Shmoocon 2014 Jan. 17, 2014 to Jan. 19, 2014, Washington,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Remarks, Rumblings, and Rants Bruce Potter N/A
Attacker Ghost Stories: Mostly Free Defenses That Give Attackers Nightmares Mubix "rob" Fuller N/A
The Evolution of Linux Kernel Module Signing Rebecca ".bx" Shapiro N/A
How Hackers for Charity (Possibly) Saved Me a Lot of Money Branden Miller N/A
CCTV: Setup, Attack Vectors, and Laws Joshua Brooks N/A
Security Analytics: Less Hype, More Data Aaron Gee-clough N/A
Dissipation of Hackers in the Enterprise Weasel N/A
Keynote Address:Privacy Online: What Now? Ian Goldberg N/A
Genuinely "Trusted Computing:" Free and Open Hardware Security Modules Ryan Lackey N/A
Introducing DARPA's Cyber Grand Challenge Mike Walker N/A
Technology Law Issues for Security Professionals Shannon Brown N/A
Malicious Threats, Vulnerabilities, and Defenses in WhatsApp and Mobile Instant Messaging Platforms Pablo san Emeterio , Jaime Sanchez N/A
Unambiguous Encapsulation - Separating Data and Signaling Michael Ossmann , Dominic Spill N/A
Abusing ACPI Control Methods Assambly N/A
SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography Daniel J. Bernstein , Tanja Lange N/A
A Critical Review of Spatial Analysis David Giametta , Andrew Potter N/A
Arms Race: The Story of (In)-Secure Bootloaders Kang Li , Lee Harrison N/A
Controlling USB Flash Drive Controllers: Expose of Hidden Features Richard Harman N/A
Data Whales and Troll Tears: Beat the Odds in InfoSec Allison Miller , Davi Ottenheimer N/A
Syncing Mentorship Between Winners And Beginners Tarah Wheeler , Van Vlack , Liz Dahlstrom N/A
0wn the Con The shmoo Group N/A
Operationalizing Threat Information Sharing: Beyond Policies and Platitudes Sean Barnum , Aharon Chernin N/A
The NSA: Capabilities and Countermeasures Bruce Schneier N/A
AV Evasion With the Veil Framework Christopher Truncer , Will Schroeder , Michael Wright N/A
The "Science of Cyber" and the Next Generation of Security Tools Paulo Shakarian N/A
How to Train your Snapdragon: Exploring Power Frameworks on Android Josh "m0nk" Thomas N/A
ADD -- Complicating Memory Forensics Through Memory Disarray Jake Williams , Alissa Torres N/A
Timing-Based Attestation: Sexy Defense, or the Sexiest? Xeno Kovah , Corey Kallenberg , John Butterworth N/A
LTE vs. Darwin Hendrik Schmidt , Brian Butterly N/A
An Open and Affordable USB Man in the Middle Device Dominic Spill N/A
"How I Met Your Mother" or The Brief and Secret History of Bletchley Park and How They Invented Cryptography and the Computer Age Benjamin Gatti N/A
Malicious Online Activities Related to the 2012 U.S. General Election Joshua Franklin , Robert Tarlecki , Matthew Jablonski , Dr. Damon Mccoy N/A
unROP: A Tool for In-Memory ROP Exploitation Detection and Traceback Kang Li , Lee Harrison , Xiaoning Li N/A
Raising Costs for Your Attackers Instead of Your CFO Aaron Beuhring , Kyle Salous N/A IncludeThinkstScapes
Vehicle Forensics - The Data Beyond the Dashboard Courtney Lancaster N/A
Introducing idb - Simplified Blackbox iOS App Pentesting Daniel A. Mayer N/A
Practical Applications of Data Science in Detection Mike Sconzo , Brian Wylie N/A
You Don't Have the Evidence Scott Moulton N/A