THOTCON 0x6 - Thursday, May 14
11:00
Valasek
The Ghost of Security Past
Goetzman
GATTACA - Final Warning!
11:30
Bugher
Detecting Bluetooth Surveillance Systems
12:00
Ocepek
Synspotting for Teenagers and Real Swinging Adults
Smith
Curry and TARTS: A new technique for avoiding side-channel attacks on cryptosystems
12:30
Brand, Erven
Medical Device Security: An Infectious Disease
13:00
Espinoza
Week to Weak: Weaponization of Vulnerabilities
Litke
Giving a LUKS. Learning to encrypt your data properly.
13:30
Rennie
The Right to be Forgotten - Now the EU, Tomorrow the World?
14:00
Beardsley, egypt
Wanna Cyber?
15:00
Linn
Vomiting Shells: Tracking the Splatter Patterns
nkryptr
MMORPG (Massively Multiplayer Online Real-world Political Gamechanging)
15:30
Jakubowski, Tomek
Explore that which can not be explored
17:00
Richards
Firmware Vulnerability Analysis
Merrill
Hacking the CFAA: What You Need to Know, What’s Happening, and Where It’s Going.
17:30
Macedo, Oliveira
Bypassing the Secure Desktop Protections
18:00
FuzzyNop
Pwning People Personally
Shaw
How to Grow a Hacker
18:30
Wood
Threat Modeling in the Gaming Industry
THOTCON 0x6 - Friday, May 15
11:00
Callas
Everything You Need to Know About Crypto in 50 minutes
11:30
Lakhani
Killing them Softly – Hunting on DarkNet
12:00
Havelt
The Bad, The Worse, and The Ugly - No Hope for POS Security
Bambenek
We Don't Need Another Damn Whitepaper: Going Kinetic on Cybercrime Networks on a Budget
12:30
Martinez
GSM Sucks: Detecting IMSI Catchers
13:00
Brutti
Cartero - Another Social Engineering Framework
admford
Hacking Citizens United, or How to Influence Elections on a Budget
13:30
Bryan
Card skimming using a RaspberryPi
15:00
Bong
Building a Poor Man’s RFID Cloner
Czarnik
Being a Victim can be a Crime [Ain’t Losin’ Data a Breach?]
15:30
Eberhardt, Weiss
One Step Closer to the Matrix: Machine Learning and Augmented Reality in Networking Defense
16:00
Daniel
InfoSec: What we know, and what we need to know.
17:00
Claudius, Myers
Trojaned Gems - You can’t tell you’re using one!
Jordan, Schmitt
Wireless Drone Strikes Episode II: Attack of the Drones!
17:30
Stillig
Compliance kills the security star - Why security standards kill security!
18:00
Street
BREAKING in BAD! (I’m the one who doesn’t knock)


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.