|=------------------------------------------------------------------------------------------------=|

 ########  ######## ########  ######   #######  ##    ##    ########   #######  ##     ## ######## 
 ##     ## ##       ##       ##    ## ##     ## ###   ##    ##     ## ##     ## ###   ### ##       
 ##     ## ##       ##       ##       ##     ## ####  ##    ##     ## ##     ## #### #### ##       
 ##     ## ######   ######   ##       ##     ## ## ## ##    ########  ##     ## ## ### ## ######   
 ##     ## ##       ##       ##       ##     ## ##  ####    ##   ##   ##     ## ##     ## ##       
 ##     ## ##       ##       ##    ## ##     ## ##   ###    ##    ##  ##     ## ##     ## ##       
 ########  ######## ##        ######   #######  ##    ##    ##     ##  #######  ##     ## ######## 
 
|=------------------------------------------------------------------------------------------------=|

                                 DEF CON group 11396 @ Rome, Italy
                                
                               [Main] [Meetings] [Posts] [Projects] 


|=----------------------------------=[ List of talks in 2018 ]=-----------------------------------=|

by malweisse
The talks given during the meetings in 2018 are: - Who we are and what is a DEF CON group, by malweisse https://docs.google.com/presentation/d/1zFaUcCbtcm9Bb8POnuA-CbDq8xprVQvZzgI214174lM/edit?usp=sharing - Tales of cheap duckies: combining Digispark Attiny85, TOR and the Empire Framework, by W1ckDavid https://docs.google.com/presentation/d/1sggt4zMoPoEoYGHxbx7OWVuZWJnJ6NIIGYcHLYFuaFM/edit?usp=sharing - RopGun: runtime detection of ROP payload executions, by anticlockwise https://docs.google.com/presentation/d/1uoO23Qgu17Qme2EFHDmlScZqEOGvZdd7-FBsTbd65-4/edit?usp=sharing - Angr & Pwn: vulnerability detection using symbolic execution, by malweisse https://docs.google.com/presentation/d/1_64Vm0pw6QpFbBYy8s1RHkDrJHj4zHIc7d8yTrSr1JI/edit?usp=sharing - Weaknesses of blockchain applications, by simonebronzini https://drive.google.com/file/d/1ZrsK4YBE60CggeOvF9pWn8uCglPlVI8S/view - Flare-On5 #12, a trip into bootkits and esoteric ISAs, by dp1 https://docs.google.com/presentation/d/1Ycd0r-7ftUTRAWanOAYun6nkEaZIU1SUI1dIBxZ-EVg/edit?usp=sharing - Side channels attacks in air-gapped environments, by gdl_jotaro_sama https://drive.google.com/file/d/1cNfqtHt7ppZ57mmjvdFCpV2dGwOpXBqm/view?usp=sharing - Dynamic Binary Instrumentation for Malware analysis, by f_palmaro https://drive.google.com/file/d/1dYr8s2DKEdYb_G-wlEykLIyHFosWai2n/view?usp=sharing