2015 S­hmooCo­n Proc­eeding­s
  • Introduction
  • Foreword
  • ShmooCon
  • The Shmoo Group
  • Editor's Note
  • Schedule
  • ONE TRACK MIND
    • Building for Usability
    • Simple Windows Application Whitelisting Evasion
    • Don't Look Now! Malicious Image Spam
    • Userland Persistence on Mac OS X
  • BUILD IT
    • NSA Playset: USB Tools
    • Knock Knock: A Survey of iOS Authentication Methods
    • Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry
    • Eliminating Timing Side-channels. A Tutorial
  • BELAY IT
    • Cockroach Analysis
    • Pratical Machine Learning for Network Security
    • Infrastructure Tracking with Passive Monitoring and Active Probing
    • Micronesia
  • BRING IT ON
    • 2014 Analysis of POS Malware
    • Deception for the Cyber Defender
    • Rethinking the Role of Security in Undergraduate Education
    • Mascots, March Madness & #yogapants: Hacking goes to College
    • How Random is Your RNG?
Powered by GitBook
On this page

Introduction

Proceedings of the 11th ShmooCon Information Security Conference

Editor: Rob Fuller

© 2015 Individual Authors, ShmooCon Press All rights reserved.

No part of this publication may be reproduced without prior written permission of the publisher. Individual authors of papers and presentations are solely responsible for all materials submitted for the publication. All opinions expressed in the book are of the authors and do not reflect those of the editors.

Photo credits: Unless stated otherwise, all images © the authors.

ShmooCon Press Washington, DC www.shmoocon.org ISBN XXX-X-XXXXX-XXX-X

NextForeword

Last updated 6 years ago