14:00 |
Potter
|
Opening Remarks, Rumblings, Ruminations, and Rants |
15:30 |
Patrick
|
U2F Zero: Secure Hardware Design, DIY Mass Production, and Amazon Prime |
16:00 |
1
|
35 Years of Cyberwar: The Squirrels are Winning |
16:30 |
McElroy
|
Implantable Logic Analyzers and Unlocking Doors |
17:00 |
Dodge
|
Cyborg Self-Hacking: An Examination of Cochlear Implants |
17:30 |
DiLorenzo
|
Introducing Jak: Safely Share Sensitive Files via Git |
18:00 |
Chin,
Muller
|
Can a Drunk Person Authenticate Using Brainwaves? #NotAlcoholicsJustResearchers |
18:30 |
McGraw
|
Keynote: Seven Things: Frank Zappa, T. Coraghassen Boyle, and Twenty-one Years in Security |
20:00 |
Blanchard
|
How to Spoil all Movies and Give an Unforgettable Presentation |
20:20 |
Goodspeed
|
Quick and Dirty Emulation of ARM Firmware |
20:40 |
Clemenko
|
NAVRIE Athena — A graph database solution to unify InfoSec data and workflow |
21:00 |
Vedaa
|
22 Short Films About Security |
21:20 |
Willis
|
Slash AppSec Costs, Free Threat Modeling & Compliance Data Output |
21:40 |
O’Connor
|
You Can Do the Thing! |
10:00 |
Bratus,
Momot
|
LangSec for Penetration Testing: How and Why |
Johnson,
Vanatta
|
A Widening Attack Plain: Threatcasting Tomorrow’s Threats |
|
Knight,
Newlin
|
So You Want to Hack Radios |
|
11:00 |
Williams
|
Know Normal, Find Evil: Windows 10 Edition |
Friedman,
Leiserson,
Mill,
Wilkerson
|
Ask the Feds |
|
Ossmann,
Spill
|
Exploring The Infrared World |
|
12:00 |
Ison,
Redbeard
|
Who Wants to Allow Arbitrary Code Execution on Their Boxes? We Do It Every Day. |
Opsahl
|
Ask the EFF: Protecting Tomorrow |
|
Bratus,
Wu
|
A Context-Aware Kernel IPC Firewall for Android |
|
14:00 |
Alva,
Merrill
|
Goodnight Moon & the House of Horrors: A look at the current IoT ecosystem and the regulations trying to control it |
Clarke,
Miller,
Schedel
|
háček: Computing a Hacker Experience |
|
Clark
|
WaveConverter – An Open Source Software Tool for RF Reverse Engineering |
|
15:00 |
Houser
|
Plug-in Electric Vehicle Fingerprinting: Authentication for Plug-in Electric Vehicles |
Pearce
|
Flailing is Learning: My First Year as a Malware Analyst |
|
Kseib,
Modi
|
I Have a Graph Database. Now What? |
|
16:00 |
Chailytko,
Skuratovich
|
Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in Your Virtualized Environment |
Borisov,
Tan
|
The State of Secure Messaging |
|
The Shmoo Group
|
0wn the Con |
|
17:00 |
Hardy,
Shpantzer
|
Anti-Ransomware: Turning the Tables |
Blaze
|
The Metadata is the Message (and Sometimes the Message is the Metadata) |
|
Kriss,
White
|
User Focused Security at Netflix: Stethoscope |
10:00 |
Creighton
|
Dig Out Your Brick Phone! Bringing AMPS Back with GNU Radio |
Castellucci
|
A Nickel Tour of the Ad Fraud Ecosystem |
|
Biernat
|
ripr – Run Slices of Binary Code from Python |
|
11:00 |
Cardinale
|
Excuse me, Server, Do You Have the Time? |
Kuhr
|
The Threat Intel Results are in… You are NOT the hacker! : Disinformation Campaigns vs. Attribution Claims |
|
Seymour
|
Safety Bot Guaranteed |
|
12:00 |
Gidwani
|
Does a BEAR Leak in the Woods? The Democratic National Committee breach, Russian APTs, and the 2016 U.S. Election |
Karmel,
Wild
|
Challenges and Opportunities: Application Containers and Micro Services |
|
Verschoor
|
(In-)secure messaging with SCIMP and OMEMO |
|
13:00 |
Caswell,
Eagle,
Sorenson,
Thompson,
Vidas,
Wright
|
Designing and Executing the World’s First All-Computer Hacking Competition: A panel with the development team |
14:00 |
Potter
|
Closing Remarks |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.