10:00 |
Catalyst
|
GPS - It's Not the Satellites That Know Where You Are |
Klein
|
IPv6 Playground: New Hope Update |
|
11:00 |
Jackson
|
Locational Privacy and Wholesale Surveillance via Photo Services |
Steele
|
The State of Global Intelligence |
|
Foote
|
Light, Color, and Perception |
|
12:00 |
Hart,
Newby
|
Content of the Future |
Dragorn,
Haines
|
Wireless Security: Killing Livers, Making Enemies |
|
Schearer
|
SHODAN for Penetration Testers |
|
13:00 |
Kaminsky
|
Keynote Address |
14:00 |
Love,
Scott
|
Digital: A Love Story |
Holt
|
Examining Costs, Benefits, and Economics in Malware and Carding Markets |
|
15:00 |
Greko,
Rothschild
|
Botnet Resistant Coding: Protecting Your Users from Script Kiddies |
Grenzfurthner
|
Arse Elektronika: Sex, Tech, and the Future of Screw-It-Yourself |
|
McNabb
|
Electronic Take Back |
|
16:00 |
Paley
|
Sita Sings the Blues: A Free Culture Success Story |
TProphet
|
Own Your Phone |
|
Potter
|
Cooking for Geeks |
|
17:00 |
Keigher
|
"Brilliants Exploits" - A Look at the Vancouver 2010 Olympics |
Muentz
|
Keeping Your Job While Being a Hacker |
|
Avdashchenko
|
Design of a Wireless EMG |
|
18:00 |
Aestetix,
Altman,
cpfr,
Echo,
Goodspeed,
McKon
|
The OpenAMD Project |
Appelbaum,
Schoen
|
Tor and Internet Censorship |
|
Tannir
|
Lisp, The Oldest Language of the Future |
|
19:00 |
Ottenheimer
|
Easy Hacks on Telephone Entry Systems |
Fey,
Wels
|
Extreme Lockpicking |
|
Saitta
|
Buying Privacy in Digitized Cities |
|
20:00 |
Andrews,
Meier,
West
|
Towards Open Libraries and Schools |
Foote
|
Build Robots and See the World |
|
Gillmor,
Rollins
|
Monkeysphere: Fixing Authentication on the Net |
|
21:00 |
Mariano,
Miller,
Swimm
|
Introduction to the Chip Scene: Low Bit Music and Visuals |
Altman,
Bonner,
Farr,
Grenzfurthner,
Hametner,
Heid,
Joyce,
Maw,
McKon,
Psytek,
Warner
|
Hackerspaces Forever: A Panel Presented by Hackerspaces.org |
|
Leghorn
|
Risk Analysis for Dummies |
|
22:00 |
Alarcon
|
Electronic Waste: What's Here and What's Next |
Figueroa
|
Detecting and Defending Your Network from Malware Using Nepenthes |
|
23:00 |
Cardenas,
G.,
Mehrmand,
O'Horo,
Pan
|
Interaction with Sensors, Receivers, Haptics, and Augmented Reality |
Scott
|
"Get Lamp" - Screening and Discussion |
|
Renda
|
Injecting Electromagnetic Pulses into Digital Devices |
10:00 |
Cass
|
T+40: The Three Greatest Hacks of Apollo |
Fried,
Torrone
|
How to Run an Open Source Hardware Company |
|
Catalyst
|
False Domain Name Billing and Other Scams |
|
11:00 |
Schoen
|
Behind the Padlock: HTTPS Ubiquitous and Fragile |
Marpet
|
Video Surveillance, Society, and Your Face |
|
Piskor
|
Hacking Out a Graphic Novel |
|
12:00 |
Degnan,
Koblentz
|
Vintage Computing |
Lazlow
|
Grand Theft Lazlow - How Hacking is Both the Death and Future of Traditional and Interactive Publishing, Journalism, and the Media |
|
Livingston
|
For Its Own Sake and to Build Something Better: A Primer on Neuroscience, Bat Echolocation, and Hacker Bio-inspiration |
|
13:00 |
Assange
|
Keynote Address |
14:00 |
Brennan
|
A Red Team Exercise |
Brown,
Tobin
|
No Free Lunch: Privacy Risks and Issues in Online Gaming |
|
15:00 |
V
|
Geo-Tagging: Opting-In to Total Surveillance |
Altman
|
How to Bring Your Project from Idea to Reality: Make a Living Doing What You Love |
|
Heid
|
Modern CrimeWare Tools and Techniques: An Analysis of Underground Resources |
