14:30 |
Potter
|
Opening Remarks, Rumblings, and Rants |
15:30 |
Shevinsky
|
Five Not-Totally-Crazy Ways to Build for Usability |
16:00 |
Smith
|
Simple Windows Application Whitelisting Evasionˀ |
16:30 |
Liszka
|
Don’t Look Now! Malicious Image Spam |
17:00 |
Pitts
|
Userland Persistence on Mac OS X "It Just Works" |
17:30 |
Holeman
|
SEWiFi: Building a Security Enhanced WiFi Dongle |
18:00 |
Kallenberg,
Kovah
|
Betting BIOS Bugs Won't Bite Y'er Butt? |
18:30 |
Hall
|
Keynote Address |
10:00 |
Boone,
Ossmann,
Spill
|
NSA Playset: USB Tools |
Dorsey
|
Cockroach Analysis: A Statistical Analysis of the Flash and Java Files that Infest the Internet |
|
Merrill
|
Where the Wild Things Are: Encryption, Police Access & the User |
|
11:00 |
Schuetz
|
Knock Knock: A Survey of iOS Authentication Methods |
DeMott
|
Understanding a New Memory Corruption Defense: Use-after-Free (UaF) Mitigation and Bypass |
|
Benson
|
Analysis of POS Malware |
|
12:00 |
Breen,
Kennedy
|
httpscreenshot - A Tool for Both Teams |
Moore,
Wardle
|
There's Waldo! Tracking Users via Mobile Apps |
|
Schrodinger
|
Quantum Computing 01100101 |
|
14:00 |
Ahmed,
Bohan
|
Automated Binary Analysis with Pin and Python |
Nelms
|
Practical Machine Learning for Network Security |
|
Oppenheim,
Tal
|
Come to the Dark Side - We Have (Misfortune) Cookies |
|
15:00 |
Bernstein,
Lange
|
NaCl: A New Crypto Library |
Behrens,
Hoernecke
|
The Joy Of Intelligent Proactive Security |
|
Conti,
Cross,
Raymond
|
Deception for the Cyber Defender: To Err is Human; to Deceive, Divine |
|
16:00 |
Franklin,
Greene,
Kelsey
|
Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry |
Hovor,
Modi
|
Manually Searching Advisories and Blogs for Threat Data--"Who's Got Time for That?" |
|
Zatko
|
Rethinking Security's Role in CS Education |
|
17:00 |
The Shmoo Group
|
0wn the Con |
Forshaw
|
The Windows Sandbox Paradox |
|
Cardozo,
Opsahl
|
Ask the EFF |
10:00 |
Damsky
|
White is the New Black: Why White Data Really Matters |
Morris
|
No Budget Threat Intelligence: Tracking Malware Campaigns on the Cheap |
|
Wineberg
|
The Mile High Club: Getting Root at 40,000 Feet |
|
11:00 |
Schwabe
|
Eliminating Timing Side-channels. A Tutorial. |
Kasza,
Mahjoub
|
Infrastructure Tracking with Passive Monitoring and Active Probing |
|
Allen,
Cullison,
Rubin
|
Mascots, March Madness & #yogapants: Hacking Goes to College |
|
12:00 |
Pisano
|
The Dark Art of Data Visualization |
Nguyen
|
Micronesia: Sub-kernel Kit for Host Introspection in Determining Insider Threat |
|
Kelsey,
McKay,
Turan
|
How Random is Your RNG? |
|
13:30 |
Fennelly,
Forno,
Laurie,
Potter,
Rogue
|
Get Off My Lawn: Examining Change through the Eyes of The Old Guard |
14:30 |
Potter
|
Closing Remarks |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.