Top Talks @ DEF CON 26, 2018: Your Complete Guide
Our editorial team has handpicked the best of the best talks at DEF CON 26 -is one of the world's largest hacker conventions, held annually in Las Vegas, Nevada. Following is the list of top Emerging Areas In Security Technology talks at DEF CON 26.
DEFCON 2018, 26th Def-Con Hacking Conference is among one of the most main event on Computer, Information Technology, Cyber Security, Software, Hacking and Hack topics.
The Index below will help you navigate on this page. Each link will take you to the individual presentations. We have marked some particular slide number from each presentation which are particularly interesting. So, here's your shortcut to a full conference!
Index: Top Talks Handpicked by CISO Platform Editorial Team
(Click on the sections below to go directly to respective sections)
- Android Security
- Application Security
- Authentication Security
- Blockchain
- Hacking
- Hardware Security
- IoT Security
- MAC/iOS Security
- Malware
- Security Research
- Vulnerabilities & Exploits
- Windows Security
1) Top talks on Android Security from DEF CON 26
Here are some great talks from DEF CON
- One Step Ahead of Cheaters -Instrumenting Android Emulators ... Go To Presentation
- Vulnerable Out of the Box: An Evaluation of Android Carrier Devices ... Go To Presentation
- Rock appround the clock: Tracking malware developers by Android "AAPT" timezone disclosure bug ... Go To Presentation
- Man-In-The-Disk ... Go To Presentation
2) Top talks on Application Security from DEF CON 26
Here are some great talks from DEF CON which can help you understand how diverse the field of Application Security is and a holistic view of the advancements.
- PLAYBACK: A TLS 1.3 STORY... Go To Presentation
- An Attacker Looks at Docker: Approaching Multi-Container Applications... Go To Presentation
3) Top talks on Authentication Security from DEF CON 26
Here are some great talks from DEF CON
- Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010 ... Go To Presentation
- YOUR VOICE IS MY PASSPORT ... Go To Presentation
- BarcOwned : Popping shells with your cereal box ... Go To Presentation
- Last mile authentication problem: Exploiting the missing link in end-to-end secure communication ... Go To Presentation
4) Top talks on Blockchain from DEF CON 26
Here are some great talks from DEF CON
- You may have paid more than you imagine—Replay Attacks on Ethereum Smart Contracts ... Go To Presentation
- Tineola: Taking A Bite Out of Enterprise Blockchain ... Go To Presentation
5) Top talks on Hacking from DEF CON 26
Here are some great talks from DEF CON
- I'll See Your Missile and Raise You A MIRV: An overview of the Genesis Scripting Engine ... Go To Presentation
- 80 to 0 in under 5 seconds: Falsifying a Medical Patient's Vitals ... Go To Presentation
- Soviet Russia Smartcard Hacks You ... Go To Presentation
- Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparent Session Hijacking ... Go To Presentation
- Compromising online accounts by cracking voicemail systems ... Go To Presentation
- Compression Oracle Attacks on VPN Networks ... Go To Presentation
- House of Roman—a "leakless" heap fengshui to achieve RCE on PIE Binaries ... Go To Presentation
- 4G - Who is paying your cellular phone bill? ... Go To Presentation
- Practical & Improved Wifi MITM with MANA ... Go To Presentation
- Weaponizing Unicode: Homographs Beyond IDNs ... Go To Presentation
- Hacking PLCs and Causing Havoc on Critical Infrastructures ... Go To Presentation
- Hacking BLE Bicycle Locks for Fun and a Small Profit ... Go To Presentation
- Lost and Found Certificates: dealing with residual certificates for pre-owned domains ... Go To Presentation
- Reaping and breaking keys at scale: when crypto meets big data ... Go To Presentation
- Breaking Parser Logic: Take Your Path Normalization Off and Pop 0days Out! ... Go To Presentation
6) Top talks on Hardware Security from DEF CON 26
Here are some great talks from DEF CON
- GOD MODE Unlocked: Hardware backdoors in x86 CPUs ... Go To Presentation
- The ring 0 facade: awakening the processor's inner demons ... Go To Presentation
