2016 ShmooCon Proceedings
  • Introduction
  • Foreword
  • ShmooCon
  • The Shmoo Group
  • Schedule
  • ONE TRACK MIND
    • Breaking Bulbs Briskly by Bogus Broadcasts
    • Where Do the Phishers Live?
    • Hiding from the Investigator: Understanding OS X and iOS Code Signing to Hide Data
  • BUILD IT
    • LostPass: Pixel-perfect LastPass Phishing
    • P-GOhst Exploitation
    • The Road to SYSTEM
    • Compressed Context Based Analytic Results for Use in Computer Vision System for Network Defense
    • Reverse-Engineering Wireless SCADA Systems
  • BELAY IT
    • AVLeak: Turning Antivirus Emulators Inside Out
  • BRING IT ON
    • Exploiting Memory Corruption Vulnerabilities on the FreeRTOS OS
    • LTE Security and Protocol
    • Making Milware: An Interdisciplinary Tryst
Powered by GitBook
On this page

Foreword

Here we have the third edition of The ShmooCon Proceedings - our ongoing project to document the knowledge and information put forth by ShmooCon speakers every year.

Putting things in print, rather than relying on videos and PowerPoint presentations, accomplishes two things. First, these proceedings force ShmooCon speakers to wrangle all their thoughts and feelings on a topic and capture them in 1,000 words. This can be no small feat given the complexities of the topics covered at the conference. Second, these proceedings provide you, the reader, with a citable, permanent source of knowledge that you can leverage as you move forward in your cybersecurity endeavors (yes, we said cyber).

We are excited to publish another year of proceedings. Thanks to everyone who contributed to this edition. This starts with the volunteers who show up and generously donate their time, helping us produce ShmooCon each and every year. Thanks to Rob Fuller for his continued role as ShmooCon Proceedings editor. Most especially we thank the speakers, whose hard work is represented in these pages.

Thanks and enjoy!

Heidi Potter

PreviousIntroductionNextShmooCon

Last updated 6 years ago