# Schedule

## ONE TRACK MIND

1. Opening Remarks, Rumblings, Ruminations, and Rants
2. [Breaking Bulbs Briskly by Bogus Broadcasts](https://shmoo.gitbook.io/2016-shmoocon-proceedings/one_track_mind/02_breaking_bulbs_briskly_by_bogus_broadcasts)
   * Joseph Hall
   * Ben Ramsey
3. Crypto and Quantum and Post Quantum
   * Jean-Philippe Aumasson
4. \#thingswikfound #omarax: What is it, and why you may care?
   * Jaime Filson
5. Static Malware and SMTP Mail Analysis using General Purpose Graphical Processing Units (GPGPU)
   * Rick Wesson
6. [Where Do the Phishers Live? Collecting Phishers’ Geographic Locations from Automated Honeypots](https://shmoo.gitbook.io/2016-shmoocon-proceedings/one_track_mind/06_where_do_the_phishers_live)
   * Robbie Gallagher
7. [Hiding from the Investigator: Understanding OS X and iOS Code Signing to Hide Data](https://shmoo.gitbook.io/2016-shmoocon-proceedings/one_track_mind/07_hiding-from-investigators)
   * Joshua Pitts
8. Keynote
   * Neil Gershenfeld

## BUILD IT!

1. [LostPass: Pixel-perfect LastPass Phishing](https://shmoo.gitbook.io/2016-shmoocon-proceedings/build_it/01_lostpass)
   * Sean Cassidy
2. Hacking The Wireless World — Software Defined Radio Exploits
   * Balint Seeber
3. [(P|G)Ohst Exploitation](https://github.com/shmoo/2016-shmoocon-proceedings/tree/aa879058eda8526be38be1e5f1d6e293de294d4e/build/03_P-GOhst%20Exploitation.md)
   * Carl Vincent
4. [The Road to SYSTEM: Recycling Old Vulnerabilities for Unpatched Privilege Escalation and A New Network Attack](https://shmoo.gitbook.io/2016-shmoocon-proceedings/build_it/04_road-to-system)
   * Stephen Breen
5. 0wn the Con
   * The Shmoo Group
6. OSX Vulnerability Research and Why We Wrote Our Own Debugger
   * Tyler Bohan
   * Brandon Edwards
7. Penetration Testing Custom TLS Stacks
   * Alex Moneger
8. [Compressed Context Based Analytic Results for Use in Computer Vision System for Network Defense](https://shmoo.gitbook.io/2016-shmoocon-proceedings/build_it/08_compressed-context-based-analytics)
   * Rob Weiss
   * John Eberhardt
9. Be Free, Little GuardBunny!
   * Kristin Paget
10. [Reverse-Engineering Wireless SCADA Systems](https://github.com/shmoo/2016-shmoocon-proceedings/tree/aa879058eda8526be38be1e5f1d6e293de294d4e/build/10_/README.md)
    * Karl Koscher

## BELAY IT!

1. Users Are People Too: How to Make Your Tools Not Suck for Humans
   * Gillian Andrews
   * Sara Sinclair Brody
2. Software Security by the Numbers
   * Chris Eng
3. Using the Algebraic Eraser to Secure Low-Power and Passive IoT Devices
   * Derek Atkins
4. Speak Security and Enter: Better Ways to Communicate with Non-Technical Users
   * Jessy Irwin
5. [AVLeak: Turning Antivirus Emulators Inside Out](https://github.com/shmoo/2016-shmoocon-proceedings/tree/aa879058eda8526be38be1e5f1d6e293de294d4e/belay/05_/README.md)
   * Alex Bulazel
6. No Easy Breach: Challenges and Lessons Learned from an Epic Investigation
   * Matt Dunwoody
   * Nick Carr
7. Attack on Titans: A Survey of New Attacks Against Big Data and Machine Learning
   * Andrew Ruef
   * Rock Stevens
8. Containing an Attack with Linux Containers and AppArmor/SELinux
   * Jay Beale
9. My Hash is My Passport: Understanding Web and Mobile Authentication
   * David Schuetz
10. Building an Encyclopedia of Malware Configs (to punch miscreants)
    * Jon Bambenek

## BRING IT ON!

1. [Exploiting Memory Corruption Vulnerabilities on the FreeRTOS Operating System](https://shmoo.gitbook.io/2016-shmoocon-proceedings/bring_it_on/01_exploiting_memory_corruption)
   * Joel Sandin
2. Online, No One Knows You’re Dead
   * Andrew Kalat
3. You Ain’t Seen Nothing Yet: New Paradigms for Policy, Regulation, and Community Engagement
   * Greg Conti (moderator)
   * Mara Tam
   * Vincenzo Iozzo
   * Jeff Moss
   * Randy Wheeler
4. Political Pwnage: The Hacker’s Guide to Cybersecurity Policy
   * Nick Leiserson
   * Jen Ellis
5. [LTE Security and Protocol Exploits](https://shmoo.gitbook.io/2016-shmoocon-proceedings/bring_it_on/05_lte_security_and_protocol_exploits)
   * Roger Piqueras Jover
6. This Message Will Self-Destruct in 10 Seconds: Avoiding Bilateral Enucleation
   * 3AlarmLampscooter
7. Ask the EFF
   * Kurt Opsahl
   * Andrew Crocker
   * Bill Buddington
   * Eva Galperin
8. [Making Milware: An Interdisciplinary Tryst](https://shmoo.gitbook.io/2016-shmoocon-proceedings/bring_it_on/08_making_milware)
   * Trey Herr
   * Eric Armbrust
9. Resistance is Futile: SDN Assimilating Our Networks
   * Sarah Rees
   * Jonathan Medina
10. Gatekeeper Exposed
    * Patrick Wardle

## CLOSING

1. Information Security Programs in Academia
   * Matt Blaze (moderator)
   * Greg Conti
   * Rick Forno
   * Jeff Foster
