15:00 |
Fleischer
|
Opening Remarks |
16:00 |
Fiterman
|
GPU vs. CPU Supercomputing Security Shootout |
16:30 |
Fagan,
Ligh
|
Information disclosure via P2P networks: Why stealing an identity via Gnutella is like clubbing baby seals |
17:00 |
Gourneau
|
Economics of Cyber Crime |
17:30 |
Johnston
|
Windows File Pseudonyms |
18:00 |
Kaur
|
Learning by Breaking: A New Project for Insecure Web Applications |
18:30 |
Steward,
Weigand
|
Guest Stealing...The VMware Way |
19:00 |
Chuvakin,
Daniel
|
Keynote - Closing the TLS Authentication Gap |
10:00 |
Palka
|
Jsunpack-network Edition Release: JavaScript Decoding and Intrusion Detection |
Navas
|
The New World of Smartphone Security - What Your iPhone Disclosed About You |
|
Cecchetti,
Goldberg,
Gutierrez
|
Detection of rogue access points using clock skews: does it really work? |
|
11:00 |
Gragido,
Pirc
|
WLCCP - Analysis of a Potentially Flawed Protocol |
Ames,
Farina,
Warner
|
Social Zombies II: Your Friends Need More Brains |
|
Manley
|
Flying Instruments-Only: Legal and Privacy Issues in Cloud Computing |
|
12:00 |
Rey,
Roeschke
|
WiFi Bombs shaken not stirred |
Holt,
Jabbusch
|
GSM: SRSLY? |
|
Jagdale
|
Tales from the Crypto |
|
14:00 |
Lorenzin
|
Build your own Predator UAV @ 99.95% Discount |
Brasefield
|
How To Be An RSol: Effective Bug Hunting in Solaris |
|
Ragsdale
|
De Gustibus - Adventures in Hacking Taste |
|
15:00 |
Sutton
|
Ring -1 vs. Ring -2: Containerizing Malicious SMM Interupt Handlers on AMD-V |
Zaborowski
|
Bluetooth Keyboards: Who Owns Your Keystrokes? |
|
Markowsky,
Morehouse
|
Cyborg Information Security: Defense Against the Dark Arts |
|
16:00 |
Barnett,
Hay,
Santarcangelo,
Wilson
|
honeyM: A Framework For Virtual Mobile Device Honeyclients |
Fasel
|
BaSO4: A Dynamic Dataflow Analysis Tool for Auditing and Reversing |
|
TheX1le
|
Recovering Evidentiary Artifacts from Virtual Machines and Hypervisor Environments |
|
17:00 |
Vega
|
DIY Hard Drive Diagnostics: Understanding a Broken Drive |
Kingtuna
|
A Tale of Infrastructural Weaknesses in Distributed Wireless Communication Services |
|
Anonymous
|
The Splendiferous Story of Archive Team and the Rapidly Disappearing Digital Heritage |
10:00 |
Phatak
|
Blackberry Mobile Spyware - The Monkey Steals the Berries |
McRee
|
Exposed | More: Attacking the Extended Web |
|
Crowley,
Wood
|
Becoming Jack Flack: Real Life Cloak & Dagger |
|
11:00 |
Hawthorn,
Hillman,
Holyfield,
Poor
|
PCI: An Existential Threat To Security As We Know It |
Ames,
OConnor
|
The Friendly Traitor: Our Software Wants to Kill Us |
|
Shields
|
Back to the Glass House |
|
12:00 | 0wn the Con |
|
Grunzweig
|
Cracking the Foundation: Attacking WCF Web Services |
|
Jacobs
|
Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications |
|
13:30 |
Nohl
|
Better Approaches to Physical Tamper Detection |
14:00 |
Fleischer
|
Closing Remarks |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.