10:00 |
Rioux
|
Keynote – The Security Industry - How to Survive Becoming Management |
11:00 |
Levomäki,
McDevitt,
Niemi,
Shah,
Shaw
|
Discovering Dark Matter: Towards better Android Malware Heuristics |
Rodzon
|
Diamonds, Fitness and Cults: Manipulation for Fun and Profit |
|
Hay
|
Never Mind Your Diet, Cut the Crap From Your Vocabulary [Mentored by Brian Martin] |
|
Kopchak
|
Attacking and Defending Full Disk Encryption |
|
Jogi
|
You Are Being Watched! |
|
12:00 |
Radcliffe
|
Mom! I Broke My Insulin Pump….Again! |
Bellis,
Roytman
|
Vulnerability & Exploit Trends: A Deep Look Inside The Data |
|
Tallah
|
The 7 habits of highly effective CISOs [Mentored by Wendy Nather] |
|
Sistrunk
|
Say It To My Face |
|
Smith
|
Calling All Researchers: A Discussion on Building a Security Research Framework |
|
13:00 |
Davidson,
Schiffman
|
Dungeons & Dragons, Siege Warfare, and Fantasy Defense in Depth |
Grecs
|
EC2 or Bust – How to Build Your Own Pen Testing Lab in Amazon EC2 |
|
Quix0te
|
The Little Dutch Boy [Mentored by Bill E. Ghote] |
|
Hutton
|
Alex Dreams of Risk: How the Concept of Being a Craftsman Can Help You Find Meaning and Avoid Burnout. |
|
Nibbelink,
Payne
|
Evil Empire: SIEM FTW |
|
15:30 |
Malone
|
HiveMind: Distributed File Storage Using JavaScript Botnets |
Hay
|
Techniques for Escaping the AppSec Labyrinth |
|
FailOpen
|
Human Blue Teaming (Learning to patch the vulnerabilities in ourselves) [Mentored by Jimmy Shah] |
|
Banks,
Woods
|
GTFO FTW: Hacking Your Lifestyle for Fun and Profit |
|
Roll-your-own Lightning Talks (Wed) |
||
16:30 |
WiK
|
gitDigger: Creating useful wordlists from public GitHub repositories |
Daniel
|
The Erudite Inebriate’s Guide to Life, Liberty, and the Purfuit of Happinefs |
|
Renegade6
|
Stop Shooting Blanks – No magic bullets in your arsenal [Mentored by Nicolle Neulist] |
|
Campbell,
Campbell
|
You Can’t Make People Act More Securely, You Can Help Them Want To. |
|
17:30 |
Kottmann,
Steele
|
Collaborative Penetration Testing With Lair |
Adams
|
Hack the Hustle! Career Strategies for Information Security Professionals |
|
Ward
|
Flameout – Burnout Supernova [Mentored by Ally Miller] |
|
Murray,
Zhang
|
Your Droid Has No Clothes |
|
18:30 |
Fox
|
Social Aftermath – Responding to Social Pwnage |
Mills
|
Information Sharing, or “I’ve got 99 problems and they’re probably pretty similar to yours” |
|
Sweet
|
The Sensual Side of 3D Printing [Mentored by Javvad Malik] |
|
19:30 | Closing notes and raffle (Wed) |
|
20:30 | Special Presentation |
10:00 |
Blue
|
Keynote - Silence Equals Death |
11:30 |
Corman,
Percoco
|
The Cavalry Isn’t Coming: Starting the Revolution to Fsck it All! |
Sokol
|
Convincing Your Management, Your Peers, and Yourself That Risk Management Doesn’t Suck |
|
Slibermintz
|
Fun with WebSockets using Socket Puppet [Mentored by Weasel] |
|
Linn
|
Swiping Cards At The Source: POS & Cash Machine Security |
|
Krypt3ia
|
Attribution Shmatribution! FIX YOUR SHIT! |
|
12:30 |
Gough,
Levomäki,
Niemi,
Robertson
|
A fire in the eye |
Malik
|
How embracing social media helped me stop the hackers, save the world and get the girl! |
|
Pinto
|
Using Machine Learning to support Information Security [Mentored by Joel Wilbanks] |
|
Busticating Same-Origin: The Fun Way |
||
Daniel,
Hulme,
Mortman,
Ottenheimer,
Umerley,
Werby
|
Breach Panel |
|
15:00 |
Artes
|
Defense Evasion Modeling |
Elisan
|
Malware Automation |
|
Siegel
|
The Truth, You Thought We Wouldn’t Know? [Mentored by Terry Gold] |
|
TProphet
|
OMFG China! |
|
Roll-your-own Lightning Talks (Thurs) |
||
16:00 |
Gough
|
“Malware Management Framework” – We detected WinNTI with it! |
Kita
|
Popping the Penguin: An Introduction to the Principles of Linux Persistence |
|
Kovacic,
Sperli
|
Vulnerabilities in Application Whitelisting: Malware Case Studies [Mentored by Brav0hax] |
|
Auerbach,
Galperin,
Jaycox,
Opsahl
|
Ask the EFF Panel |
|
17:00 |
Werby
|
Crunching the Top 10,000 Web |
Costello
|
Network Survival WCS |
|
Ebony
|
The Goodness is Baked In: Baking Assurance into Software [Mentored by Davi Ottenheimer] |
|
Matwyshyn
|
Catawampus |
|
18:00 |
Thieme
|
Governments and UFOs: A Historical Analysis of Disinformation and Deception |
Beardsley,
d’Otreppe
|
The Slings and Arrows of Open Source Security |
|
Panchmahalkar
|
Matriux Leandros – An Open Source Penetration Testing and Forensic Distribution [Mentored by Savant42] |
|
Riley
|
Mobile Fail: Cracking open “secure” android containers |
|
19:00 |
Dudley,
Gough,
Robertson
|
Strange interactions in personal data: Brokers and the CFAA. |
Fak3r
|
What if Petraeus was a hacker? Email privacy for the rest of us. |
|
Moore
|
Sixteen Colors: Archiving the Evolution of ANSI and ASCII Art [Mentored by Brendan O'Connor] |
|
Soldier of Fortune
|
Legacy 0-Day: How Hackers Breached the Logica Mainframe |
|
20:00 | Closing notes and raffle (Thur) |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.