2018 ShmooCon Proceedings
Search…
Introduction
Foreword
ShmooCon
The Shmoo Group
Schedule
ONE TRACK MIND
BUILD IT
BELAY IT
BRING IT ON
Powered By
GitBook
Schedule
ONE TRACK MIND
1.
Opening Remarks, Rumblings, Ruminations, and Rants
2.
U2F Zero: Secure Hardware Design, DIY Mass Production, and Amazon Prime
Conor Patrick
3.
35 Years of Cyberwar: The Squirrels are Winning
Space Rogue
4.
Implantable Logic Analyzers and Unlocking Doors
Kenny McElroy
5.
Cyborg Self-Hacking: An Examination of Cochlear Implants
Jeff Dodge
6.
Introducing Jak: Safely Share Sensitive Files via Git
Chris DiLorenzo
7.
Can a Drunk Person Authenticate Using Brainwaves? #NotAlcoholicsJustResearchers
Tommy Chin
Peter Muller
8.
Keynote Seven Things: Frank Zappa, T. Coraghassen Boyle, and Twenty-one Years in Security
Dr. Gary McGraw
BUILD IT!
1.
So You Want to Hack Radios
Marc Newlin
Matt Knight
2.
Exploring The Infrared World
Dominic Spill
Michael Ossmann
3.
A Context-Aware Kernel IPC Firewall for Android
David Wu
Sergey Bratus
4.
WaveConverter – An Open Source Software Tool for RF Reverse Engineering
Paul Clark
5.
I Have a Graph Database. Now What?
Nicolas Kseib
Shimon Modi
6.
0wn the Con
The Shmoo Group
7.
User Focused Security at Netflix: Stethoscope
Andrew White
Jesse Kriss
8.
ripr – Run Slices of Binary Code from Python
Patrick Biernat
9.
Safety Bot Guaranteed
Rich Seymour
10.
(In-)secure messaging with SCIMP and OMEMO
Sebastian Verschoor
BELAY IT!
1.
LangSec for Penetration Testing: How and Why
Falcon Darkstar Momot
Sergey Bratus
2.
Know Normal, Find Evil: Windows 10 Edition
Jake Williams
3.
Who Wants to Allow Arbitrary Code Execution on Their Boxes? We Do It Every Day.
Brian Redbeard
Brad Ison
4.
Goodnight Moon & the House of Horrors: A look at the current IoT ecosystem and the regulations trying to control it
Whitney Merrill
Aaron Alva
5.
Plug-in Electric Vehicle Fingerprinting: Authentication for Plug-in Electric Vehicles
Rebekah Houser
6.
Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in Your Virtualized Environment
Alexander Chailytko
Stanislav Skuratovich
7.
Anti-Ransomware: Turning the Tables
Gal Shpantzer
G. Mark Hardy
8.
Dig Out Your Brick Phone! Bringing AMPS Back with GNU Radio
Brandon Creighton
9.
Excuse me, Server, Do You Have the Time?
Brian Cardinale
10.
Does a BEAR Leak in the Woods? The Democratic National Committee breach, Russian APTs, and the 2016 U.S. Election
Toni Gidwani
BRING IT ON!
1.
A Widening Attack Plain: Threatcasting Tomorrow’s Threats
Brian David Johnson
Natalie Vanatta
2.
Ask the Feds
Allan Friedman
Nick Leiserson
Eric Mill
Jessica Wilkerson
3.
Ask the EFF: Protecting Tomorrow
Kurt Opsahl
Andrew Crocker
4.
háček: Computing a Hacker Experience
Allison Miller
Melissa Clarke
Margaret Schedel
5.
Flailing is Learning: My First Year as a Malware Analyst
Lauren Pearce
6.
The State of Secure Messaging
Nikita Borisov
Sze Chuen Tan
7.
The Metadata is the Message (and Sometimes the Message is the Metadata
Matt Blaze
8.
A Nickel Tour of the Ad Fraud Ecosystem
Ryan Castellucci
9.
The Threat Intel Results are in… You are NOT the hacker! : Disinformation Campaigns vs. Attribution Claims
Mark Kuhr
10.
Challenges and Opportunities: Application Containers and Micro Services
Anil Karmel
Andrew Wild
CLOSING
1.
Designing and Executing the Worldís First All-Computer Hacking Competition: A panel with the development team
Tim Vidas
Chris Eagle
Jason Wright
Brian Caswell
Mike Thompson
Holt Sorenson
Previous
The Shmoo Group
Next
ONE TRACK MIND
Last modified
3yr ago
Copy link
Outline
ONE TRACK MIND
BUILD IT!
BELAY IT!
BRING IT ON!
CLOSING