ShmooCon IX - 2013 - Friday, February 15
14:30
Potter
Opening Remarks and Rants
15:30
Bowers
How to Own A Building: Exploiting the Physical World With BacNET and the BacNET Attack Framework
16:00
Young
Mainframed: The Secrets Inside That Black Box
16:30
Baggett, Williams
Wipe The Drive!!! - Techniques For Malware Persistence
17:00
Medin
Apple iOS Certificate Tomfoolery
17:30
O'Connor, Tomes
Hide And Seek, Post-Exploitation Style
18:00
Fisher
Bringing The Sexy Back To...Defense In Depth
18:30
Blaze, Eagle, Invisigoth, Marcus, Schearer
Hackers get Schooled: Learning Lessons from Academia
20:05
Chubirka, Reck
Thin Slicing a Black Swan: A Search for the Unknowns
20:25
Weidman
When Did the Smartphone Pentest Framework Get Awesome?
20:45
Steele
ShellSquid: Distributed Shells With Node
21:05
Neulist
If You Can Open The Terminal, You Can Capture The Flag: CTF for Everyone
21:25
Klein
Becoming a Time Lord – Implications of Attacking Time Sources
21:45
Nather
Swinging Security Style: An Immodest Proposal
ShmooCon IX - 2013 - Saturday, February 16
10:00
Matheson, Nighswander, Randall, Thorson, Wiens
Running a CTF: Panel and Discussion on the Art of Hacker Gaming
Graham
C10M – Defending the Internet At Scale
Mende, Turbing
Paparazzi Over IP
11:00
Anthony, Reed
DIY: Using Trust To Secure Embedded Projects
Miller, Wick
Moloch: A New And Free Way To Index Your Packet Capture Repository
Joyce
Openstack Security Brief
12:00
Rash
Generalized Single Packet Authorization For Cloud Computing Environments
Bratus, Patterson
From "Shotgun Parsers" to Better Software Stacks
Hofmann, Kerr
The Computer Fraud and Abuse Act: Swartz, Auernheimer, and Beyond
14:00
Harman
Malware Analysis: Collaboration, Automation & Training
Bigman, Ferraiolo, McGovern, Rosen
Bright Shiny Things = Why We Need Intelligent Data Access Controls
Zimmerman
Ten Strategies of a World-Class Computer Security Incident Response Team
15:00
Faynberg
Armor For Your Android Apps
Schuetz
Protecting Sensitive Information on iOS Devices
Aestetix
Beyond Nymwars: An Analysis Of The Online Identity Battleground
16:00
Ryan
How Smart Is Bluetooth Smart?
Khan, Shields
Chopshop: Busting The Gh0St
Pitchford
The Cloud - Storms On The Horizon
17:00
Potter, Potter
0wn The Con
Caceres
PunkSPIDER: An Open Source, Scalable Distributed Fuzzing Project Targeting The Entire Internet
Bowes
Crypto: You're Doing It Wrong
18:35
Hinkel
Drones: Augmenting your cyber attack tool bag with aerial weapon systems
18:55
Profanick
Managed Service Providers: Pwn One and Done
19:15
Campbell
No Tools? No Problem! Building a PowerShell Botnet
19:35
Willis
Extending the 20 Critical Security Controls to Gap Assessments and Security Maturity Modelling
19:55
Gardener
Protecting Big Data From Cyber APT in the Cloud
20:15
Goodspeed
Writing a Thumbdrive for Active Disk Antiforensics
ShmooCon IX - 2013 - Sunday, February 17
10:00
Pisano
Identity-Based Internet Protocol Network
Randall
NSM And More With Bro Network Monitor
Schearer
These Go to Eleven: When the Law Goes Too Far
11:00
Moulton
Forensics - ExFat Bastardized for Cameras
Bangert, Bratus
Page Fault Liberation Army Or Better Security Through Trapping
Hardy
Hacking As An Act Of War
12:00
Hudak
Mastiff: Automated Static Analysis Framework
Atlas, Cutaway
Attacking Scada Wireless Systems For Fun And Profit - And Fixing
Russell
Ka-Ching! How To Make Real Money
13:30
Barnum, Wilson
Is Practical Information Sharing Possible?
14:30
Potter
Closing Remarks


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.