English | 中文
FRIDAY - 31 May, 2019
10:00 -10:45
Creating the DEFCON China 1.0 Badge
Joe Grand
11:00 - 11:45
Transferability of Adversarial Examples to Attack Cloud-based Image Classifier Service
Liu Yan (Dou Goodman), Wei Tao, Hao Xin, Wang Yang
12:00 - 12:20
Bridge Attack: Double-edged Sword in MobileSec
Zidong Han
12:30 - 12:50
WARNING: Magnitude 10 Earthquake Is Coming in One Minute
Weiguang Li, Lin Huang & Yuwei Zheng
13:00 - 13:45
Tag-side attacks against NFC
Christopher Wade
14:00 - 14:45
Hacking Driverless Vehicles
Zoz
15:00 - 15:45
The art of game security
Joey Zhu
16:00 - 16:45
You are not hiding from me .NET - 45/D
Aden Chung
SATURDAY - 01 June, 2019
10:00 - 10:45
Derevolutionizing OS Fingerprinting: The Cat and Mouse Game
Jaime Sanchez
11:00 - 11:45
Chinese Mechanical Locks - An Insight into a Unique World of Locks
Lucas Zhao
12:00 - 12:20
Face Swapping Video Detection with CNN
Yang Wang, Hao Xin, Junfeng Xiong, Liu Yan & Wei Tao
12:30 - 12:50
How to perform security analysis on IoT equipment through building a base station system
Xiao HuiHui
13:00 - 13:45
Attacks you can't combat: vulnerabilities of most robust mobile operators
Sergey Puzankov
14:00 - 14:45
IPv666 - Address of the Beast
Christopher Grayson & Marc Newlin
15:00 - 15:45
Got To Glitch Them All: 10+ Years of War Stories Glitching Embedded and IoT Devices
Ramiro Pareja
16:00 - 16:45
Modern Malware: de-obfuscation, emulation and rootkits
Alexandre Borges
SUNDAY - 02 June, 2019
10:00 - 10:45
Breaking the back end! It is not always a bug. Sometimes, it is just bad design!
Gregory Pickett
11:00 - 11:45
VoIPShark: Open Source VoIP Analysis Platform
Nishant Sharma, Ashish Bhangale & Jeswin Mathai
12:00 - 12:45
From Ancient to Modern: Diagnosing Root Cause of Software Vulnerabilities from unexpected Crashes
Dr. Xinyu Xing & Dr. Jimmy Su
13:00 - 13:45
Mission Impossible: Steal Kernel Data from User Space
Yueqiang Cheng & Panel
14:00 - 15:45
Closing Ceremonies