2015 S­hmooCo­n Proc­eeding­s
  • Introduction
  • Foreword
  • ShmooCon
  • The Shmoo Group
  • Editor's Note
  • Schedule
  • ONE TRACK MIND
    • Building for Usability
    • Simple Windows Application Whitelisting Evasion
    • Don't Look Now! Malicious Image Spam
    • Userland Persistence on Mac OS X
  • BUILD IT
    • NSA Playset: USB Tools
    • Knock Knock: A Survey of iOS Authentication Methods
    • Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry
    • Eliminating Timing Side-channels. A Tutorial
  • BELAY IT
    • Cockroach Analysis
    • Pratical Machine Learning for Network Security
    • Infrastructure Tracking with Passive Monitoring and Active Probing
    • Micronesia
  • BRING IT ON
    • 2014 Analysis of POS Malware
    • Deception for the Cyber Defender
    • Rethinking the Role of Security in Undergraduate Education
    • Mascots, March Madness & #yogapants: Hacking goes to College
    • How Random is Your RNG?
Powered by GitBook
On this page
  • ONE TRACK MIND
  • BUILD IT!
  • BELAY IT!
  • BRING IT ON!

Schedule

PreviousEditor's NoteNextONE TRACK MIND

Last updated 6 years ago

ONE TRACK MIND

    • Elissa Shevinsky

    • Casey Smith

    • Kathy Liszka

    • Joshua Pitts

  1. SEWiFi: Building a Security Enhanced WiFi Dongle

    • Ryan Holeman

  2. Betting BIOS Bugs Won't Bite Y'er Butt?

    • Xeno Kovah

    • Corey Kallenberg

BUILD IT!

    • Dominic Spill

    • Michael Ossmann

    • Jared Boone

    • David Schuetz

  1. httpscreenshot - A Tool for Both Teams

    • Steve Breen

    • Justin Kennedy

  2. Automated Binary Analysis with Pin and Python

    • Omar Ahmed

    • Tyler Bohan

  3. NaCl: A New Crypto Library

    • Daniel J. Bernstein

    • Tanja Lange

    • Kristen K. Greene

    • Joshua Franklin

    • John Kelsey

  4. 0wn the Con

    • The Shmoo Group

  5. White is the New Black: Why White Data Really Matters

    • Irena Damsky

    • Peter Schwabe

  6. The Dark Art of Data Visualization

    • David Pisano

BELAY IT!

    • David Dorsey

  1. Understanding a New Memory Corruption Defense: Use-after-Free (UaF) Mitigation and Bypass

    • Jared DeMott

  2. There's Waldo! Tracking Users via Mobile Apps

    • Colby Moore

    • Patrick Wardle

    • Terry Nelms

  3. The Joy Of Intelligent Proactive Security

    • Scott Behrens

    • Andy Hoernecke

  4. Manually Searching Advisories and Blogs for Threat Data--"Who's Got Time for That?"

    • Elvis Hovor

    • Shimon Modi

  5. The Windows Sandbox Paradox

    • James Forshaw

  6. No Budget Threat Intelligence: Tracking Malware Campaigns on the Cheap

    • Andrew Morris

    • Anthony Kasza

    • Dhia Mahjoub

    • Loc Nguyen

BRING IT ON!

  1. Where the Wild Things Are: Encryption, Police Access & the User

    • Whitney Merrill

    • Brandon Benson

  2. Quantum Computing 01100101

    • Tess Schrodinger

  3. Come to the Dark Side--We Have (Misfortune) Cookies

    • Lior Oppenheim

    • Shahar Tal

    • Tom Cross

    • David Raymond

    • Gregory Conti

    • Sarah Zatko

  4. Ask the EFF

    • Kurt Opsahl

    • Nate Cardozo

  5. Crypto Without Computers

    • Ben Agre

    • Chris Cullison

    • Zack Allen

    • Avi Rubin

    • Meltem Sˆnmez Turan

    • John Kelsey

    • Kerry McKay

Five Not-Totally-Crazy Ways to Build for Usability
Simple Windows Application Whitelisting Evasion
Don't Look Now! Malicious Image Spam
Userland Persistence on Mac OS X - "It Just Works"
NSA Playset: USB Tools
Knock Knock: A Survey of iOS Authentication Methods
Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry
Eliminating Timing Side-channels. A Tutorial
Cockroach Analysis: A Statistical Analysis of the Flash and Java Files that Infest the Internet
Practical Machine Learning for Network Security
Infrastructure Tracking with Passive Monitoring and Active Probing
Micronesia: Sub-kernel Kit for Host Introspection in Determining Insider Threat
Analysis of POS Malware
Deception for the Cyber Defender: To Err is Human; to Deceive, Divine
Rethinking Security's Role in Computer Science Education
Mascots, March Madness & #yogapants: Hacking Goes to College
How Random is Your RNG?