2018 ShmooCon Proceedings
  • Introduction
  • Foreword
  • ShmooCon
  • The Shmoo Group
  • Schedule
  • ONE TRACK MIND
    • Can a Drunk Person Authenticate Using Brainwaves? #NotAlcoholicsJustResearchers
  • BUILD IT
    • A Context-Aware Kernel IPC Firewall for Android
    • WaveConverter – An Open Source Software Tool for RF Reverse Engineering
    • I Have a Graph Database. Now What?
    • User Focused Security at Netflix: Stethoscope
    • (In-)secure messaging with SCIMP and OMEMO
  • BELAY IT
    • Plug-in Electric Vehicle Fingerprinting: Authentication for Plug-in Electric Vehicles
    • Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in Your Virtualized Environment
    • Dig Out Your Brick Phone! Bringing AMPS Back with GNU Radio
    • Excuse me, Server, Do You Have the Time?
  • BRING IT ON
    • A Widening Attack Plain: Threatcasting Tomorrow’s Threats
    • háček: Computing a Hacker Experience
Powered by GitBook
On this page

Introduction

Proceedings of the 14th ShmooCon Information Security Conference

Editor: Rob Fuller

© 2018 Individual Authors, ShmooCon Press All rights reserved.

No part of this publication may be reproduced without prior written permission of the publisher. Individual authors of papers and presentations are solely responsible for all materials submitted for the publication. All opinions expressed in the book are of the authors and do not reflect those of the editors.

Photo credits: Unless stated otherwise, all images © the authors.

ShmooCon Press Washington, DC www.shmoocon.org ISBN XXX-X-XXXXX-XXX-X

NextForeword

Last updated 6 years ago