ShmooCon VI - 2010 - Friday, February 5
15:00
Fleischer
Opening Remarks
16:00
Fiterman
GPU vs. CPU Supercomputing Security Shootout
16:30
Fagan, Ligh
Information disclosure via P2P networks: Why stealing an identity via Gnutella is like clubbing baby seals
17:00
Gourneau
Economics of Cyber Crime
17:30
Johnston
Windows File Pseudonyms
18:00
Kaur
Learning by Breaking: A New Project for Insecure Web Applications
18:30
Steward, Weigand
Guest Stealing...The VMware Way
19:00
Chuvakin, Daniel
Keynote - Closing the TLS Authentication Gap
ShmooCon VI - 2010 - Saturday, February 6
10:00
Palka
Jsunpack-network Edition Release: JavaScript Decoding and Intrusion Detection
Navas
The New World of Smartphone Security - What Your iPhone Disclosed About You
Cecchetti, Goldberg, Gutierrez
Detection of rogue access points using clock skews: does it really work?
11:00
Gragido, Pirc
WLCCP - Analysis of a Potentially Flawed Protocol
Ames, Farina, Warner
Social Zombies II: Your Friends Need More Brains
Manley
Flying Instruments-Only: Legal and Privacy Issues in Cloud Computing
12:00
Rey, Roeschke
WiFi Bombs shaken not stirred
Holt, Jabbusch
GSM: SRSLY?
Jagdale
Tales from the Crypto
14:00
Lorenzin
Build your own Predator UAV @ 99.95% Discount
Brasefield
How To Be An RSol: Effective Bug Hunting in Solaris
Ragsdale
De Gustibus - Adventures in Hacking Taste
15:00
Sutton
Ring -1 vs. Ring -2: Containerizing Malicious SMM Interupt Handlers on AMD-V
Zaborowski
Bluetooth Keyboards: Who Owns Your Keystrokes?
Markowsky, Morehouse
Cyborg Information Security: Defense Against the Dark Arts
16:00
Barnett, Hay, Santarcangelo, Wilson
honeyM: A Framework For Virtual Mobile Device Honeyclients
Fasel
BaSO4: A Dynamic Dataflow Analysis Tool for Auditing and Reversing
TheX1le
Recovering Evidentiary Artifacts from Virtual Machines and Hypervisor Environments
17:00
Vega
DIY Hard Drive Diagnostics: Understanding a Broken Drive
Kingtuna
A Tale of Infrastructural Weaknesses in Distributed Wireless Communication Services
Anonymous
The Splendiferous Story of Archive Team and the Rapidly Disappearing Digital Heritage
ShmooCon VI - 2010 - Sunday, February 7
10:00
Phatak
Blackberry Mobile Spyware - The Monkey Steals the Berries
McRee
Exposed | More: Attacking the Extended Web
Crowley, Wood
Becoming Jack Flack: Real Life Cloak & Dagger
11:00
Hawthorn, Hillman, Holyfield, Poor
PCI: An Existential Threat To Security As We Know It
Ames, OConnor
The Friendly Traitor: Our Software Wants to Kill Us
Shields
Back to the Glass House
12:00
0wn the Con
Grunzweig
Cracking the Foundation: Attacking WCF Web Services
Jacobs
Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications
13:30
Nohl
Better Approaches to Physical Tamper Detection
14:00
Fleischer
Closing Remarks


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.