2014 ShmooCon Proceedings
  • Introduction
  • Foreword
  • ShmooCon
  • The Shmoo Group
  • Editor's Note
  • Schedule
  • ONE TRACK MIND
    • Attacker Ghost Stories
    • CCTV - Setup, Attack Vectors and Laws
    • Security Analytics
  • BUILD IT
    • ADD: Complicating Memory Forensics Through Memory Disarray
    • USBProxy
    • AV-Evasion With the Veil Framework
    • Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instant Messaging Platforms
  • BELAY IT
    • A Critical Review of Spatial Analysis
    • “How I Met Your Mother” or The Brief and Secret History of Bletchley Park and How They Invented Cryp
    • Raising Costs for Your Attackers Instead of Your CFO
    • The “Science of Cyber” and the Next Generation of Security Tools
    • Unambiguous Encapsulation
  • BRING IT ON
    • Arms Race: The Story of (In)-Secure Bootloaders
    • How to Train your Snapdragon: Exploring Power Frameworks on Android
    • Syncing Mentorship Between Winners And Beginners
    • Technology Law Issues for Security Professionals
Powered by GitBook
On this page
  • ONE TRACK MIND
  • BUILD IT
  • BELAY IT
  • BRING IT ON

Schedule

PreviousEditor's NoteNextONE TRACK MIND

Last updated 6 years ago

ONE TRACK MIND

    • Rob Fuller

    • Joshua Schroeder

    • Spencer Brooks

  1. The Dissipation of Hackers in the Enterprise

    • Weasel

  2. The Evolution of Linux Kernel Module Signing

    • Rebecca “.bx” Shapiro

  3. How Hackers for Charity (possibly) Saved me a LOT of Money

    • Branden Miller

    • Emily Miller

    • Aaron Gee-Clough

BUILD IT

    • Jake Williams

    • Alissa Torres

    • Dominic Spill

    • Christopher Truncer

    • TheGrayhound

    • Michael Wright

  1. Controlling USB Flash Drive Controllers: Expose of Hidden Features

    • Richard Harman

  2. Genuinely “Trusted Computing”: Free and Open Hardware Security Modules

    • Ryan Lackey

  3. Introducing idb - Simplified Blackbox iOS App Pentesting

    • Daniel A. Mayer

    • Jaime Sanchez

    • Pablo San Emeterio

  4. SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography

    • Daniel J. Bernstein

    • Tanja Lange

  5. unROP: A Tool for In-Memory ROP Exploitation Detection and Traceback

    • Kang Li

    • Xiaoning Li

    • Lee Harrison

BELAY IT

    • David Giametta

    • Andrew Potter

  1. Data Whales and Troll Tears: Beat the Odds in InfoSec

    • Davi Ottenheimer

    • Allison Miller

    • Benjamin Gatti

  2. Introducing DARPA’s Cyber Grand Challenge

    • Mike Walker

  3. Operationalizing Threat Information Sharing: Beyond Policies and Platitudes

    • Sean Barnum and Aharon Chernin

  4. Practical Applications of Data Science in Detection

    • Mike Sconzo

    • Brian Wylie

    • Aaron Beuhring

    • Kyle Salous

    • Paulo Shakarian

  5. Timing-Based Attestation: Sexy Defense, or the Sexiest

    • Xeno Kovah

    • Corey Kallenberg

    • John Butterworth

    • Dominic Spill

    • Michael Ossmann

BRING IT ON

  1. Abusing ACPI Control Methods

    • Assambly

    • Lee Harrison

    • Kang Li

    • Josh “m0nk” Thomas

  2. LTE vs. Darwin

    • Hendrik Schmidt

    • Brian Butterly

  3. Malicious Online Activities Related to the 2012 U.S. General Election

    • Joshua Franklin

    • Robert Tarlecki

    • Matthew Jablonski

  4. The NSA: Capabilities and Countermeasures

    • Bruce Schneier

    • Tarah Wheeler Van Vlack

    • Liz Dahlstrom

    • Shannon Brown

  5. Vehicle Forensics - The Data Beyond the Dashboard

    • Courtney Lancaster

  6. You Don’t Have the Evidence

    • Scott Moulton

Attacker Ghost Stories: Mostly Free Defenses That Give Attackers Nightmares
CCTV: Setup, Attack Vectors, and Laws
Security Analytics: Less Hype, More Data
ADD – Complicating Memory Forensics Through Memory Disarray
An Open and Affordable USB Man in the Middle Device
AV Evasion with the Veil Framework
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instant Messaging Platforms
A Critical Review of Spatial Analysis
“How I Met Your Mother” or The Brief and Secret History of Bletchley Park and How They Invented Cryptography and the Computer Age
Raising Costs for your Attackers Instead of your CFO
The “Science of Cyber” and the Next Generation of Security Tools
Unambiguous Encapsulation - Separating Data and Signaling
Arms Race: The Story of (In)-Secure Bootloaders
How to Train your Snapdragon: Exploring Power Frameworks on Android
Syncing Mentorship Between Winners And Beginners
Technology Law Issues for Security Professionals