ShmooCon XII - 2016 - Friday, January 15
14:00
Potter
Opening Remarks, Rumblings, Ruminations, and Rants
15:30
Hall, Ramsey
Breaking Bulbs Briskly by Bogus Broadcasts
16:00
Aumasson
Crypto and Quantum and Post Quantum
16:30
Filson
#thingswikfound #omarax: What is it, and why you may care?
17:00
Wesson
Static Malware and SMTP Mail Analysis using General Purpose Graphical Processing Units (GPGPU)
17:30
Gallagher
Where Do the Phishers Live? Collecting Phishers’ Geographic Locations from Automated Honeypots
18:00
Pitts
Hiding from the Investigator: Understanding OS X and iOS Code Signing to Hide Data
18:30
Gershenfeld
Keynote
ShmooCon XII - 2016 - Saturday, January 16
10:00
Cassidy
LostPass: Pixel-perfect LastPass Phishing
Andrews, Brody
Users Are People Too: How to Make Your Tools Not Suck for Humans
Sandin
Exploiting Memory Corruption Vulnerabilities on the FreeRTOS Operating System
11:00
Seeber
Hacking The Wireless World — Software Defined Radio Exploits
Eng
Software Security by the Numbers
Kalat
Online, No One Knows You’re Dead
12:00
Vincent
(P|G)Ohst Exploitation
Atkins
Using the Algebraic Eraser to Secure Low-Power and Passive IoT Devices
Conti, Iozzo, Moss, Tam, Wheeler
You Ain’t Seen Nothing Yet: New Paradigms for Policy, Regulation, and Community Engagement
14:00
Breen
The Road to SYSTEM: Recycling Old Vulnerabilities for Unpatched Privilege Escalation and A New Network Attack
Irwin
Speak Security and Enter: Better Ways to Communicate with Non-Technical Users
Ellis, Leiserson
Political Pwnage: The Hacker’s Guide to Cybersecurity Policy
15:00
The Shmoo Group
0wn the Con
Bulazel
AVLeak: Turning Antivirus Emulators Inside Out
Jover
LTE Security and Protocol Exploits
16:00
Bohan, Edwards
OSX Vulnerability Research and Why We Wrote Our Own Debugger
Carr, Dunwoody
No Easy Breach: Challenges and Lessons Learned from an Epic Investigation
3AlarmLampscooter
This Message Will Self-Destruct in 10 Seconds: Avoiding Bilateral Enucleation
17:00
Moneger
Penetration Testing Custom TLS Stacks
Ruef, Stevens
Attack on Titans: A Survey of New Attacks Against Big Data and Machine Learning
Buddington, Crocker, Galperin, Opsahl
Ask the EFF
ShmooCon XII - 2016 - Sunday, January 17
10:00
Eberhardt, Weiss
Compressed Context Based Analytic Results for Use in Computer Vision System for Network Defense
Beale
Containing an Attack with Linux Containers and AppArmor/SELinux
Armbrust, Herr
Making Milware: An Interdisciplinary Tryst
11:00
Paget
Be Free, Little GuardBunny!
Schuetz
My Hash is My Passport: Understanding Web and Mobile Authentication
Medina, Rees
Resistance is Futile: SDN Assimilating Our Networks
12:00
Koscher
Reverse-Engineering Wireless SCADA Systems
Bambenek
Building an Encyclopedia of Malware Configs (to punch miscreants)
Wardle
Gatekeeper Exposed
13:00
Blaze, Conti, Forno, Foster
Closing Plenary: Information Security Programs in Academia
14:00
Potter
Closing Remarks


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.