This Schedule is tentative and may be changed at any time
Key:
= Demonstration
= Tool Released
= Exploit
Jump to: Thursday |
Friday |
Saturday |
Sunday
Thursday, August 1st
08:00 - 22:00
Registration in the Rotunda - $180 USD CASH ONLY - Avoid the lines and get your badge early.
Official DEF CON Store in the Rotunda until 22:00 - Get your official DEF CON swag at the DEF CON Store.
Penn & Teller
Track 1
Track 2
DC101
Panel
Until 11:50Track 3
Hacker Law School
Jim Rennie & Marcia Hofmann
Until 11:50Track 4
Thursday Speaking Schedule
10:00
Penn & Teller
Track 1
Track 2
Hacking Management From Operations to Command
Lockheed, Roamer & Naifx
Until 12:50Track 3
Pentesters Toolkit
Anch
Until 12:50Track 4
Space Camp
cont.
12:00
Penn & Teller
Track 1
Track 2
The Ninjaneers
Beaker & Flipper
Until 13:50Track 3
Oil & Gas Infosec 101
Aaron Bayles (AlxRogan)
Until 13:50Track 4
Space Camp
cont.
13:00
Penn & Teller
Track 1
Track 2
Decrypting DEF CON
1o57
Until 14:50Track 3
Meet Pentoo
ZeroChaos
Until 14:50Track 4
14:00
Penn & Teller
Track 1
Track 2
Intro to Web Application Hacking
Terrence "Tuna" Gareau
Until 15:50Track 3
Wireless Penetration Testing 101 & Wireless Contesting
DaKahuna,Rick Mellendick
Until 15:50Track 4
The Most Significant Bit
Russ & 1o57
Until 18:00
15:00
Penn & Teller
Track 1
Track 2
DEF CON Documentary Premiere
Until 20:00Track 3
DEF CON Documentary Premiere
Until 20:00Track 4
The Most Significant Bit
cont.
17:00
Penn & Teller
Track 1
Track 2
DEF CON Documentary Premiere
cont.Track 3
DEF CON Documentary Premiere
cont.Track 4
18:00
Penn & Teller
Track 1
Track 2
DEF CON Documentary Premiere
cont.Track 3
DEF CON Documentary Premiere
cont.Track 4
19:00
Friday, August 2nd
08:00 - 22:00
Registration in the Rotunda - $180 USD CASH ONLY - Avoid the lines and get your badge early.
Official DEF CON Store in the Rotunda until 22:00 - Get your official DEF CON swag at the DEF CON Store.
Vendor Area Hours: 10:00 - 19:00
Penn & Teller
Ambassador Joseph R. DeTrani:
Proliferation
Until 10:45Track 1
The DEF CON 21 Badge
1o57 & The Dark Tangent
Until 10:45Track 2
I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell
Doug Deperry & Tom Ritter
Until 10:45Track 3
Adventures in Automotive Networks and Control Units
Charlie Miller & Chris Valasek
Until 10:45Track 4
All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio
Balint Seeber
Until 11:45
Friday Speaking Schedule
10:00
Penn & Teller
Torturing Open Government Systems for Fun, Profit and Time Travel
Tom Keenan
Until 11:45Track 1
The Growing Irrelevance of US Government Cybersecurity Intelligence Information
Mark Weatherford
Until 11:45Track 2
The Secret Life of SIM Cards
Karl Koscher & Eric Butler
Until 11:45Track 3
Hacking Driverless Vehicles
Zoz
Until 11:45Track 4
All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio
cont.
11:00
Penn & Teller
Backdoors, Government Hacking and The Next Crypto Wars
Christopher Soghoian
Until 12:45Track 1
The Dirty South – Getting Justified with Technology
David Kennedy & Nick Hitchcock
Until 12:45Track 2
DragonLady: An Investigation of SMS Fraud Operations in Russia
Ryan W. Smith Tim Strazzere
Until 12:45Track 3
10000 Yen into the Sea
Flipper
Until 12:45Track 4
Making Of The DEF CON Documentary
Jason Scott Rachel Lovinger
Until 13:45
12:00
Penn & Teller
ACL Steganography - Permissions to Hide Your Porn
Michael Perklin
Until 13:45Track 1
Prowling Peer-to-Peer Botnets After Dark
Tillmann Werner
Until 13:45Track 2
Offensive Forensics: CSI for the Bad Guy
Benjamin Caudill
Until 13:20
Pwn'ing You(r) Cyber Offenders
Piotr Duszynski
Until 13:50Track 3
Business Logic Flaws In Mobile Operators Services
Bogdan Alecu
Until 13:45Track 4
Making Of The DEF CON Documentary
cont.