- Project “The Interceptor”: Owning anti-drone systems with nanodrones ... Go To Presentation
- Your Watch can watch you ! Gear up for broken privilege pitfalls in the samsung gear smart watch ... Go To Presentation
- HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller ... Go To Presentation
- It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded devices for fun and profit ... Go To Presentation
- Jailbreaking the 3DS through 7 years of hardening ... Go To Presentation
- Breaking Smart Speakers: We are Listening to You ... Go To Presentation
- Infecting the Embedded Supply Chain ... Go To Presentation
- A Journey into Hexagon: Dissecting Qualcomm Basebands ... Go To Presentation
- What the Fax!? ... Go To Presentation
7) Top talks on IoT Security from DEF CON 26
Here are some great talks from DEF CON
- YOU'D BETTER SECURE YOUR BLE DEVICES OR WE'LL KICK YOUR BUTTS ! ... Go To Presentation
- Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUNS & MODERN CITIES ... Go To Presentation
- Who Controls the Controllers—Hacking Crestron IoT Automation Systems ... Go To Presentation
8) Top talks on MAC/iOS Security from DEF CON 26
Here are some great talks from DEF CON
- Fire & Ice: Making and Breaking macOS Firewalls... Go To Presentation
- The Mouse is mightier than the sword... Go To Presentation
- One bite and all your dreams will come true: Analyzing and Attacking Apple Kernel Drivers... Go To Presentation
- Fasten your seatbelts: We are escaping iOS 11 sandbox!... Go To Presentation
- Attacking the macOS Kernel Graphics Driver ... Go To Presentation
9) Top talks on Malware from DEF CON 26
Here are some great talks from DEF CON
- Looking for Perfect Signature : An Automatic YARA Rules Generation Algorithm in the AI-era ... Go To Presentation
- RING 0/-2 ROOKITS : COMPROMISING DEFENSES ... Go To Presentation
- Finding Xori: Malware Analysis Triage with Automated Disassembly ... Go To Presentation
- Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability ... Go To Presentation
10) Top talks on Security Research from DEF CON 26
Here are some great talks from DEF CON
- Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from huge to little ones) ... Go To Presentation
- You’re Just Complaining Because You’re Guilty: A DEF CON Guide to Adversarial Testing of Software Used in the Criminal Justice System ... Go To Presentation
11) Top talks on Vulnerabilities & Exploits from DEF CON 26
Here are some great talks from DEF CON
- Breaking Extreme Networks WingOS: How to own millions of devices running on Aircrafts,Government, Smart cities and more ... Go To Presentation
- FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point of sales systems ... Go To Presentation
- UEFI Exploitation For The Masses ... Go To Presentation
- All your math are belong to us ... Go To Presentation
- All your family secrets belong to us—Worrisome security issues in tracker apps ... Go To Presentation
- Automated Discovery of Deserialization Gadget Chains ... Go To Presentation
- Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities ... Go To Presentation
- Exploiting Active Directory Administrator Insecurities ... Go To Presentation
- Demystifying MS17-010: Reverse Engineering the ETERNAL Exploits ... Go To Presentation
12) Top talks on Windows Security from DEF CON 26
Here are some great talks from DEF CON
- Reverse Engineering Windows Defender's Emulator ... Go To Presentation
- Relocation Bonus: Attacking the Windows Loader Makes Analysts Switch Careers ... Go To Presentation
- SMBetray - Backdooring and breaking signatures ... Go To Presentation
Discover & Compare 1000+ Cyber Security Products (It's Free!)
FireCompass is an AI Assistant for Cyber Security Decision Making. Discover & Compare 1,000+ Cyber Security Products. Grab your FREE Account Now (For a Limited Time ONLY).
>>Click Here To Sign Up For FREE
Pre Register For SACON - India's First Security Architecture Conference
Join 100+ CISOs and 200+ IT Security Professionals at an exclusive security architecture conference in the Silicon Valley Of India - Bangalore, in February, 2019. Pre-Register and get special discount access and talk highlights.
Comments