Star 0

Talks

Title Humans
0wn the Con The Shmoo Group
A Social Science Approach to Cybersecurity Education for all Disciplines
The Background Noise of the Internet
ShmooCon Debates: Crypto Currency â Fad or Future | Consumer IOT Security â Controlling the Climate or Burning Down the House Bruce Potter , Wendy Nather
AWS Honey Tokens with SPACECRAB Dan Bourke
CITL â Quantitative, Comparable Software Risk Reporting Sarah Zatko
When CAN CANT
Getting Cozy with OpenBSM Auditing on MacOS ⦠The Good, the Bad, & the Ugly Patrick Wardle
Deep Learning for Realtime Malware Detection
Cyberlaw: Year in Review
afl-unicorn: Fuzzing the âUnfuzzableâ
Listing the 1337: Adventures in Curating HackerTwitterâs Institutional Knowledge
This Is Not Your Grandfatherâs SIEM
OK Google, Tell Me About Myself (First part of talk missing- Another moose sacked)
Nation-State Espionage: Hunting Cooper Quintin , Eva Galperin
Tap, Tap, Is This Thing On? Testing EDR Capabilities Casey Smith
IoT RCE, a Study With Disney (First 3 minutes audio is missing- Moose has been sacked) Lilith Wyatt
Time Signature Based Matching for Data Fusion and Coordination Detection in Cyber Relevant Logs
Pages from a Sword-Makerâs Notebook pt. II Vyrus
Securing Bare Metal Hardware at Scale Matt King , Paul McMillan
Donât Ignore GDPR; It Matters Now!
Keynote
CertGraph: A Tool to Crawl the Graph of SSL Certificate Alternate Names using Certificate Transparency Ian Foster
Platform APTs on a Global Scale
The Friedman Tombstone â A Cipher in Arlington National Cemetery
Do as I Say, Not as I Do: Hacker Self Improvement and You
Bludgeoning Bootloader Bugs: No Write Left Behind Rebecca Shapiro
Catch Me If You Can: A Decade of Evasive Malware Attack and Defense Alexei Bulazel
Defending Against Robot Attacks Brittany Postnikoff
radare2 in Conversation Richard Seymour
Hacking the News: an Infosec Guide to the Media, and How to Talk to Them
Libation Escalation â Scotch and Bubbles
SIGINT on a budget: Listening in, gathering data and watchingâfor less than $100
Blink for Your Password, Blink Away Your Civil Rights? Wendy Knox Everette
Someone is Lying to You on the InternetâUsing Analytics to Find Bot Submissions in the FCC Net Neutrality Submissions
Opening Closed Systems with GlitchKit Dominic Spill
OâKeefe- Skill Building By Revisiting Past CVEs
Your Defense is Flawed (itâs only kinda your fault)
Electronic Voting in 2018: Threat or Menace Matt Blaze
Running a Marathon Without Breaking a Sweat? Forensic
Profiling and Detecting all Things SSL with JA3
The First Thing We Do, Letâs Kill all the [CISOs]
Everything You Wanted to Know About Creating an Insider Threat Program (But Were Afraid To Ask) Tess Schrodinger
Pseudo-Doppler Redux Michael Ossmann
15 January 2017 Talks (Build It!, Belay It! and Bring it On!):
Building Absurd Christmas Light Shows Rob Joyce
Better Git Hacking: Extracting âDeletedâ Secrets from Git Databases with Grawler
Patching â Itâs Complicated
Building a GoodWatch Travis Goodspeed
Stack Cleaning â A Quest in Hunting for FLIRT Jon Erickson
Embedded Device Vulnerability Analysis Case Study Using TROMMEL
ODA: A Collaborative, Open Source Reversing Platform in the Cloud
Thatâs No Moon(shot)! Beau Woods