0wn the Con
|
The Shmoo Group
|
A Social Science Approach to Cybersecurity Education for all Disciplines
|
|
The Background Noise of the Internet
|
|
ShmooCon Debates: Crypto Currency â Fad or Future | Consumer IOT Security â Controlling the Climate or Burning Down the House
|
Bruce Potter
,
Wendy Nather
|
AWS Honey Tokens with SPACECRAB
|
Dan Bourke
|
CITL â Quantitative, Comparable Software Risk Reporting
|
Sarah Zatko
|
When CAN CANT
|
|
Getting Cozy with OpenBSM Auditing on MacOS ⦠The Good, the Bad, & the Ugly
|
Patrick Wardle
|
Deep Learning for Realtime Malware Detection
|
|
Cyberlaw: Year in Review
|
|
afl-unicorn: Fuzzing the âUnfuzzableâ
|
|
Listing the 1337: Adventures in Curating HackerTwitterâs Institutional Knowledge
|
|
This Is Not Your Grandfatherâs SIEM
|
|
OK Google, Tell Me About Myself (First part of talk missing- Another moose sacked)
|
|
Nation-State Espionage: Hunting
|
Cooper Quintin
,
Eva Galperin
|
Tap, Tap, Is This Thing On? Testing EDR Capabilities
|
Casey Smith
|
IoT RCE, a Study With Disney (First 3 minutes audio is missing- Moose has been sacked)
|
Lilith Wyatt
|
Time Signature Based Matching for Data Fusion and Coordination Detection in Cyber Relevant Logs
|
|
Pages from a Sword-Makerâs Notebook pt. II
|
Vyrus
|
Securing Bare Metal Hardware at Scale
|
Matt King
,
Paul McMillan
|
Donât Ignore GDPR; It Matters Now!
|
|
Keynote
|
|
CertGraph: A Tool to Crawl the Graph of SSL Certificate Alternate Names using Certificate Transparency
|
Ian Foster
|
Platform APTs on a Global Scale
|
|
The Friedman Tombstone â A Cipher in Arlington National Cemetery
|
|
Do as I Say, Not as I Do: Hacker Self Improvement and You
|
|
Bludgeoning Bootloader Bugs: No Write Left Behind
|
Rebecca Shapiro
|
Catch Me If You Can: A Decade of Evasive Malware Attack and Defense
|
Alexei Bulazel
|
Defending Against Robot Attacks
|
Brittany Postnikoff
|
radare2 in Conversation
|
Richard Seymour
|
Hacking the News: an Infosec Guide to the Media, and How to Talk to Them
|
|
Libation Escalation â Scotch and Bubbles
|
|
SIGINT on a budget: Listening in, gathering data and watchingâfor less than $100
|
|
Blink for Your Password, Blink Away Your Civil Rights?
|
Wendy Knox Everette
|
Someone is Lying to You on the InternetâUsing Analytics to Find Bot Submissions in the FCC Net Neutrality Submissions
|
|
Opening Closed Systems with GlitchKit
|
Dominic Spill
|
OâKeefe- Skill Building By Revisiting Past CVEs
|
|
Your Defense is Flawed (itâs only kinda your fault)
|
|
Electronic Voting in 2018: Threat or Menace
|
Matt Blaze
|
Running a Marathon Without Breaking a Sweat? Forensic
|
|
Profiling and Detecting all Things SSL with JA3
|
|
The First Thing We Do, Letâs Kill all the [CISOs]
|
|
Everything You Wanted to Know About Creating an Insider Threat Program (But Were Afraid To Ask)
|
Tess Schrodinger
|
Pseudo-Doppler Redux
|
Michael Ossmann
|
15 January 2017 Talks (Build It!, Belay It! and Bring it On!):
|
|
Building Absurd Christmas Light Shows
|
Rob Joyce
|
Better Git Hacking: Extracting âDeletedâ Secrets from Git Databases with Grawler
|
|
Patching â Itâs Complicated
|
|
Building a GoodWatch
|
Travis Goodspeed
|
Stack Cleaning â A Quest in Hunting for FLIRT
|
Jon Erickson
|
Embedded Device Vulnerability Analysis Case Study Using TROMMEL
|
|
ODA: A Collaborative, Open Source Reversing Platform in the Cloud
|
|
Thatâs No Moon(shot)!
|
Beau Woods
|