2016 ShmooCon Proceedings
  • Introduction
  • Foreword
  • ShmooCon
  • The Shmoo Group
  • Schedule
  • ONE TRACK MIND
    • Breaking Bulbs Briskly by Bogus Broadcasts
    • Where Do the Phishers Live?
    • Hiding from the Investigator: Understanding OS X and iOS Code Signing to Hide Data
  • BUILD IT
    • LostPass: Pixel-perfect LastPass Phishing
    • P-GOhst Exploitation
    • The Road to SYSTEM
    • Compressed Context Based Analytic Results for Use in Computer Vision System for Network Defense
    • Reverse-Engineering Wireless SCADA Systems
  • BELAY IT
    • AVLeak: Turning Antivirus Emulators Inside Out
  • BRING IT ON
    • Exploiting Memory Corruption Vulnerabilities on the FreeRTOS OS
    • LTE Security and Protocol
    • Making Milware: An Interdisciplinary Tryst
Powered by GitBook
On this page

Introduction

Proceedings of the 12th ShmooCon Information Security Conference

Editor: Rob Fuller

© 2016 Individual Authors, ShmooCon Press All rights reserved.

No part of this publication may be reproduced without prior written permission of the publisher. Individual authors of papers and presentations are solely responsible for all materials submitted for the publication. All opinions expressed in the book are of the authors and do not reflect those of the editors.

Photo credits: Unless stated otherwise, all images © the authors.

ShmooCon Press Washington, DC www.shmoocon.org ISBN XXX-X-XXXXX-XXX-X

NextForeword

Last updated 6 years ago