# Schedule

## ONE TRACK MIND

1. Opening Remarks, Rumblings, Ruminations, and Rants
2. U2F Zero: Secure Hardware Design, DIY Mass Production, and Amazon Prime
   * Conor Patrick
3. 35 Years of Cyberwar: The Squirrels are Winning
   * Space Rogue
4. Implantable Logic Analyzers and Unlocking Doors
   * Kenny McElroy
5. Cyborg Self-Hacking: An Examination of Cochlear Implants
   * Jeff Dodge
6. Introducing Jak: Safely Share Sensitive Files via Git
   * Chris DiLorenzo
7. [Can a Drunk Person Authenticate Using Brainwaves? #NotAlcoholicsJustResearchers](https://shmoo.gitbook.io/2017-shmoocon-proceedings/one_track_mind/07_can_a_drunk_person_authenticate)
   * Tommy Chin
   * Peter Muller
8. Keynote Seven Things: Frank Zappa, T. Coraghassen Boyle, and Twenty-one Years in Security
   * Dr. Gary McGraw

## BUILD IT!

1. So You Want to Hack Radios
   * Marc Newlin
   * Matt Knight
2. Exploring The Infrared World
   * Dominic Spill
   * Michael Ossmann
3. [A Context-Aware Kernel IPC Firewall for Android](https://shmoo.gitbook.io/2017-shmoocon-proceedings/build_it/03_a_context_aware_kernel_ipc_firewall)
   * David Wu
   * Sergey Bratus
4. [WaveConverter – An Open Source Software Tool for RF Reverse Engineering](https://shmoo.gitbook.io/2017-shmoocon-proceedings/build_it/04_wave_converter)
   * Paul Clark
5. [I Have a Graph Database. Now What?](https://shmoo.gitbook.io/2017-shmoocon-proceedings/build_it/05_i_have_a_graph_database)
   * Nicolas Kseib
   * Shimon Modi
6. 0wn the Con
   * The Shmoo Group
7. [User Focused Security at Netflix: Stethoscope](https://shmoo.gitbook.io/2017-shmoocon-proceedings/build_it/07_user_focused_security_at_netflix)
   * Andrew White
   * Jesse Kriss
8. ripr – Run Slices of Binary Code from Python
   * Patrick Biernat
9. Safety Bot Guaranteed
   * Rich Seymour
10. [(In-)secure messaging with SCIMP and OMEMO](https://shmoo.gitbook.io/2017-shmoocon-proceedings/build_it/10_insecure_messaging_with_scimp_omemo)
    * Sebastian Verschoor

## BELAY IT!

1. LangSec for Penetration Testing: How and Why
   * Falcon Darkstar Momot
   * Sergey Bratus
2. Know Normal, Find Evil: Windows 10 Edition
   * Jake Williams
3. Who Wants to Allow Arbitrary Code Execution on Their Boxes? We Do It Every Day.
   * Brian Redbeard
   * Brad Ison
4. Goodnight Moon & the House of Horrors: A look at the current IoT ecosystem and the regulations trying to control it
   * Whitney Merrill
   * Aaron Alva
5. [Plug-in Electric Vehicle Fingerprinting: Authentication for Plug-in Electric Vehicles](https://shmoo.gitbook.io/2017-shmoocon-proceedings/belay_it/05_pev_fingerprinting)
   * Rebekah Houser
6. [Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in Your Virtualized Environment](https://shmoo.gitbook.io/2017-shmoocon-proceedings/belay_it/06_defeating_sandbox_evasion)
   * Alexander Chailytko
   * Stanislav Skuratovich
7. Anti-Ransomware: Turning the Tables
   * Gal Shpantzer
   * G. Mark Hardy
8. [Dig Out Your Brick Phone! Bringing AMPS Back with GNU Radio](https://shmoo.gitbook.io/2017-shmoocon-proceedings/belay_it/08_dig_out_your_brick_phone)
   * Brandon Creighton
9. [Excuse me, Server, Do You Have the Time?](https://shmoo.gitbook.io/2017-shmoocon-proceedings/belay_it/09_excuse_me_server)
   * Brian Cardinale
10. Does a BEAR Leak in the Woods? The Democratic National Committee breach, Russian APTs, and the 2016 U.S. Election
    * Toni Gidwani

## BRING IT ON!

1. [A Widening Attack Plain: Threatcasting Tomorrow’s Threats](https://shmoo.gitbook.io/2017-shmoocon-proceedings/bring_it_on/01_a_widening_attack_plain)
   * Brian David Johnson
   * Natalie Vanatta
2. Ask the Feds
   * Allan Friedman
   * Nick Leiserson
   * Eric Mill
   * Jessica Wilkerson
3. Ask the EFF: Protecting Tomorrow
   * Kurt Opsahl
   * Andrew Crocker
4. [háček: Computing a Hacker Experience](https://shmoo.gitbook.io/2017-shmoocon-proceedings/bring_it_on/04_hacek)
   * Allison Miller
   * Melissa Clarke
   * Margaret Schedel
5. Flailing is Learning: My First Year as a Malware Analyst
   * Lauren Pearce
6. The State of Secure Messaging
   * Nikita Borisov
   * Sze Chuen Tan
7. The Metadata is the Message (and Sometimes the Message is the Metadata
   * Matt Blaze
8. A Nickel Tour of the Ad Fraud Ecosystem
   * Ryan Castellucci
9. The Threat Intel Results are in… You are NOT the hacker! : Disinformation Campaigns vs. Attribution Claims
   * Mark Kuhr
10. Challenges and Opportunities: Application Containers and Micro Services
    * Anil Karmel
    * Andrew Wild

## CLOSING

1. Designing and Executing the Worldís First All-Computer Hacking Competition: A panel with the development team
   * Tim Vidas
   * Chris Eagle
   * Jason Wright
   * Brian Caswell
   * Mike Thompson
   * Holt Sorenson
