12:00 |
Kim
|
Opening Keynote |
13:00 |
Miller
|
Games We Play: Payoffs & Chaos Monkeys |
Valasek
|
CANCELLED - An Examination of String Allocations in Internet Explorer 9 |
|
Eduardo,
Linn,
Santos
|
Rise in ATM Compromises |
|
Wisniewski
|
Inside the Black Hole Exploit Kit (BHEK) |
|
14:00 |
Permeh
|
CANCELLED - I Built My House On Sand - Embedded Security at the Firmware Layer |
Lanier
|
Android App Pitfalls |
|
Claudius
|
Attacking Cloud Services with Source Code |
|
Jaquith
|
Bring Your Own Device: Keeping it Simple and Effective |
|
15:30 |
Dai Zovi
|
Strategic Analysis of the iOS Jailbreak Development Community |
Chow
|
JavaScript Pitfalls |
|
Florer
|
The Base Rate Fallacy: Information Security Needs To Understand This. |
|
16:30 |
Cran
|
Speed Networking |
Rioux
|
CANCELLED - Let's Write Some IOS Malware |
|
Wysopal
|
We have seen the future, and it is not pretty |
|
Baldet
|
Suicide Risk Assessment and Intervention Tactics |
10:00 |
Geer,
Thieme
|
Fireside Chat with Dan Geer and Richard Thieme |
11:00 |
Cohen
|
Theory and Application of Realistic Capture the Flag Competitions |
Nye
|
Third Party Security Assurance: The Service Provider Perspective |
|
Cross
|
Insider Threat: Hunting for Authorized Evil |
|
13:30 |
Cran
|
Pwnie Express presents Practical MitM Pentesting |
Carielli,
Curry
|
Distributed Security: Expanding the Toolkit for Institutional Resilience |
|
14:30 |
Diaz
|
Birds, bots and machines - Fraud in Twitter and how to detect it using Machine Learning Techniques |
Nather
|
Analyzing the Chemistry of Data |
|
16:00 |
Ternus
|
Adversarial Resilience at the Planetary Scale |
Whitsitt
|
"Cyber" Momentum: Understanding & Leveraging the National Cybersecurity Policy Debate |
|
Linn,
Ryan
|
Hooked on Packets: Reading Pcaps for D students |
|
17:00 |
Kouns
|
Big Data? Big Liability! |
Goerlich
|
Punch and Counter-punch with .Net Apps |
|
Maske
|
"Hacking Back" is a Bad Idea |
10:00 |
Ellis
|
Herding Lizards: How to avoid Security Subsistence Syndrome |
11:00 |
Skoudis
|
Kinetic Pwnage: Obliterating the Line Between Computers and the Physical World |
Crowley
|
No-Knowledge Crypto Attacks |
|
13:30 |
Jacobs,
Rudis
|
Data Analysis and Visualization for Security Professionals |
Schuetz
|
Protecting sensitive information on iOS devices |
|
Rege
|
Adversarial Decision Making in Critical Infrastructure Cyberattacks |
|
14:30 |
Towne
|
A Brief History of Physical Security - Schuyler Towne |
Jackson
|
Blitzing with your Defense |
|
Claudius,
Jackson,
Montoro
|
HTTP Header Hunting - A Behavioral Approach to Malware Detection |
|
15:30 |
Dragorn,
Kershaw,
Ossmann
|
Building Your Own Packet Capture Platform |
Geer,
Hay
|
Facilitating Fluffy Forensics (a.k.a. Considerations for Cloud Forensics) |
|
Sobell
|
Attacking NFC Mobile Wallets: Where Trust Breaks Down |
|
16:30 | Wait! Wait! Don't Pwn Me! |
|
17:30 | Closing Remarks |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.