ShmooCon XIII - 2017 - Friday, January 13
14:00
Potter
Opening Remarks, Rumblings, Ruminations, and Rants
15:30
Patrick
U2F Zero: Secure Hardware Design, DIY Mass Production, and Amazon Prime
16:00
1
35 Years of Cyberwar: The Squirrels are Winning
16:30
McElroy
Implantable Logic Analyzers and Unlocking Doors
17:00
Dodge
Cyborg Self-Hacking: An Examination of Cochlear Implants
17:30
DiLorenzo
Introducing Jak: Safely Share Sensitive Files via Git
18:00
Chin, Muller
Can a Drunk Person Authenticate Using Brainwaves? #NotAlcoholicsJustResearchers
18:30
McGraw
Keynote: Seven Things: Frank Zappa, T. Coraghassen Boyle, and Twenty-one Years in Security
20:00
Blanchard
How to Spoil all Movies and Give an Unforgettable Presentation
20:20
Goodspeed
Quick and Dirty Emulation of ARM Firmware
20:40
Clemenko
NAVRIE Athena — A graph database solution to unify InfoSec data and workflow
21:00
Vedaa
22 Short Films About Security
21:20
Willis
Slash AppSec Costs, Free Threat Modeling & Compliance Data Output
21:40
O’Connor
You Can Do the Thing!
ShmooCon XIII - 2017 - Saturday, January 14
10:00
Bratus, Momot
LangSec for Penetration Testing: How and Why
Johnson, Vanatta
A Widening Attack Plain: Threatcasting Tomorrow’s Threats
Knight, Newlin
So You Want to Hack Radios
11:00
Williams
Know Normal, Find Evil: Windows 10 Edition
Friedman, Leiserson, Mill, Wilkerson
Ask the Feds
Ossmann, Spill
Exploring The Infrared World
12:00
Ison, Redbeard
Who Wants to Allow Arbitrary Code Execution on Their Boxes? We Do It Every Day.
Opsahl
Ask the EFF: Protecting Tomorrow
Bratus, Wu
A Context-Aware Kernel IPC Firewall for Android
14:00
Alva, Merrill
Goodnight Moon & the House of Horrors: A look at the current IoT ecosystem and the regulations trying to control it
Clarke, Miller, Schedel
háček: Computing a Hacker Experience
Clark
WaveConverter – An Open Source Software Tool for RF Reverse Engineering
15:00
Houser
Plug-in Electric Vehicle Fingerprinting: Authentication for Plug-in Electric Vehicles
Pearce
Flailing is Learning: My First Year as a Malware Analyst
Kseib, Modi
I Have a Graph Database. Now What?
16:00
Chailytko, Skuratovich
Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in Your Virtualized Environment
Borisov, Tan
The State of Secure Messaging
The Shmoo Group
0wn the Con
17:00
Hardy, Shpantzer
Anti-Ransomware: Turning the Tables
Blaze
The Metadata is the Message (and Sometimes the Message is the Metadata)
Kriss, White
User Focused Security at Netflix: Stethoscope
ShmooCon XIII - 2017 - Sunday, January 15
10:00
Creighton
Dig Out Your Brick Phone! Bringing AMPS Back with GNU Radio
Castellucci
A Nickel Tour of the Ad Fraud Ecosystem
Biernat
ripr – Run Slices of Binary Code from Python
11:00
Cardinale
Excuse me, Server, Do You Have the Time?
Kuhr
The Threat Intel Results are in… You are NOT the hacker! : Disinformation Campaigns vs. Attribution Claims
Seymour
Safety Bot Guaranteed
12:00
Gidwani
Does a BEAR Leak in the Woods? The Democratic National Committee breach, Russian APTs, and the 2016 U.S. Election
Karmel, Wild
Challenges and Opportunities: Application Containers and Micro Services
Verschoor
(In-)secure messaging with SCIMP and OMEMO
13:00
Caswell, Eagle, Sorenson, Thompson, Vidas, Wright
Designing and Executing the World’s First All-Computer Hacking Competition: A panel with the development team
14:00
Potter
Closing Remarks


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.