ShmooCon VII - 2011 - Friday, January 28
15:00
Potter
Opening Remarks
15:30
Ray
A Paranoid Schizophrenia-based Model of Data Security
16:00
McNabb
Hacking "Smartwater" Wireless Water Networks
16:30
Gavin
Gone in 60 Minutes: Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP
17:00
Long
?
17:30
Melgares, Speers
ZigBee Security: Find, Fix, Finish
18:00
Whalen
Are you receiving me? Recent issues in wifi privacy
18:30
Zatko
Keynote - Analytic Framework for Cyber Security
20:00
Fire Talks
ShmooCon VII - 2011 - Saturday, January 29
10:00
Rushing
Defending against Targeted attacks using Duck tape, Popsicle Sticks and Legos
Arzamendi, Heiland
Printer to PWND: Leveraging Multifunction Printers During Penetration Testing
Hofmann
Computer Search and Seizure
11:00
Friedberg
Fun with Flow
Lanier, Oberheide
TEAM JOCH vs. Android: The Ultimate Showdown
Guiterrez
Unlocking the Toolkit: Attacking Google Web Toolkit Applications
12:00
Kovach
Yet Another Heapspray Detector
Atlas, Q, Smash, Toast
Hop Hacking Hedy
Moulton
Hard Drive Paperweight: Recovery from a Seized Motor!
14:00
Bratus, Oakley
Exploiting the Hard-Working DWARF
Smith
Printers Gone Wild!
Thomas
Tracking Flaws – Stream Reassembly Issues in Snort IPS
15:00
Lindiakos, Pawloski
INTERSECT: Combining Commercial/FOSS Tools with Custom Code to Root Out Malware
Mende, Rey
Attacking 3G and 4G mobile telecommunications networks
Lo
An Evite from Surbo? Probably an invitation for trouble.
16:00
Ossmann
Project Ubertooth: Building a Better Bluetooth Adapter
Apvrille, Yang
Defeating mTANs for profit
Davidson
ShmooCon Labs Goes To College
17:00
Klinedinst
3D Modeling and Visualization of Real Time Security Events
Dunlop
Reverse Engineering Using the Android Emulator
Coyne
The Getaway: Methods and Defenses for Data Exfiltration
20:00
Fire Talks
ShmooCon VII - 2011 - Sunday, January 30
10:00
Eisenbarth
Half Baked: Hardware Hacking Mixed with Sweet Software Reverse Engineering
Crowley
URL Enlargement: Is it for You?
Larimer
USB Autorun attacks against Linux
11:00
Quist
Visual Malware Reversing: How to Stop Reading Assembly and Love the Code
Crenshaw
Malicious USB Devices:Is that an attack vector in your pocket or are you just happy to see me?
Sanchez
Hacking the Business Capability Stack: Make Corporate Bureaucracy Work for You
12:00
Potter
0wn the Con
Weidman
Transparent Botnet Control for Smartphones Over SMS
Edwards
Inside the App: All Your Data are Belong to Me
13:30
Bos, Imhoff, Redman, Schuetz
The Past, Present, and Future of "Something You Know"
14:00
Potter
Closing Remarks


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.