Shmoocon 2014 slides I’ve found

 Still being updated

Friday, January 17, 2014
Time One Track Mind
1230 Registration Opens
1430 Opening Remarks, Rumblings, and RantsBruce Potter
Attacker Ghost Stories: Mostly Free Defenses That Give Attackers Nightmares
Mubix “Rob” Fuller
The Evolution of Linux Kernel Module Signing
Rebecca “.bx” Shapiro
How Hackers for Charity (Possibly) Saved Me a Lot of Money
Branden Miller and Emily Miller
CCTV: Setup, Attack Vectors, and Laws
Joshua Schroeder and Spencer Brooks
Security Analytics: Less Hype, More Data
Aaron Gee-Clough
Dissipation of Hackers in the Enterprise
1830 Keynote AddressPrivacy Online: What Now?Ian Goldberg
1945 Fire Talks
Saturday, January 18, 2014
Time Build It! Belay It! Bring it On!
0930 Registration Opens
Genuinely “Trusted Computing:” Free and Open Hardware Security Modules
Ryan Lackey

Introducing DARPA’s Cyber Grand Challenge
Mike Walker

Technology Law Issues for Security Professionals
Shannon Brown
Malicious Threats, Vulnerabilities, and Defenses in WhatsApp and Mobile Instant Messaging Platforms
Jaime Sanchez and Pablo San Emeterio

Unambiguous Encapsulation – Separating Data and Signaling
Dominic Spill and Michael Ossmann

I Found a Thing and You Can (Should) Too: ISP’s Unauthenticated SOAP Service = Find (Almost) All The Things!
Nicholas Popovich
SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography
Daniel J. Bernstein and Tanja Lange

A Critical Review of Spatial Analysis
David Giametta and Andrew Potter

Arms Race: The Story of (In)-Secure Bootloaders
Lee Harrison and Kang Li
1300 Lunch Break
Controlling USB Flash Drive Controllers: Expose of Hidden Features
Richard Harman

Data Whales and Troll Tears: Beat the Odds in InfoSec
Davi Ottenheimer and Allison Miller

Syncing Mentorship Between Winners And Beginners
Tarah Wheeler Van Vlack and Liz Dahlstrom
0wn the Con
The Shmoo Group

Operationalizing Threat Information Sharing: Beyond Policies and Platitudes
Sean Barnum and Aharon Chernin

The NSA: Capabilities and Countermeasures
Bruce Schneier
AV Evasion With the Veil Framework
Christopher Truncer, Will Schroeder, and Michael Wright

The “Science of Cyber” and the Next Generation of Security Tools
Paulo Shakarian

How to Train your Snapdragon: Exploring Power Frameworks on Android
Josh “m0nk” Thomas
ADD — Complicating Memory Forensics Through Memory Disarray
Jake Williams and Alissa Torres

Timing-Based Attestation: Sexy Defense, or the Sexiest?
Xeno Kovah, Corey Kallenberg, and John Butterworth

LTE vs. Darwin
Hendrik Schmidt and Brian Butterly
1815 Fire Talks
2015 Saturday Night Party @ The Hilton, International Center Ballroom
Paul and StormDJs: Keith Meyers, Zack Fasel, and Erin Jacobs
Sunday, January 19, 2014
Time Build It! Belay It! Bring it On!
0930 Registration Opens
An Open and Affordable USB Man in the Middle Device
Dominic Spill

“How I Met Your Mother” or The Brief and Secret History of Bletchley Park and How They Invented Cryptography and the Computer Age
Benjamin Gatti

Malicious Online Activities Related to the 2012 U.S. General Election
Joshua Franklin, Robert Tarlecki, Matthew Jablonski, and Dr. Damon McCoy
unROP: A Tool for In-Memory ROP Exploitation Detection and Traceback
Kang Li, Xiaoning Li, and Lee Harrison

Raising Costs for Your Attackers Instead of Your CFO
Aaron Beuhring and Kyle Salous

Vehicle Forensics – The Data Beyond the Dashboard
Courtney Lancaster
Introducing idb – Simplified Blackbox iOS App Pentesting
Daniel A. Mayer

Practical Applications of Data Science in Detection
Mike Sconzo and Brian Wylie

You Don’t Have the Evidence
Scott Moulton
1300 Room Split Break
1330 Closing PlenaryLarge Scale Network and Application ScanningBruce Potter (moderator), Robert David Graham, Paul McMillan, Dan Tentler, and Alejandro Caceres
1430 Closing Remarks

Leave a Comment

NOTE - You can use these HTML tags and attributes:
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>


This site uses Akismet to reduce spam. Learn how your comment data is processed.