DEF CON 18 - Frank Breedijk - Seccubus - Analyzing Vulnerability Assessment Data the Easy Way
DEF CON 29 - Shir Tamari、Ami Luttwak - DNS-as-Service プラットフォームに影響を与える新しいクラスの DNS 脆弱性
This is how hackers hack you using simple social engineering
DEF CON 29 Voting Village - Tod Beardsley - A Deep Dive on Vulnerability Disclosure
DEF CON 31 - Ringhopper - How We Almost Zero day’d the World - Benny Zeltser, Jonathan Lusky
DEF CON 26 BCOS Monero Village - Anonimal- Monero Projects Vulnerability Response Process
DEF CON 32 - Using EPSS for Better Management Vulnerability Management - Jerry Gamblin
DEF CON Safe Mode ICS Village -Yardeni, Lemley - Vulnerability Discovery Tips for Surviving
DEF CON 23 - ブレント ホワイト - Web アプリのハッキング
DEF CON 32 - Secrets & Shadows: Leveraging Big Data for Vulnerability Discovery - Bill Demirkapi
DEF CON 20 - Ang Cui - FRAK を使用した組み込みデバイスのファームウェアの脆弱性ハンティング
DEF CON 24 - ジョシュア・ドレイク、スティーブ・クリスティ・コーリー - 脆弱性 101
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver の脆弱性
Jack Cable - Bootstrapping Vulnerability Disclosure For Election Systems - DEF CON 27 Voting Village
Adam Schaal - A Deep Dive Into Supply Chain Vulnerabilities - DEF CON 29 AppSec Village
DEF CON 32 - Grand Theft Actions Abusing Self Hosted GitHub Runners - Adnan Khan, John Stawinski
DEF CON 28 Aerospace Village: Checklist for Aviation Vulnerability Disclosure
DEF CON Safe Mode Aerospace Village -Jay Angus - Checklist for Aviation Vulnerability Disclosure
DEF CON 16 - Weasel: Compliance: The Enterprise Vulnerability Roadmap
DEF CON 32 - Exploiting Cloud Provider Vulnerabilities for Initial Access - Nick Frichette