2014 ShmooCon Proceedings
  • Introduction
  • Foreword
  • ShmooCon
  • The Shmoo Group
  • Editor's Note
  • Schedule
  • ONE TRACK MIND
    • Attacker Ghost Stories
    • CCTV - Setup, Attack Vectors and Laws
    • Security Analytics
  • BUILD IT
    • ADD: Complicating Memory Forensics Through Memory Disarray
    • USBProxy
    • AV-Evasion With the Veil Framework
    • Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instant Messaging Platforms
  • BELAY IT
    • A Critical Review of Spatial Analysis
    • “How I Met Your Mother” or The Brief and Secret History of Bletchley Park and How They Invented Cryp
    • Raising Costs for Your Attackers Instead of Your CFO
    • The “Science of Cyber” and the Next Generation of Security Tools
    • Unambiguous Encapsulation
  • BRING IT ON
    • Arms Race: The Story of (In)-Secure Bootloaders
    • How to Train your Snapdragon: Exploring Power Frameworks on Android
    • Syncing Mentorship Between Winners And Beginners
    • Technology Law Issues for Security Professionals
Powered by GitBook
On this page

Introduction

Proceedings of the 10th ShmooCon Information Security Conference

Editor: James Arlen Assistant Editors: Rob Fuller

© 2014 Individual Authors, ShmooCon Press All rights reserved.

No part of this publication may be reproduced without prior written permission of the publisher. Individual authors of papers and presentations are solely responsible for all materials submitted for the publication. All opinions expressed in the book are of the authors and do not reflect those of the editors.

Photo credits: Unless stated otherwise, all images © the authors.

ShmooCon Press Washington, DC www.shmoocon.org ISBN XXX-X-XXXXX-XXX-X

NextForeword

Last updated 6 years ago