13:00
Penn & Teller
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Dan Griffin
Until 14:45Track 1
Evil DoS Attacks and Strong Defenses
Sam Bowne & Matthew Prince
Until 14:45Track 2
MITM All The IPv6 Things
Scott Behrens & Brent Bandelgar
Until 14:20
HTTP Time Bandit
Vaagn Toukharian & Tigran Gevorgyan
Until 14:50Track 3
Meet the VCs
Panel
Until 14:45Track 4
Ask the EFF: The Year in Digital Civil Liberties
Panel
Until 15:45
14:00
Penn & Teller
Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot
Amir Etemadieh & Panel
Until 15:45Track 1
Kill 'em All – DDoS Protection Total Annihilation!
Tony Miu & Wai-Leng Lee
Until 15:45Track 2
How to use CSP to Stop XSS
Kenneth Lee
Until 15:20
So You Think Your Domain Controller is Secure?
Justin Hendricks
Until 15:50Track 3
The ACLU Presents: NSA Surveillance and More
Panel
Until 15:45Track 4
Ask the EFF: The Year in Digital Civil Liberties
cont.
15:00
Penn & Teller
A Password is Not Enough: Why Disk Encryption is Broken and How We Might Fix It
Daniel Selifonov
Until 16:45Track 1
VoIP Wars: Return of the SIP
Fatih Ozavci
Until 17:45Track 2
Getting The Goods With smbexec
Eric Milam
Until 16:20
Abusing NoSQL Databases
Ming Chow
Until 16:50Track 3
The Government and UFOs: A Historical Analysis
Richard Thieme
Until 16:45Track 4
Decapping Chips theEasyHard Way
Adam "Major Malfunction" Laurie & Zac Franken
Until 17:45
16:00
Penn & Teller
Track 1
Unexpected Stories - From a Hacker Who Made It Inside the Government.
Peiter "Mudge" Zatko
Until 17:45Track 2
Examining the Bitsquatting Attack Surface
Jaeson Schultz
Until 17:20
PleaseInsertInject More Coins
Nicolas Oberli
Until 17:50Track 3
How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers
Michael Schrenk
Until 17:45Track 4
Decapping Chips the Easy Hard Way cont.
17:00
Penn & Teller
Track 1
Black & White BallsTrack 2
The DEF CON Documentary
until 24:00Track 3
Hacker Pyramid, Hacker JeopardyTrack 4
20:00
Saturday, August 3rd
08:00 - 22:00
Registration in the Rotunda - $180 USD CASH ONLY - Avoid the lines and get your badge early.
Official DEF CON Store in the Rotunda - Get your official DEF CON swag at the DEF CON Store.
Vendor Area Hours: 10:00 - 19:00
Penn & Teller
From Nukes to Cyber – Alternative Approaches for Proactive Defense and Mission Assurance
Lt. Gen. Robert Elder USAF (Retired)
Until 10:45Track 1
Dude, WTF in my car?
Alberto Garcia Illera & Javier Vasquez Vidal
Until 10:45Track 2
Do-It-Yourself Cellular IDS
Sherri Davidoff & Panel
Until 11:45Track 3
Predicting Susceptibility to Social Bots on Twitter
Chris Sumner & Randall Wald
Until 10:45Track 4
Insecurity - A Failure of Imagination
Marc Weber Tobias & Tobias Bluzmanis
Until 10:45
Saturday Speaking Schedule
10:00
Penn & Teller
The Politics of Privacy and Technology: Fighting an Uphill Battle
Eric Fulton & Daniel Zolnikov
Until 11:45Track 1
The Road Less Surreptitiously Traveled
Pukingmonkey
Until 11:45Track 2
Do-It-Yourself Cellular IDS cont.Track 3
Fear the Evil FOCA: IPv6 attacks in Internet Connections
Chema Alonso
Until 11:45Track 4
Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock
David Lawrence & Panel
Until 11:45
11:00
Penn & Teller
Defeating Internet Censorship with Dust, the Polymorphic Protocol Engine
Brandon Wiley
Until 12:45Track 1
Home Invasion 2.0 - Attacking Network-Controlled Consumer Devices
Daniel "UnicornFurnace" Crowley, Jennifer "SavageJen" Savage, & David "Videoman" Bryan
Until 12:45Track 2
BoutiqueKit: Playing WarGames with Expensive Rootkits and Malware
Josh 'Monk" Thomas
Until 12:45Track 3
Legal Aspects of Full Spectrum Computer Network (Active) Defense
Robert Clark
Until 12:45Track 4
DEF CON Comedy Jam Part VI, Return of the Fail
Panel
Until 13:45
12:00
Penn & Teller
Privacy In DSRC Connected Vehicles
Christie Dudley
Until 13:45Track 1
RFID Hacking: Live Free or RFID Hard
Francis Brown
Until 13:45Track 2
Android WebLogin: Google's Skeleton Key
Craig Young
Until 13:20
Building an Android IDS on Network Level
Jaime Sanchez
Until 13:50Track 3
We are Legion: Pentesting with an Army of Low-power Low-cost Devices
Dr. Philip Polstra
Until 13:45Track 4
DEF CON Comedy Jam Part VI, Return of the Fail cont.
