in Buying Internet Traffic
|
Mark Ryan Talabis
,
zVelo
|
Confessions of a Professional Cyber Stalker
|
Ken Westin
,
Tripwire Inc.
|
Applied Intelligence: Using Information That's Not There
|
Michael Schrenk
|
LTE Recon and Tracking with RTLSDR
|
Ian Kline
,
Wolf Den Associates
|
Chigula — a framework for Wi-Fi Intrusion Detection and Forensics
|
Vivek Ramachandran
|
Ubiquity Forensics - Your iCloud and You
|
Sarah Edwards
,
SANS Institute
|
Stagefright: Scary Code in the Heart of Android
|
Joshua J. Drake
,
Zimperium
|
Stick That In Your (root)Pipe & Smoke It
|
Patrick Wardle
,
Synack
|
Licensed to Pwn: The Weaponization and Regulation of Security Research
|
Jim Denaro
,
Dave Aitel
,
Matt Blaze
,
Nate Cardozo
,
Mara Tam
,
Catherine “Randy” Wheeler
|
Hardware and Trust Security: Explain it like I’m 5
|
Teddy Reed
,
Nick Anderson
,
Facebook
|
DEF CON Comedy Inception: How many levels deep can we go?
|
Larry Pesce
,
Chris Sistrunk
,
Will "illwill" Genovese
,
Chris Blow
,
Dan Tentler
,
Amanda Berlin
,
InGuardians
,
Mandiant
,
FireEye, Inc.
,
Rook Security
,
Carbon Dynamics
,
Hurricane Labs
|
When the Secretary of State says: “Please Stop Hacking Us…”
|
David An
|
Quantum Computers vs. Computers Security
|
Jean-Philippe Aumasson
,
Kudelski Security, Switzerland
|
I’m A Newbie Yet I Can Hack ZigBee – Take Unauthorized Control Over ZigBee Devices
|
LI Jun
,
YANG Qing
,
Qihoo 360 Technology Co., Ltd
,
Chengdu University of Information Technology , Chengdu ,China
,
Unicorn Team, Qihoo 360 Technology Co. Ltd.
|
Detecting Randomly Generated Strings; A Language Based Approach
|
Mahdi Namazifar
,
Cisco Talos Group
|
Crypto for Hackers
|
Eijah
,
Demonsaw
|
Low-cost GPS simulator – GPS spoofing by SDR
|
Lin Huang
,
Qing Yang
,
Qihoo 360 Technology Co., Ltd
,
Unicorn Team, Qihoo 360 Technology Co. Ltd.
|
Investigating the Practicality and Cost of Abusing Memory Errors with DNS
|
Luke Young
,
Hydrant Labs LLC
|
Bugged Files: Is Your Document Telling on You?
|
Daniel “unicornFurnace” Crowley
,
Damon Smith
,
NCC Group
|
NetRipper - Smart traffic sniffing for penetration testers
|
Ionut Popescu
,
KPMG Romania
|
Bruce Schneier Q&A
|
Bruce Schneier
,
Resilient Systems
|
Linux Containers: Future or Fantasy?
|
Aaron Grattafiori
,
iSEC Partners/NCC Group
|
Drinking from LETHE: New methods of exploiting and mitigating memory corruption vulnerabilities
|
Daniel Selifonov
,
Skyport Systems Inc
|
Hijacking Arbitrary .NET Application Control Flow
|
Topher Timzen
,
Intel Corporation
|
Machine vs. Machine: Inside DARPA’s Fully Automated CTF
|
Michael Walker
,
Jordan Wiens
,
DARPA/I2O
|
And That's How I Lost My Other Eye: Further Explorations In Data Destruction
|
Zoz
|
Medical Devices: Pwnage and Honeypots
|
Scott Erven
,
Mark Collao
,
Protiviti
|
Don't Whisper my Chips: Sidechannel and Glitching for Fun and Profit
|
Colin O'Flynn
,
Dalhousie University
|
NSA Playset: JTAG Implants
|
Joe FitzPatrick
,
Matt King
,
SecuringHardware.com
|
Hackers Hiring Hackers - How to Do Things Better
|
Tottenkoph
,
IrishMASMS
,
Rapid7
|
Introduction to SDR and the Wireless Village
|
DaKahuna
,
satanklawz
|
It's The Only Way To Be Sure: Obtaining and Detecting Domain Persistence
|
Grant Bugher
,
Perimeter Grid
|
When IoT attacks: hacking a Linux-powered rifle
|
Runa A. Sandvik
,
Michael Auger
|
Tell me who you are and I will tell you your lock pattern
|
Marte Løge
|
Hack the Legacy! IBM i (aka AS/400) Revealed.
