2015 ShmooCon Proceedings
Search…
Introduction
Foreword
ShmooCon
The Shmoo Group
Editor's Note
Schedule
ONE TRACK MIND
BUILD IT
BELAY IT
BRING IT ON
Powered By
GitBook
Schedule
ONE TRACK MIND
1.
Five Not-Totally-Crazy Ways to Build for Usability
Elissa Shevinsky
2.
Simple Windows Application Whitelisting Evasion
Casey Smith
3.
Don't Look Now! Malicious Image Spam
Kathy Liszka
4.
Userland Persistence on Mac OS X - "It Just Works"
Joshua Pitts
5.
SEWiFi: Building a Security Enhanced WiFi Dongle
Ryan Holeman
6.
Betting BIOS Bugs Won't Bite Y'er Butt?
Xeno Kovah
Corey Kallenberg
BUILD IT!
1.
NSA Playset: USB Tools
Dominic Spill
Michael Ossmann
Jared Boone
2.
Knock Knock: A Survey of iOS Authentication Methods
David Schuetz
3.
httpscreenshot - A Tool for Both Teams
Steve Breen
Justin Kennedy
4.
Automated Binary Analysis with Pin and Python
Omar Ahmed
Tyler Bohan
5.
NaCl: A New Crypto Library
Daniel J. Bernstein
Tanja Lange
6.
Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry
Kristen K. Greene
Joshua Franklin
John Kelsey
7.
0wn the Con
The Shmoo Group
8.
White is the New Black: Why White Data Really Matters
Irena Damsky
9.
Eliminating Timing Side-channels. A Tutorial
Peter Schwabe
10.
The Dark Art of Data Visualization
David Pisano
BELAY IT!
1.
Cockroach Analysis: A Statistical Analysis of the Flash and Java Files that Infest the Internet
David Dorsey
2.
Understanding a New Memory Corruption Defense: Use-after-Free (UaF) Mitigation and Bypass
Jared DeMott
3.
There's Waldo! Tracking Users via Mobile Apps
Colby Moore
Patrick Wardle
4.
Practical Machine Learning for Network Security
Terry Nelms
5.
The Joy Of Intelligent Proactive Security
Scott Behrens
Andy Hoernecke
6.
Manually Searching Advisories and Blogs for Threat Data--"Who's Got Time for That?"
Elvis Hovor
Shimon Modi
7.
The Windows Sandbox Paradox
James Forshaw
8.
No Budget Threat Intelligence: Tracking Malware Campaigns on the Cheap
Andrew Morris
9.
Infrastructure Tracking with Passive Monitoring and Active Probing
Anthony Kasza
Dhia Mahjoub
10.
Micronesia: Sub-kernel Kit for Host Introspection in Determining Insider Threat
Loc Nguyen
BRING IT ON!
1.
Where the Wild Things Are: Encryption, Police Access & the User
Whitney Merrill
2.
Analysis of POS Malware
Brandon Benson
3.
Quantum Computing 01100101
Tess Schrodinger
4.
Come to the Dark Side--We Have (Misfortune) Cookies
Lior Oppenheim
Shahar Tal
5.
Deception for the Cyber Defender: To Err is Human; to Deceive, Divine
Tom Cross
David Raymond
Gregory Conti
6.
Rethinking Security's Role in Computer Science Education
Sarah Zatko
7.
Ask the EFF
Kurt Opsahl
Nate Cardozo
8.
Crypto Without Computers
Ben Agre
9.
Mascots, March Madness & #yogapants: Hacking Goes to College
Chris Cullison
Zack Allen
Avi Rubin
10.
How Random is Your RNG?
Meltem Sˆnmez Turan
John Kelsey
Kerry McKay
Previous
Editor's Note
Next
ONE TRACK MIND
Last modified
3yr ago
Copy link
Contents
ONE TRACK MIND
BUILD IT!
BELAY IT!
BRING IT ON!