ShmooCon XI - 2015 - Friday, January 16
14:30
Potter
Opening Remarks, Rumblings, and Rants
15:30
Shevinsky
Five Not-Totally-Crazy Ways to Build for Usability
16:00
Smith
Simple Windows Application Whitelisting Evasionˀ
16:30
Liszka
Don’t Look Now! Malicious Image Spam
17:00
Pitts
Userland Persistence on Mac OS X "It Just Works"
17:30
Holeman
SEWiFi: Building a Security Enhanced WiFi Dongle
18:00
Kallenberg, Kovah
Betting BIOS Bugs Won't Bite Y'er Butt?
18:30
Hall
Keynote Address
ShmooCon XI - 2015 - Saturday, January 17
10:00
Boone, Ossmann, Spill
NSA Playset: USB Tools
Dorsey
Cockroach Analysis: A Statistical Analysis of the Flash and Java Files that Infest the Internet
Merrill
Where the Wild Things Are: Encryption, Police Access & the User
11:00
Schuetz
Knock Knock: A Survey of iOS Authentication Methods
DeMott
Understanding a New Memory Corruption Defense: Use-after-Free (UaF) Mitigation and Bypass
Benson
Analysis of POS Malware
12:00
Breen, Kennedy
httpscreenshot - A Tool for Both Teams
Moore, Wardle
There's Waldo! Tracking Users via Mobile Apps
Schrodinger
Quantum Computing 01100101
14:00
Ahmed, Bohan
Automated Binary Analysis with Pin and Python
Nelms
Practical Machine Learning for Network Security
Oppenheim, Tal
Come to the Dark Side - We Have (Misfortune) Cookies
15:00
Bernstein, Lange
NaCl: A New Crypto Library
Behrens, Hoernecke
The Joy Of Intelligent Proactive Security
Conti, Cross, Raymond
Deception for the Cyber Defender: To Err is Human; to Deceive, Divine
16:00
Franklin, Greene, Kelsey
Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry
Hovor, Modi
Manually Searching Advisories and Blogs for Threat Data--"Who's Got Time for That?"
Zatko
Rethinking Security's Role in CS Education
17:00
The Shmoo Group
0wn the Con
Forshaw
The Windows Sandbox Paradox
Cardozo, Opsahl
Ask the EFF
ShmooCon XI - 2015 - Sunday, January 18
10:00
Damsky
White is the New Black: Why White Data Really Matters
Morris
No Budget Threat Intelligence: Tracking Malware Campaigns on the Cheap
Wineberg
The Mile High Club: Getting Root at 40,000 Feet
11:00
Schwabe
Eliminating Timing Side-channels. A Tutorial.
Kasza, Mahjoub
Infrastructure Tracking with Passive Monitoring and Active Probing
Allen, Cullison, Rubin
Mascots, March Madness & #yogapants: Hacking Goes to College
12:00
Pisano
The Dark Art of Data Visualization
Nguyen
Micronesia: Sub-kernel Kit for Host Introspection in Determining Insider Threat
Kelsey, McKay, Turan
How Random is Your RNG?
13:30
Fennelly, Forno, Laurie, Potter, Rogue
Get Off My Lawn: Examining Change through the Eyes of The Old Guard
14:30
Potter
Closing Remarks


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.