09:30 | boot |
|
10:00 |
Harmat,
Stroud
|
Red Ops: Scaling & Automating Your Pwnage |
Montenegro
|
Economics of Information Security |
|
Dewey
|
Cluster Pi |
|
10:30 |
Wood
|
Let’s Check Let’s Encrypt: A Tool for Code-Driven Threat Modeling |
11:00 |
Testa
|
Bitclamp: A Permanent and Anonymous Publishing Platform Over Bitcoin |
Schuetz
|
A (not so quick) Primer on iOS Encryption |
|
Turner
|
How to Hug a Hacker |
|
11:30 |
Kershaw
|
Bringing a project back from hibernation – Reviving Kismet |
12:00 |
Cardozo
|
Keynote |
14:00 |
Arnold
|
How Secure is your Linux Distro? |
Jami
|
Exploring SecAccessControl Obj in iOS 9 Keychain |
|
Szymaniak
|
BSidesROC CTF: QA Session |
|
14:30 |
Sanders
|
The Life and Times of Hans Ostmaster |
15:00 |
Brockway
|
Enterprise Class Threat Management like a Boss |
Geiger
|
Android Application Function Hooking with Xposed |
|
Dean
|
Real security incidents, unusual situations |
|
15:30 |
Sobell
|
Letting the Crap Out of the Bag: Adventures Disclosing IoT Bugs |
16:00 |
Kerr
|
Passive detection doesn’t work: lessons from a hunter of elusive nation-states |
Piazza
|
Fault Tolerant Command and Control Networks |
|
King
|
CSRF Attack & Defense |
|
16:30 |
Kirkpatrick
|
I Know Where You Live: Privacy Issues in Location-Based Apps |
17:00 |
Allen
|
Let’s Go To The Movies! |
Holub
|
Deconstructing The Cyber Kill Chain of Angler Exploit Kit |
|
Foley
|
Counter UAS (C-UAS) |
|
17:30 |
Sparrell
|
eSDP – Rings Around Things in the Cloud |
18:00 | Closing Ceremony |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.