|
16:00 |
Santos
|
Memory Fun 101 - Memory Training for Everyone |
Avener,
Tridish
|
Snatch Those Waves: Prometheus Radio and the Fight for Popular Communications |
|
McCarney
|
Surf’s Up! Exploring Cross Site Request Forgery (CSRF) through Social Network Exploitation |
|
17:00 |
Shah
|
Smartphone Ownage: The State of Mobile Botnets and Rootkits |
Rambam
|
Privacy is Dead - Get Over It |
|
Yampolskiy
|
Much Ado About Randomness |
|
18:00 |
Nicholson
|
Free Software: Why We Need a Big Tent |
Jackson
|
Why You Should Be an Amateur |
|
19:00 |
Grenzfurthner
|
Reach Out And Touch Face: A Rant About Failing |
Hong
|
Hackers for Human Rights |
|
20:00 |
Neulist
|
Hey, Don't Call That Guy A Noob: Toward a More Welcoming Hacker Community |
Lapsley,
Ravnitzky
|
Rummaging in the Government's Attic: Lessons Learned from More Than 1,000 Freedom of Information Act Requests |
|
Drosdick
|
The Telephone Pioneers of America |
|
21:00 |
Rodgers
|
Circuitbending |
Goldstein
|
Social Engineering |
|
22:00 |
Firefly,
Frequency,
Gonzo
|
2600 Meetings: Yesterday, Today, and Tomorrow |
Goodspeed
|
Building and Breaking the Next HOPE Badge |
|
Beave,
JFalcon
|
PSTN-based Cartography |
|
23:00 |
Ortiz
|
Hacking Our Biochemistry: Pharmacy and the Hacker Perspective |
Brunton,
Coleman
|
Net Wars Over Free Speech, Freedom, and Secrecy or How to Understand the Hacker and Lulz Battle Against the Church of Scientology |
|
Neely
|
Radio Reconnaissance in Penetration Testing - All Your RF Are Belong to Us |
|
23:59 |
Steele
|
Spy Improv on Steroids - Steele Uncensored - Anything Goes |
Saturday Night Hacker Cinema |
09:30 |
Cicero,
Muentz,
Schoen
|
The Need for a Computer Crime Innocence Project |
10:00 |
Lewart
|
Hacking Your GPS |
Mudsplatter,
Trick
|
Hacking Terrorist Networks Logically and Emotionally |
|
11:00 |
Huntington
|
Hacking for an Audience: Technology Backstage at Live Shows |
Anderson
|
From Indymedia to Demand Media: Participation, Surveillance, and the Transformation of Journalism |
|
Crowley
|
Lock Bypass without Lockpicks |
|
12:00 |
Blaze,
Cheswick,
Clark
|
Simpsons Already Did It - Where Do You Think the Name "Trojan" Came From Anyway? |
Lapsley
|
Cats and Mice: The Phone Company, the FBI, and the Phone Phreaks |
|
Pei
|
Burning and Building Bridges: A Primer to Hacking the Education System |
|
13:00 |
Silbermintz
|
American Bombe: How the U.S. Shattered the Enigma Code |
Mooney,
Rad
|
The DMCA and ACTA vs. Academic and Professional Research: How Misuse of This Intellectual Property Legislation Chills Research, Disclosure, and Innovation |
|
Toubiana
|
TrackMeNot: Injecting Reasonable Doubt in Everyone’s Queries |
|
14:00 |
Kemp
|
Into the Black: DPRK Exploration |
Informants: Villains or Heroes? |
||
Vasile
|
The Freedom Box: How to Reclaim Privacy on the Web |
|
15:00 |
Harvey
|
CV Dazzle: Face Deception |
Pennasilico
|
Bakeca.it DDoS - How Evil Forces Have Been Defeated |
|
15:30 |
Gweeds
|
Hacking the Food Genome |
16:00 |
Elena,
Smokey,
Williams
|
Hackers without Borders: Disaster Relief and Technology |
Arlen
|
The Black Suit Plan Isn't Working - Now What? |
|
17:00 |
Pogue
|
Sniper Forensics - Changing the Landscape of Modern Forensics and Incident Response |
The HOPE Network |
||
18:00 | Closing Ceremonies |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.