Erick Galinkin — Your Blacklist is Dead Airgap Everything — DEF CON 27 Cloud Village
What happens when attackers start taking advantage of whitelisted APIs as a form of obfuscated command and control? Companies both…Подробнее
What happens when attackers start taking advantage of whitelisted APIs as a form of obfuscated command and control? Companies both…Подробнее
The human body is the most elegant and complex machine ever created, but often we do not realize how well…Подробнее
Presentations from the DEF CON 27 Blockchain Village
Presentations from the DEF CON 27 Ethics Village
Presentation from DEF CON 27 Ham Radio Village
Presentations from the DEF CON 27 Ethics Village
PacBot Policy as Code from T Mobile OSS
Presentations from the DEF CON 27 Blockchain Village
Presentations from the DEF CON 27 Ethics Village
In this talk I am going to walk through how we can use pareto’s principle to secure all our AWS…Подробнее
In this talk I will share my experience about how I hacked different automotive clouds, techniques I used and goals…Подробнее
Presentation From DEF CON 27 Ham Radio Village
Presentations from the DEF CON 27 ICS Village
Bulletproofs are important zero-knowledge proofs used in Monero to hide transaction amounts, but they can be used to prove other…Подробнее
Zcoin launched with the Zerocoin protocol, which was riddled with critical security issues. Reuben will talk through the team’s response…Подробнее
Before the Bluetooth technology kicks in, infrared remote control has been widely used. Many systems still use IR as their…Подробнее
Presentations from the DEF CON 27 ICS Village
A New York apartment building and a Moroccan rural village share the same internet challenges — inefficient methods of distribution…Подробнее
Presentations from the DEF CON 27 ICS Village
Presentations from the DEF CON 27 ICS Village
Presentations from the DEF CON 27 ICS Village
This talk presents the methodology, findings and conclusions of a boundary theory based Information Systems research project completed at University…Подробнее
Presentations from the DEF CON 27 ICS Village
Cars now have infotainment systems for several years. Those systems accomplish basic tasks such as radio, music, navigation and Bluetooth…Подробнее
Translation tables are a dynamic component of HDD firmware that translate logical addresses to physical locations on the disk. Corrupted…Подробнее
Amir will answer questions about the Open Source Technology Improvement Fund (OSTIF), a nonprofit that help coordinate audits of open-source…Подробнее
Presentations from the DEF CON 27 ICS Village
Learn the basics of Monero and its community. Monero provides benefits to society that all Defcon attendees benefit from. Daniel…Подробнее
Francisco will provide an overview and review of blockchain scaling and fees in Monero. He will review the relationship between…Подробнее
The past year has seen excellent research focused on achieving better functionality, privacy, and efficiency for spend obfuscation in digital…Подробнее