13:00
Penn & Teller
Phantom Network Surveillance UAV / Drone
Ricky Hill
Until 14:45Track 1
Stalking a City for Fun and Frivolity
Brendan O'Connor
Until 14:45Track 2
Defeating SEAndroid
Pau Oliva Fora
Until 14:20
Doing Bad Things to 'Good' Security Appliances
Phorkus (Mark Carey) & Evilrob (Rob Bathurst)
Until 15:20Track 3
Pwn The Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices
Wesley McGrew
Until 14:45Track 4
Hardware Hacking with Microcontrollers: A Panel Discussion
Panel
Until 14:45
14:00
Penn & Teller
Safety of the Tor Network: a Look at Network Diversity, Relay Operators, and Malicious Relays
Runa A. Sandvik
Until 15:45Track 1
Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks
Hunter Scott
Until 15:45Track 2
How to Hack Your Mini Cooper: Reverse Engineering Controller Area Network (CAN) Messages on Passenger Automobiles
Jason Staggs
15:30 until 15:50Track 3
DC Awards
Until 15:45Track 4
An Open Letter - The White Hat's Dilemma: Professional Ethics in the Age of Swartz, PRISM and Stuxnet
Alex Stamos
Until 15:45
15:00
Penn & Teller
De-Anonymizing Alt.Anonymous.
Messages
Tom Ritter
Until 16:45Track 1
BYO-Disaster and Why Corporate Wireless Security Still Sucks
James Snodgrass (PuNk1nPo0p) & Josh Hoover (wishbone)
Until 16:45Track 2
Electromechanical PIN Cracking with Robotic Reconfigurable Button Basher (and C3BO)
Justin Engler & Paul Vines
Until 16:20
Data Evaporation from SSDs
Sam Bowne
Until 16:50Track 3
PowerPreter: Post Exploitation Like a Boss
Nikhil Mittal
Until 16:45Track 4
Suicide Risk Assessment and Intervention Tactics
Amber Baldet
Until 16:45
16:00
Penn & Teller
Track 2
Noise Floor: Exploring the World of Unintentional Radio Emissions
Melissa Elliott
Until 17:45Track 2
GoPro or GTFO: A Tale of Reversing an Embedded System
Todd Manning & Zach Lanier
Until 17:20
JTAGulator: Assisted Discovery Of On-Chip Debug Interfaces
Joe Grand aka Kingpin
Until 18:20Track 3
DNS May Be Hazardous to Your Health
Robert Stucke
Until 17:45Track 4
OTP, It won't save you from free rides!
bughardy & Eagle1753
Until 17:45
17:00
Penn & Teller
Track 1
Track 2
Track 3
Track 4
How to Disclose or Sell an Exploit Without Getting in Trouble
James Denaro
Until 18:20
18:00
Penn & Teller
Track 1
Black & White Ball entertainmentTrack 2
Reality Hackers
Rebecca Wexler
Until 21:00Track 3
Hacker Pyramid, Hacker JeopardyTrack 4
Wonk Lounge
Panel
BOF
20:00
Penn & Teller
Track 1
Movie Night with the Dark Tangent
Until 0100Track 2
Track 3
Track 4
21:00
Sunday, August 4th
08:00 - 12:00
Registration in the Rotunda - $180 USD CASH ONLY
Official DEF CON Store in the Rotunda - Get your official DEF CON swag at the DEF CON Store.
