# Schedule

## ONE TRACK MIND

1. Opening Remarks, Rumblings, Ruminations, and Rants
2. U2F Zero: Secure Hardware Design, DIY Mass Production, and Amazon Prime
   * Conor Patrick
3. 35 Years of Cyberwar: The Squirrels are Winning
   * Space Rogue
4. Implantable Logic Analyzers and Unlocking Doors
   * Kenny McElroy
5. Cyborg Self-Hacking: An Examination of Cochlear Implants
   * Jeff Dodge
6. Introducing Jak: Safely Share Sensitive Files via Git
   * Chris DiLorenzo
7. [Can a Drunk Person Authenticate Using Brainwaves? #NotAlcoholicsJustResearchers](/2018-shmoocon-proceedings/one_track_mind/07_can_a_drunk_person_authenticate.md)
   * Tommy Chin
   * Peter Muller
8. Keynote Seven Things: Frank Zappa, T. Coraghassen Boyle, and Twenty-one Years in Security
   * Dr. Gary McGraw

## BUILD IT!

1. So You Want to Hack Radios
   * Marc Newlin
   * Matt Knight
2. Exploring The Infrared World
   * Dominic Spill
   * Michael Ossmann
3. [A Context-Aware Kernel IPC Firewall for Android](/2018-shmoocon-proceedings/build_it/03_a_context_aware_kernel_ipc_firewall.md)
   * David Wu
   * Sergey Bratus
4. [WaveConverter – An Open Source Software Tool for RF Reverse Engineering](/2018-shmoocon-proceedings/build_it/04_wave_converter.md)
   * Paul Clark
5. [I Have a Graph Database. Now What?](/2018-shmoocon-proceedings/build_it/05_i_have_a_graph_database.md)
   * Nicolas Kseib
   * Shimon Modi
6. 0wn the Con
   * The Shmoo Group
7. [User Focused Security at Netflix: Stethoscope](/2018-shmoocon-proceedings/build_it/07_user_focused_security_at_netflix.md)
   * Andrew White
   * Jesse Kriss
8. ripr – Run Slices of Binary Code from Python
   * Patrick Biernat
9. Safety Bot Guaranteed
   * Rich Seymour
10. [(In-)secure messaging with SCIMP and OMEMO](/2018-shmoocon-proceedings/build_it/10_insecure_messaging_with_scimp_omemo.md)
    * Sebastian Verschoor

## BELAY IT!

1. LangSec for Penetration Testing: How and Why
   * Falcon Darkstar Momot
   * Sergey Bratus
2. Know Normal, Find Evil: Windows 10 Edition
   * Jake Williams
3. Who Wants to Allow Arbitrary Code Execution on Their Boxes? We Do It Every Day.
   * Brian Redbeard
   * Brad Ison
4. Goodnight Moon & the House of Horrors: A look at the current IoT ecosystem and the regulations trying to control it
   * Whitney Merrill
   * Aaron Alva
5. [Plug-in Electric Vehicle Fingerprinting: Authentication for Plug-in Electric Vehicles](/2018-shmoocon-proceedings/belay_it/05_pev_fingerprinting.md)
   * Rebekah Houser
6. [Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in Your Virtualized Environment](/2018-shmoocon-proceedings/belay_it/06_defeating_sandbox_evasion.md)
   * Alexander Chailytko
   * Stanislav Skuratovich
7. Anti-Ransomware: Turning the Tables
   * Gal Shpantzer
   * G. Mark Hardy
8. [Dig Out Your Brick Phone! Bringing AMPS Back with GNU Radio](/2018-shmoocon-proceedings/belay_it/08_dig_out_your_brick_phone.md)
   * Brandon Creighton
9. [Excuse me, Server, Do You Have the Time?](/2018-shmoocon-proceedings/belay_it/09_excuse_me_server.md)
   * Brian Cardinale
10. Does a BEAR Leak in the Woods? The Democratic National Committee breach, Russian APTs, and the 2016 U.S. Election
    * Toni Gidwani

## BRING IT ON!

1. [A Widening Attack Plain: Threatcasting Tomorrow’s Threats](/2018-shmoocon-proceedings/bring_it_on/01_a_widening_attack_plain.md)
   * Brian David Johnson
   * Natalie Vanatta
2. Ask the Feds
   * Allan Friedman
   * Nick Leiserson
   * Eric Mill
   * Jessica Wilkerson
3. Ask the EFF: Protecting Tomorrow
   * Kurt Opsahl
   * Andrew Crocker
4. [háček: Computing a Hacker Experience](/2018-shmoocon-proceedings/bring_it_on/04_hacek.md)
   * Allison Miller
   * Melissa Clarke
   * Margaret Schedel
5. Flailing is Learning: My First Year as a Malware Analyst
   * Lauren Pearce
6. The State of Secure Messaging
   * Nikita Borisov
   * Sze Chuen Tan
7. The Metadata is the Message (and Sometimes the Message is the Metadata
   * Matt Blaze
8. A Nickel Tour of the Ad Fraud Ecosystem
   * Ryan Castellucci
9. The Threat Intel Results are in… You are NOT the hacker! : Disinformation Campaigns vs. Attribution Claims
   * Mark Kuhr
10. Challenges and Opportunities: Application Containers and Micro Services
    * Anil Karmel
    * Andrew Wild

## CLOSING

1. Designing and Executing the Worldís First All-Computer Hacking Competition: A panel with the development team
   * Tim Vidas
   * Chris Eagle
   * Jason Wright
   * Brian Caswell
   * Mike Thompson
   * Holt Sorenson


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://shmoo.gitbook.io/2018-shmoocon-proceedings/schedule.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
