# Schedule

## ONE TRACK MIND

1. [Five Not-Totally-Crazy Ways to Build for Usability](https://shmoo.gitbook.io/2015-shmoocon-proceedings/one_track_mind/01_building_for_usability)
   * Elissa Shevinsky
2. [Simple Windows Application Whitelisting Evasion](https://shmoo.gitbook.io/2015-shmoocon-proceedings/one_track_mind/02_simple_windows_application_whitelisting_evasion)
   * Casey Smith
3. [Don't Look Now! Malicious Image Spam](https://shmoo.gitbook.io/2015-shmoocon-proceedings/one_track_mind/03_dont_look_now_malicious_image_spam)
   * Kathy Liszka
4. [Userland Persistence on Mac OS X - "It Just Works"](https://shmoo.gitbook.io/2015-shmoocon-proceedings/one_track_mind/04_userland_persistence_on_mac_os_x)
   * Joshua Pitts
5. SEWiFi: Building a Security Enhanced WiFi Dongle
   * Ryan Holeman
6. Betting BIOS Bugs Won't Bite Y'er Butt?
   * Xeno Kovah
   * Corey Kallenberg

## BUILD IT!

1. [NSA Playset: USB Tools](https://github.com/shmoo/2015-shmoocon-proceedings/tree/0e578a0777cc3182c401369a614c184a5116ffc5/build/01_/README.md)
   * Dominic Spill
   * Michael Ossmann
   * Jared Boone
2. [Knock Knock: A Survey of iOS Authentication Methods](https://github.com/shmoo/2015-shmoocon-proceedings/tree/0e578a0777cc3182c401369a614c184a5116ffc5/build/02_/README.md)
   * David Schuetz
3. httpscreenshot - A Tool for Both Teams
   * Steve Breen
   * Justin Kennedy
4. Automated Binary Analysis with Pin and Python
   * Omar Ahmed
   * Tyler Bohan
5. NaCl: A New Crypto Library
   * Daniel J. Bernstein
   * Tanja Lange
6. [Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry](https://github.com/shmoo/2015-shmoocon-proceedings/tree/0e578a0777cc3182c401369a614c184a5116ffc5/build/README.md)
   * Kristen K. Greene
   * Joshua Franklin
   * John Kelsey
7. 0wn the Con
   * The Shmoo Group
8. White is the New Black: Why White Data Really Matters
   * Irena Damsky
9. [Eliminating Timing Side-channels. A Tutorial](https://github.com/shmoo/2015-shmoocon-proceedings/tree/0e578a0777cc3182c401369a614c184a5116ffc5/build/README.md)
   * Peter Schwabe
10. The Dark Art of Data Visualization
    * David Pisano

## BELAY IT!

1. [Cockroach Analysis: A Statistical Analysis of the Flash and Java Files that Infest the Internet](https://github.com/shmoo/2015-shmoocon-proceedings/tree/0e578a0777cc3182c401369a614c184a5116ffc5/belay/README.md)
   * David Dorsey
2. Understanding a New Memory Corruption Defense: Use-after-Free (UaF) Mitigation and Bypass
   * Jared DeMott
3. There's Waldo! Tracking Users via Mobile Apps
   * Colby Moore
   * Patrick Wardle
4. [Practical Machine Learning for Network Security](https://github.com/shmoo/2015-shmoocon-proceedings/tree/0e578a0777cc3182c401369a614c184a5116ffc5/belay/README.md)
   * Terry Nelms
5. The Joy Of Intelligent Proactive Security
   * Scott Behrens
   * Andy Hoernecke
6. Manually Searching Advisories and Blogs for Threat Data--"Who's Got Time for That?"
   * Elvis Hovor
   * Shimon Modi
7. The Windows Sandbox Paradox
   * James Forshaw
8. No Budget Threat Intelligence: Tracking Malware Campaigns on the Cheap
   * Andrew Morris
9. [Infrastructure Tracking with Passive Monitoring and Active Probing](https://github.com/shmoo/2015-shmoocon-proceedings/tree/0e578a0777cc3182c401369a614c184a5116ffc5/belay/README.md)
   * Anthony Kasza
   * Dhia Mahjoub
10. [Micronesia: Sub-kernel Kit for Host Introspection in Determining Insider Threat](https://github.com/shmoo/2015-shmoocon-proceedings/tree/0e578a0777cc3182c401369a614c184a5116ffc5/belay/README.md)
    * Loc Nguyen

## BRING IT ON!

1. Where the Wild Things Are: Encryption, Police Access & the User
   * Whitney Merrill
2. [Analysis of POS Malware](https://github.com/shmoo/2015-shmoocon-proceedings/tree/0e578a0777cc3182c401369a614c184a5116ffc5/bring/README.md)
   * Brandon Benson
3. Quantum Computing 01100101
   * Tess Schrodinger
4. Come to the Dark Side--We Have (Misfortune) Cookies
   * Lior Oppenheim
   * Shahar Tal
5. [Deception for the Cyber Defender: To Err is Human; to Deceive, Divine](https://github.com/shmoo/2015-shmoocon-proceedings/tree/0e578a0777cc3182c401369a614c184a5116ffc5/bring/README.md)
   * Tom Cross
   * David Raymond
   * Gregory Conti
6. [Rethinking Security's Role in Computer Science Education](https://github.com/shmoo/2015-shmoocon-proceedings/tree/0e578a0777cc3182c401369a614c184a5116ffc5/bring/README.md)
   * Sarah Zatko
7. Ask the EFF
   * Kurt Opsahl
   * Nate Cardozo
8. Crypto Without Computers
   * Ben Agre
9. [Mascots, March Madness & #yogapants: Hacking Goes to College](https://github.com/shmoo/2015-shmoocon-proceedings/tree/0e578a0777cc3182c401369a614c184a5116ffc5/bring/README.md)
   * Chris Cullison
   * Zack Allen
   * Avi Rubin
10. [How Random is Your RNG?](https://github.com/shmoo/2015-shmoocon-proceedings/tree/0e578a0777cc3182c401369a614c184a5116ffc5/bring/README.md)
    * Meltem Sˆnmez Turan
    * John Kelsey
    * Kerry McKay
