11:00 |
Valasek
|
The Ghost of Security Past |
Goetzman
|
GATTACA - Final Warning! |
|
11:30 |
Bugher
|
Detecting Bluetooth Surveillance Systems |
12:00 |
Ocepek
|
Synspotting for Teenagers and Real Swinging Adults |
Smith
|
Curry and TARTS: A new technique for avoiding side-channel attacks on cryptosystems |
|
12:30 |
Brand,
Erven
|
Medical Device Security: An Infectious Disease |
13:00 |
Espinoza
|
Week to Weak: Weaponization of Vulnerabilities |
Litke
|
Giving a LUKS. Learning to encrypt your data properly. |
|
13:30 |
Rennie
|
The Right to be Forgotten - Now the EU, Tomorrow the World? |
14:00 |
Beardsley,
egypt
|
Wanna Cyber? |
15:00 |
Linn
|
Vomiting Shells: Tracking the Splatter Patterns |
nkryptr
|
MMORPG (Massively Multiplayer Online Real-world Political Gamechanging) |
|
15:30 |
Jakubowski,
Tomek
|
Explore that which can not be explored |
17:00 |
Richards
|
Firmware Vulnerability Analysis |
Merrill
|
Hacking the CFAA: What You Need to Know, What’s Happening, and Where It’s Going. |
|
17:30 |
Macedo,
Oliveira
|
Bypassing the Secure Desktop Protections |
18:00 |
FuzzyNop
|
Pwning People Personally |
Shaw
|
How to Grow a Hacker |
|
18:30 |
Wood
|
Threat Modeling in the Gaming Industry |
11:00 |
Callas
|
Everything You Need to Know About Crypto in 50 minutes |
11:30 |
Lakhani
|
Killing them Softly – Hunting on DarkNet |
12:00 |
Havelt
|
The Bad, The Worse, and The Ugly - No Hope for POS Security |
Bambenek
|
We Don't Need Another Damn Whitepaper: Going Kinetic on Cybercrime Networks on a Budget |
|
12:30 |
Martinez
|
GSM Sucks: Detecting IMSI Catchers |
13:00 |
Brutti
|
Cartero - Another Social Engineering Framework |
admford
|
Hacking Citizens United, or How to Influence Elections on a Budget |
|
13:30 |
Bryan
|
Card skimming using a RaspberryPi |
15:00 |
Bong
|
Building a Poor Man’s RFID Cloner |
Czarnik
|
Being a Victim can be a Crime [Ain’t Losin’ Data a Breach?] |
|
15:30 |
Eberhardt,
Weiss
|
One Step Closer to the Matrix: Machine Learning and Augmented Reality in Networking Defense |
16:00 |
Daniel
|
InfoSec: What we know, and what we need to know. |
17:00 |
Claudius,
Myers
|
Trojaned Gems - You can’t tell you’re using one! |
Jordan,
Schmitt
|
Wireless Drone Strikes Episode II: Attack of the Drones! |
|
17:30 |
Stillig
|
Compliance kills the security star - Why security standards kill security! |
18:00 |
Street
|
BREAKING in BAD! (I’m the one who doesn’t knock) |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.