2014 ShmooCon Proceedings
  • Introduction
  • Foreword
  • ShmooCon
  • The Shmoo Group
  • Editor's Note
  • Schedule
  • ONE TRACK MIND
    • Attacker Ghost Stories
    • CCTV - Setup, Attack Vectors and Laws
    • Security Analytics
  • BUILD IT
    • ADD: Complicating Memory Forensics Through Memory Disarray
    • USBProxy
    • AV-Evasion With the Veil Framework
    • Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instant Messaging Platforms
  • BELAY IT
    • A Critical Review of Spatial Analysis
    • “How I Met Your Mother” or The Brief and Secret History of Bletchley Park and How They Invented Cryp
    • Raising Costs for Your Attackers Instead of Your CFO
    • The “Science of Cyber” and the Next Generation of Security Tools
    • Unambiguous Encapsulation
  • BRING IT ON
    • Arms Race: The Story of (In)-Secure Bootloaders
    • How to Train your Snapdragon: Exploring Power Frameworks on Android
    • Syncing Mentorship Between Winners And Beginners
    • Technology Law Issues for Security Professionals
Powered by GitBook
On this page

BELAY IT

BELAY IT!

  1. A Critical Review of Spatial Analysis

    • David Giametta

    • Andrew Potter

  2. “How I Met Your Mother” or The Brief and Secret History of Bletchley Park and How They Invented Cryptography and the Computer Age

    • Benjamin Gatti

  3. Raising Costs for your Attackers Instead of your CFO

    • Aaron Beuhring

    • Kyle Salous

  4. The “Science of Cyber” and the Next Generation of Security Tools

    • Paulo Shakarian

  5. Unambiguous Encapsulation - Separating Data and Signaling

    • Dominic Spill

    • Michael Ossmann

PreviousMalicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instant Messaging PlatformsNextA Critical Review of Spatial Analysis

Last updated 6 years ago