DEF CON 24 - ウェストン ヘッカー - ホテルのキーと POS システムのハッキング
DEF CON 31 - Private Keys in Public Places - Tom Pohl
DEF CON 25 - ジェラルド・ステア、ショーン・メトカーフ - クラウドのハッキング
DEF CON 31 - Private Until Presumed Guilty - Allison Young, Diane Akerman
DEF CON セーフ モード - Bill Graydon - 物理世界の主要な空間脆弱性の悪用
DEF CON 24 - Weston Hecker - ホテルのキーと POS システムのハッキング
DEF CON 23 - Lock Picking Village - Jos Weyers - Key Impressioning
DEF CON 26 ブルーチームビレッジ - アンディ・アップルバウム - ドロップを止めて SOC を評価する
Pretty Sure This Guy Isn’t a Real Sensei - Key & Peele
Unsupervised Keypoint Learning for Guiding Class-Conditional Video Prediction
Ben Brecht - MITM mixed mode butterfly key privacy attack - DEF CON 27 Crypto and Privacy Village
Fast Keypoint Recognition and Recent Work at CVLab
DEF CON 31 - Car Hacking Village - Exploiting Wireless Side Channels in EV Charging - Kohler, Baker
DEF CON 31 - Breaking BMC The Forgotten Key to the Kingdom - Alex Tereshkin, Adam Zabrocki
DEF CON 31 - Polynonce - An ECDSA Attack and Polynomial Dance - Nils Amiet, Marco Macchetti
DEF CON 31 - Small Leaks, Billions Of Dollars - Nikolaos Makriyannis, Oren Yomtov
DEF CON Safe Mode Aerospace Village - Panel - Hackers and ISACs
How to act like a Rallytrap ?! Beginner Version - Lords Mobile
Am fost obligati sa facem aceasta schimbare...
DEF CON 31 - Assessing Security of Certificates at Scale - David McGrew, Brandon Enright, Andrew Chi