Thotcon 2015 May 14, 2015 to May 15, 2015, Chicago,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Ghost of Security Past Christopher Valasek Abstract: Automotive security is now part of public dialog, with researchers continuing to investigate, media ...
Wanna Cyber? Tod Beardsley , Egypt Abstract: In this talk, Metasploit collaborators Tod Beardsley and James "Egypt" Lee will discuss the ...
InfoSec: What we know, and what we need to know. Jack Daniel Abstract: Although a new and continually evolving field, we have learned a lot about securing ...
Everything You Need to Know About Crypto in 50 minutes Jon Callas Abstract: We all know that crypto is hard. It's now a cliché. But thinking about ...
Building a Poor Man’s RFID Cloner Kevin Bong Abstract: The HID Proxcard continues to be a very popular RFID access card solution, despite ...
Cartero - Another Social Engineering Framework Matias Brutti Abstract: As we keep on reading on the news, Social Engineering remains one of the ...
Week to Weak: Weaponization of Vulnerabilities Nick Espinoza Abstract: We conducted research into how quickly vulnerabilities are turned into detected exploits and and ...
Pwning People Personally Fuzzynop Abstract: As the meaty corporate network dissipates into the free range organic vegan cloud based ...
The Bad, The Worse, and The Ugly - No Hope for POS Security Rob Havelt Abstract: This two part presentation provides a detailed overview many of the issues surrounding Point ...
Vomiting Shells: Tracking the Splatter Patterns Ryan Linn Abstract: Penetration testers and attackers alike use tools without understanding the impact or what is ...
Trojaned Gems - You can’t tell you’re using one! Jonathan Claudius , Brandon Myers Abstract: Dependence on software libraries and frameworks continue to grow in popularity. More scrutiny is ... IncludeThinkstScapes
Synspotting for Teenagers and Real Swinging Adults Steve "nosteve" Ocepek Abstract: There are people that watch trains for a hobby, yet we still struggle to ...
Firmware Vulnerability Analysis Jeremy Richards Abstract: Bad code is everywhere and the tools to dig it up are maturing at ...
BREAKING in BAD! (I’m the one who doesn’t knock) Jayson E. Street Abstract: I’ve come to realize that while I may not do a lot of social ...
Hacking Citizens United, or How to Influence Elections on a Budget Admford Abstract: Considering voter apathy and the sheer amount of noise from political ads during an ...
We Don't Need Another Damn Whitepaper: Going Kinetic on Cybercrime Networks on a Budget John Bambenek Abstract: Defensive security is a rat race. We detect new threats, we reverse engineer them ...
Detecting Bluetooth Surveillance Systems Grant Bugher Abstract: Departments of Transportation around the country have deployed "little white boxes" -- Bluetooth detectors ...
Card skimming using a RaspberryPi David "videoman" Bryan Abstract: I will be showing how you can do credit card skimming using a RaspberyPi. ...
Being a Victim can be a Crime [Ain’t Losin’ Data a Breach?] Anthony Czarnik Abstract: Data scientists, heuristic analysis, APTs, ransomware; no doubt information security intrigues us with sexy ...
Medical Device Security: An Infectious Disease Scott Erven , Adam Brand Abstract: There is no question that medical devices save countless lives, but is insecure design ...
GATTACA - Final Warning! Michael Goetzman Abstract: You were warned in 1997 that a not-too-distant future was approaching. This dystopian future ...
Explore that which can not be explored Matthew Jakubowski , Jonathan Tomek Abstract: "The world around you is not what it seems. (Of course it's not, we ...
Curry and TARTS: A new technique for avoiding side-channel attacks on cryptosystems Jp Smith Abstract: Timing attacks are a huge problem for modern cryptosystems, having been successfully employed against ...
Killing them Softly – Hunting on DarkNet Aamir Lakhani Abstract: Researcher and Security strategist, Aamir Lakhani (known as Doctor Chaos) will dive in the ...
Giving a LUKS. Learning to encrypt your data properly. Pat Litke Abstract: LUKS and strong passwords are staples in many users security tool-kits, and they’re excellent ...
GSM Sucks: Detecting IMSI Catchers Freddy Martinez Abstract: Reverse engineering IMSI Catchers remains a daunting task due to the overall secrecy surrounding ...
Hacking the CFAA: What You Need to Know, What’s Happening, and Where It’s Going. Whitney Merrill Abstract: Over the past few years, prosecutors used the Computer Fraud and Abuse Act (CFAA) ...
MMORPG (Massively Multiplayer Online Real-world Political Gamechanging) Nkryptr Abstract: Tired of watching clueless Washington insiders run roughshod over your industry? Had enough of ...
Bypassing the Secure Desktop Protections Bruno Oliveira , Marcio Almeida Macedo Abstract: The Secure Desktop is a feature of Windows API that creates a separated desktop ...
The Right to be Forgotten - Now the EU, Tomorrow the World? Jim Rennie Abstract: The Right to be Forgotten has grabbed headlines around the world. The EU has ...
Wireless Drone Strikes Episode II: Attack of the Drones! Parker Schmitt , David Jordan Abstract: By popular demand, the drones are back and in force for Episode II: Attack ...
How to Grow a Hacker David Shaw Abstract: It's hard to break into information security, and it can be even harder to ...
Compliance kills the security star - Why security standards kill security! Johannes Stillig Abstract: Everyone is talking about security at the moment Poodle, Sandworm, Heartbleed etc... But still ...
One Step Closer to the Matrix: Machine Learning and Augmented Reality in Networking Defense Rob Weiss , John Eberhardt Abstract: Network operations are constrained by three fundamental issues: i) shortage of qualified personnel; ii) ...