Vendor Area Hours: 10:00 - 15:00
Penn & Teller
Track 1
The Cavalry Isn't Coming: Starting the Revolution to Fsck it All!
Nicholas J. Percoco
Joshua Corman
Until 10:45Track 2
gitDigger: Creating useful wordlists from public GitHub repositories
Jamie Filson (WiK) & Rob Fuller (Mubix)
Until 10:20
Made Open: Hacking Capitalism
Todd Bonnewell
Until 11:20Track 3
Exploiting Music Streaming with JavaScript
Franz Payer
Until 10:45Track 4
Defense by numbers: Making Problems for Script Kiddies and Scanner Monkeys
Chris John Riley
Until 10:45
Sunday Speaking Schedule
10:00
Penn & Teller
Track 1
The Dark Arts of OSINT
Noah Schiffman & Skydog
Until 11:45Track 2
Made Open: Hacking Capitalism cont.
Until 11:20
The Dawn of Web 3.0: Website Mapping and Vulnerability Scanning in 3D, Just Like You Saw in the Movies
Teal Rogers & Alejandro Caceres
Until 11:50Track 3
Java Every-Days: Exploiting Software Running on 3 Billion Devices
Brian Gorenc & Jasiel Spelman
Until 11:45Track 4
Resting on Your Laurels Will Get You Pwned: Effectively Code Reviewing REST Applications to Avoid Getting Pwned
Abraham Kang & Dinis Cruz
Until 11:45
11:00
Penn & Teller
Track 1
EMET 4.0 PKI Mitigation
Neil Sikka
Until 12:45Track 2
Combatting Mac OSX/iOS Malware with Data Visualization
Remy Baumgarten
Until 12:20
A Thorny Piece Of Malware (And Me): The Nastiness of SEH, VFTables & Multi-Threading
Marion Marschalek
Until 12:50Track 3
HiveMind: Distributed File Storage Using JavaScript Botnets
Sean Malone
Until 12:20Track 4
This Presentation Will Self-Destruct in 45 Minutes: A Forensic Deep Dive into Self-Destructing Message Apps
Drea London & Kyle O'Meara
Until 12:45
12:00
Penn & Teller
Track 1
Stepping P3wns: Adventures in Full Spectrum Embedded Exploitation (and defense!)
Ang Cui & Michael Costello
Until 13:45Track 2
Transcending Cloud Limitations by Obtaining Inner Piece
Zak Blacher
Until 13:20
Utilizing Popular Websites for Malicious Purposes Using RDI
Daniel Chechick & Anat (Fox) DavidiTrack 3
Defending Networks with Incomplete Information: A Machine Learning Approach
Alexandre Pinto
Until 13:45Track 4
Fast Forensics Using Simple Statistics and Cool Tools
John Ortiz
Until 13:45
13:00
Penn & Teller
Track 1
EDS: Exploitation Detection System
Amr Thabet
Until 14:45Track 2
Open Public Sensors, Trend Monitoring and Data Fusion
Daniel Burroughs
Until 14:20
Collaborative Penetration Testing With Lair
Tom Steele & Dan KottmanTrack 3
Blucat: Netcat For Bluetooth
Joseph Paul Cohen
Until 14:45Track 4
Forensic Fails - Shift + Delete Won't Help You Here
Eric Robi & Michael Perklin
14:00
Penn & Teller
Track 1
Conducting Massive Attacks with Open Source Distributed Computing
Alejandro Caceres
Until 15:45Track 2
PowerPwning: Post-Exploiting By Overpowering PowerShell
Joe Bialek
Until 15:20
Evolving Exploits Through Genetic Algorithms
Soen
Until 15:50Track 3
BYOD PEAP Show
Josh Yavor
Until 15:45Track 4
Let's Screw with Nmap
Gregory Pickett
Until 15:45
15:00
Penn & Teller
Track 1
Revealing Embedded Fingerprints: Deriving Intelligence from USB Stack Interactions
Andy Davis
Until 16:20Track 2
Track 3
The Bluetooth Device Database
Ryan Holeman
Until 16:20Track 4
C.R.E.A.M. Cache Rules Evidently Ambiguous, Misunderstood
Jacob Thompson
Until 16:20
16:00
Penn & Teller
Track 1
Track 2
Closing CeremoniesTrack 3
Closing CeremoniesTrack 4
17:00