14:00 |
Potter
|
Opening Remarks, Rumblings, Ruminations, and Rants |
15:30 |
Hall,
Ramsey
|
Breaking Bulbs Briskly by Bogus Broadcasts |
16:00 |
Aumasson
|
Crypto and Quantum and Post Quantum |
16:30 |
Filson
|
#thingswikfound #omarax: What is it, and why you may care? |
17:00 |
Wesson
|
Static Malware and SMTP Mail Analysis using General Purpose Graphical Processing Units (GPGPU) |
17:30 |
Gallagher
|
Where Do the Phishers Live? Collecting Phishers’ Geographic Locations from Automated Honeypots |
18:00 |
Pitts
|
Hiding from the Investigator: Understanding OS X and iOS Code Signing to Hide Data |
18:30 |
Gershenfeld
|
Keynote |
10:00 |
Cassidy
|
LostPass: Pixel-perfect LastPass Phishing |
Andrews,
Brody
|
Users Are People Too: How to Make Your Tools Not Suck for Humans |
|
Sandin
|
Exploiting Memory Corruption Vulnerabilities on the FreeRTOS Operating System |
|
11:00 |
Seeber
|
Hacking The Wireless World — Software Defined Radio Exploits |
Eng
|
Software Security by the Numbers |
|
Kalat
|
Online, No One Knows You’re Dead |
|
12:00 |
Vincent
|
(P|G)Ohst Exploitation |
Atkins
|
Using the Algebraic Eraser to Secure Low-Power and Passive IoT Devices |
|
Conti,
Iozzo,
Moss,
Tam,
Wheeler
|
You Ain’t Seen Nothing Yet: New Paradigms for Policy, Regulation, and Community Engagement |
|
14:00 |
Breen
|
The Road to SYSTEM: Recycling Old Vulnerabilities for Unpatched Privilege Escalation and A New Network Attack |
Irwin
|
Speak Security and Enter: Better Ways to Communicate with Non-Technical Users |
|
Ellis,
Leiserson
|
Political Pwnage: The Hacker’s Guide to Cybersecurity Policy |
|
15:00 |
The Shmoo Group
|
0wn the Con |
Bulazel
|
AVLeak: Turning Antivirus Emulators Inside Out |
|
Jover
|
LTE Security and Protocol Exploits |
|
16:00 |
Bohan,
Edwards
|
OSX Vulnerability Research and Why We Wrote Our Own Debugger |
Carr,
Dunwoody
|
No Easy Breach: Challenges and Lessons Learned from an Epic Investigation |
|
3AlarmLampscooter
|
This Message Will Self-Destruct in 10 Seconds: Avoiding Bilateral Enucleation |
|
17:00 |
Moneger
|
Penetration Testing Custom TLS Stacks |
Ruef,
Stevens
|
Attack on Titans: A Survey of New Attacks Against Big Data and Machine Learning |
|
Buddington,
Crocker,
Galperin,
Opsahl
|
Ask the EFF |
10:00 |
Eberhardt,
Weiss
|
Compressed Context Based Analytic Results for Use in Computer Vision System for Network Defense |
Beale
|
Containing an Attack with Linux Containers and AppArmor/SELinux |
|
Armbrust,
Herr
|
Making Milware: An Interdisciplinary Tryst |
|
11:00 |
Paget
|
Be Free, Little GuardBunny! |
Schuetz
|
My Hash is My Passport: Understanding Web and Mobile Authentication |
|
Medina,
Rees
|
Resistance is Futile: SDN Assimilating Our Networks |
|
12:00 |
Koscher
|
Reverse-Engineering Wireless SCADA Systems |
Bambenek
|
Building an Encyclopedia of Malware Configs (to punch miscreants) |
|
Wardle
|
Gatekeeper Exposed |
|
13:00 |
Blaze,
Conti,
Forno,
Foster
|
Closing Plenary: Information Security Programs in Academia |
14:00 |
Potter
|
Closing Remarks |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.