15:00 |
Potter
|
Opening Remarks |
15:30 |
Ray
|
A Paranoid Schizophrenia-based Model of Data Security |
16:00 |
McNabb
|
Hacking "Smartwater" Wireless Water Networks |
16:30 |
Gavin
|
Gone in 60 Minutes: Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP |
17:00 |
Long
|
? |
17:30 |
Melgares,
Speers
|
ZigBee Security: Find, Fix, Finish |
18:00 |
Whalen
|
Are you receiving me? Recent issues in wifi privacy |
18:30 |
Zatko
|
Keynote - Analytic Framework for Cyber Security |
20:00 | Fire Talks |
10:00 |
Rushing
|
Defending against Targeted attacks using Duck tape, Popsicle Sticks and Legos |
Arzamendi,
Heiland
|
Printer to PWND: Leveraging Multifunction Printers During Penetration Testing |
|
Hofmann
|
Computer Search and Seizure |
|
11:00 |
Friedberg
|
Fun with Flow |
Lanier,
Oberheide
|
TEAM JOCH vs. Android: The Ultimate Showdown |
|
Guiterrez
|
Unlocking the Toolkit: Attacking Google Web Toolkit Applications |
|
12:00 |
Kovach
|
Yet Another Heapspray Detector |
Atlas,
Q,
Smash,
Toast
|
Hop Hacking Hedy |
|
Moulton
|
Hard Drive Paperweight: Recovery from a Seized Motor! |
|
14:00 |
Bratus,
Oakley
|
Exploiting the Hard-Working DWARF |
Smith
|
Printers Gone Wild! |
|
Thomas
|
Tracking Flaws – Stream Reassembly Issues in Snort IPS |
|
15:00 |
Lindiakos,
Pawloski
|
INTERSECT: Combining Commercial/FOSS Tools with Custom Code to Root Out Malware |
Mende,
Rey
|
Attacking 3G and 4G mobile telecommunications networks |
|
Lo
|
An Evite from Surbo? Probably an invitation for trouble. |
|
16:00 |
Ossmann
|
Project Ubertooth: Building a Better Bluetooth Adapter |
Apvrille,
Yang
|
Defeating mTANs for profit |
|
Davidson
|
ShmooCon Labs Goes To College |
|
17:00 |
Klinedinst
|
3D Modeling and Visualization of Real Time Security Events |
Dunlop
|
Reverse Engineering Using the Android Emulator |
|
Coyne
|
The Getaway: Methods and Defenses for Data Exfiltration |
|
20:00 | Fire Talks |
10:00 |
Eisenbarth
|
Half Baked: Hardware Hacking Mixed with Sweet Software Reverse Engineering |
Crowley
|
URL Enlargement: Is it for You? |
|
Larimer
|
USB Autorun attacks against Linux |
|
11:00 |
Quist
|
Visual Malware Reversing: How to Stop Reading Assembly and Love the Code |
Crenshaw
|
Malicious USB Devices:Is that an attack vector in your pocket or are you just happy to see me? |
|
Sanchez
|
Hacking the Business Capability Stack: Make Corporate Bureaucracy Work for You |
|
12:00 |
Potter
|
0wn the Con |
Weidman
|
Transparent Botnet Control for Smartphones Over SMS |
|
Edwards
|
Inside the App: All Your Data are Belong to Me |
|
13:30 |
Bos,
Imhoff,
Redman,
Schuetz
|
The Past, Present, and Future of "Something You Know" |
14:00 |
Potter
|
Closing Remarks |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.