2018 ShmooCon Proceedings
  • Introduction
  • Foreword
  • ShmooCon
  • The Shmoo Group
  • Schedule
  • ONE TRACK MIND
    • Can a Drunk Person Authenticate Using Brainwaves? #NotAlcoholicsJustResearchers
  • BUILD IT
    • A Context-Aware Kernel IPC Firewall for Android
    • WaveConverter – An Open Source Software Tool for RF Reverse Engineering
    • I Have a Graph Database. Now What?
    • User Focused Security at Netflix: Stethoscope
    • (In-)secure messaging with SCIMP and OMEMO
  • BELAY IT
    • Plug-in Electric Vehicle Fingerprinting: Authentication for Plug-in Electric Vehicles
    • Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in Your Virtualized Environment
    • Dig Out Your Brick Phone! Bringing AMPS Back with GNU Radio
    • Excuse me, Server, Do You Have the Time?
  • BRING IT ON
    • A Widening Attack Plain: Threatcasting Tomorrow’s Threats
    • háček: Computing a Hacker Experience
Powered by GitBook
On this page
  • ONE TRACK MIND
  • BUILD IT!
  • BELAY IT!
  • BRING IT ON!
  • CLOSING

Schedule

PreviousThe Shmoo GroupNextONE TRACK MIND

Last updated 6 years ago

ONE TRACK MIND

  1. Opening Remarks, Rumblings, Ruminations, and Rants

  2. U2F Zero: Secure Hardware Design, DIY Mass Production, and Amazon Prime

    • Conor Patrick

  3. 35 Years of Cyberwar: The Squirrels are Winning

    • Space Rogue

  4. Implantable Logic Analyzers and Unlocking Doors

    • Kenny McElroy

  5. Cyborg Self-Hacking: An Examination of Cochlear Implants

    • Jeff Dodge

  6. Introducing Jak: Safely Share Sensitive Files via Git

    • Chris DiLorenzo

    • Tommy Chin

    • Peter Muller

  7. Keynote Seven Things: Frank Zappa, T. Coraghassen Boyle, and Twenty-one Years in Security

    • Dr. Gary McGraw

BUILD IT!

  1. So You Want to Hack Radios

    • Marc Newlin

    • Matt Knight

  2. Exploring The Infrared World

    • Dominic Spill

    • Michael Ossmann

    • David Wu

    • Sergey Bratus

    • Paul Clark

    • Nicolas Kseib

    • Shimon Modi

  3. 0wn the Con

    • The Shmoo Group

    • Andrew White

    • Jesse Kriss

  4. ripr – Run Slices of Binary Code from Python

    • Patrick Biernat

  5. Safety Bot Guaranteed

    • Rich Seymour

    • Sebastian Verschoor

BELAY IT!

  1. LangSec for Penetration Testing: How and Why

    • Falcon Darkstar Momot

    • Sergey Bratus

  2. Know Normal, Find Evil: Windows 10 Edition

    • Jake Williams

  3. Who Wants to Allow Arbitrary Code Execution on Their Boxes? We Do It Every Day.

    • Brian Redbeard

    • Brad Ison

  4. Goodnight Moon & the House of Horrors: A look at the current IoT ecosystem and the regulations trying to control it

    • Whitney Merrill

    • Aaron Alva

    • Rebekah Houser

    • Alexander Chailytko

    • Stanislav Skuratovich

  5. Anti-Ransomware: Turning the Tables

    • Gal Shpantzer

    • G. Mark Hardy

    • Brandon Creighton

    • Brian Cardinale

  6. Does a BEAR Leak in the Woods? The Democratic National Committee breach, Russian APTs, and the 2016 U.S. Election

    • Toni Gidwani

BRING IT ON!

    • Brian David Johnson

    • Natalie Vanatta

  1. Ask the Feds

    • Allan Friedman

    • Nick Leiserson

    • Eric Mill

    • Jessica Wilkerson

  2. Ask the EFF: Protecting Tomorrow

    • Kurt Opsahl

    • Andrew Crocker

    • Allison Miller

    • Melissa Clarke

    • Margaret Schedel

  3. Flailing is Learning: My First Year as a Malware Analyst

    • Lauren Pearce

  4. The State of Secure Messaging

    • Nikita Borisov

    • Sze Chuen Tan

  5. The Metadata is the Message (and Sometimes the Message is the Metadata

    • Matt Blaze

  6. A Nickel Tour of the Ad Fraud Ecosystem

    • Ryan Castellucci

  7. The Threat Intel Results are in… You are NOT the hacker! : Disinformation Campaigns vs. Attribution Claims

    • Mark Kuhr

  8. Challenges and Opportunities: Application Containers and Micro Services

    • Anil Karmel

    • Andrew Wild

CLOSING

  1. Designing and Executing the Worldís First All-Computer Hacking Competition: A panel with the development team

    • Tim Vidas

    • Chris Eagle

    • Jason Wright

    • Brian Caswell

    • Mike Thompson

    • Holt Sorenson

Can a Drunk Person Authenticate Using Brainwaves? #NotAlcoholicsJustResearchers
A Context-Aware Kernel IPC Firewall for Android
WaveConverter – An Open Source Software Tool for RF Reverse Engineering
I Have a Graph Database. Now What?
User Focused Security at Netflix: Stethoscope
(In-)secure messaging with SCIMP and OMEMO
Plug-in Electric Vehicle Fingerprinting: Authentication for Plug-in Electric Vehicles
Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in Your Virtualized Environment
Dig Out Your Brick Phone! Bringing AMPS Back with GNU Radio
Excuse me, Server, Do You Have the Time?
A Widening Attack Plain: Threatcasting Tomorrow’s Threats
háček: Computing a Hacker Experience