|
Bart Kulach (Bartlomiej Jakub Kulach)
|
Extracting the Painful (blue)tooth
|
Matteo Beccaro
,
Matteo Collura
|
REpsych: Psychological Warfare in Reverse Engineering
|
Chris Domas
|
Guests N’ Goblins: Exposing Wi-Fi Exfiltration Risks and Mitigation techniques
|
Peter Desfigies
,
Joshua Brierton
,
Naveed Ul Islam
,
TELUS Security Solutions
,
TELUS
|
Beyond the Scan: The Value Proposition of Vulnerability Assessment
|
Damon Small
|
Insteon' False Security And Deceptive Documentation
|
Peter Shipley
,
Ryan Gooler
|
Abusing XSLT for Practical Attacks
|
Fernando Arnaboldi
,
IOActive, Inc.
|
Game of Hacks: Play, Hack & Track
|
Amit Ashbel
,
Maty Siman
,
Checkmarx
|
Chellam – a Wi-Fi IDS/Firewall for Windows
|
Vivek Ramachandran
,
SecurityTube.net
|
Angry Hacking - the next generation of binary analysis
|
Yan Shoshitaishvili
,
Fish Wang
,
UC Santa Barbara
|
WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis
|
Matt Graeber
,
Willi Ballenthin
,
Claudiu Teodorescu
,
FireEye, Inc.
|
Abusing Adobe Reader’s JavaScript APIs
|
Brian Gorenc
,
Abdul-Aziz Hariri
,
Jasiel Spelman
,
Zero Day Initiative, HP Security Research
|
Extending Fuzzing Grammars to Exploit Unexplored Code Paths in Modern Web Browsers
|
Saif El-Sherei
,
Etienne Stalmans
,
SensePost
|
Let's Talk About SOAP, Baby. Let's Talk About UPNP
|
Ricky "HeadlessZeke" Lawshae
,
HP TippingPoint
|
DEF CON 101: The Panel.
|
Mike Petruzzi (wiseacre)
,
Nikita Kronenberg
,
PushPin
,
Plug
,
Russ Rogers
|
How to Train Your RFID Hacking Tools
|
Craig Young
,
Tripwire VERT
|
DIY Nukeproofing: a new dig at "data-mining"
|
3AlarmLampscooter
|
Hacking Smart Safes: On the "Brink" of a Robbery
|
Dan “AltF4” Petro
,
Oscar Salazar
,
Bishop Fox
|
RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID
|
Francis Brown
,
Shubham Shah
,
Bishop Fox
|
Pivoting Without Rights – Introducing Pivoter
|
Geoff Walton
,
Dave Kennedy
,
TrustedSec
,
Binary Defense Systems
|
A Hacker’s Guide to Risk
|
Bruce Potter
,
The Shmoo Group
|
Working together to keep the Internet safe and secure
|
Alejandro Mayorkas
,
Homeland Security
|
Dark side of the ELF - leveraging dynamic loading to pwn noobs
|
Alessandro Di Federico
,
Yan Shoshitaishvili
,
Politecnico di Milano
,
UC Santa Barbara
|
Attacking Hypervisors Using Firmware and Hardware
|
Yuriy Bulygin
,
Mikhail Gorobets
,
Alexander Matrosov
,
Oleksandr Bazhaniuk
,
Andrew Furtak
,
Intel Advanced Threat Research.
|