2014 ShmooCon Proceedings
  • Introduction
  • Foreword
  • ShmooCon
  • The Shmoo Group
  • Editor's Note
  • Schedule
  • ONE TRACK MIND
    • Attacker Ghost Stories
    • CCTV - Setup, Attack Vectors and Laws
    • Security Analytics
  • BUILD IT
    • ADD: Complicating Memory Forensics Through Memory Disarray
    • USBProxy
    • AV-Evasion With the Veil Framework
    • Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instant Messaging Platforms
  • BELAY IT
    • A Critical Review of Spatial Analysis
    • “How I Met Your Mother” or The Brief and Secret History of Bletchley Park and How They Invented Cryp
    • Raising Costs for Your Attackers Instead of Your CFO
    • The “Science of Cyber” and the Next Generation of Security Tools
    • Unambiguous Encapsulation
  • BRING IT ON
    • Arms Race: The Story of (In)-Secure Bootloaders
    • How to Train your Snapdragon: Exploring Power Frameworks on Android
    • Syncing Mentorship Between Winners And Beginners
    • Technology Law Issues for Security Professionals
Powered by GitBook
On this page

BELAY IT

PreviousMalicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instant Messaging PlatformsNextA Critical Review of Spatial Analysis

Last updated 6 years ago

BELAY IT!

    • David Giametta

    • Andrew Potter

    • Benjamin Gatti

    • Aaron Beuhring

    • Kyle Salous

    • Paulo Shakarian

    • Dominic Spill

    • Michael Ossmann

A Critical Review of Spatial Analysis
“How I Met Your Mother” or The Brief and Secret History of Bletchley Park and How They Invented Cryptography and the Computer Age
Raising Costs for your Attackers Instead of your CFO
The “Science of Cyber” and the Next Generation of Security Tools
Unambiguous Encapsulation - Separating Data and Signaling