SOURCE Boston 2013 - Tuesday, April 16
12:00
Kim
Opening Keynote
13:00
Miller
Games We Play: Payoffs & Chaos Monkeys
Valasek
CANCELLED - An Examination of String Allocations in Internet Explorer 9
Eduardo, Linn, Santos
Rise in ATM Compromises
Wisniewski
Inside the Black Hole Exploit Kit (BHEK)
14:00
Permeh
CANCELLED - I Built My House On Sand - Embedded Security at the Firmware Layer
Lanier
Android App Pitfalls
Claudius
Attacking Cloud Services with Source Code
Jaquith
Bring Your Own Device: Keeping it Simple and Effective
15:30
Dai Zovi
Strategic Analysis of the iOS Jailbreak Development Community
Chow
JavaScript Pitfalls
Florer
The Base Rate Fallacy: Information Security Needs To Understand This.
16:30
Cran
Speed Networking
Rioux
CANCELLED - Let's Write Some IOS Malware
Wysopal
We have seen the future, and it is not pretty
Baldet
Suicide Risk Assessment and Intervention Tactics
SOURCE Boston 2013 - Wednesday, April 17
10:00
Geer, Thieme
Fireside Chat with Dan Geer and Richard Thieme
11:00
Cohen
Theory and Application of Realistic Capture the Flag Competitions
Nye
Third Party Security Assurance: The Service Provider Perspective
Cross
Insider Threat: Hunting for Authorized Evil
13:30
Cran
Pwnie Express presents Practical MitM Pentesting
Carielli, Curry
Distributed Security: Expanding the Toolkit for Institutional Resilience
14:30
Diaz
Birds, bots and machines - Fraud in Twitter and how to detect it using Machine Learning Techniques
Nather
Analyzing the Chemistry of Data
16:00
Ternus
Adversarial Resilience at the Planetary Scale
Whitsitt
"Cyber" Momentum: Understanding & Leveraging the National Cybersecurity Policy Debate
Linn, Ryan
Hooked on Packets: Reading Pcaps for D students
17:00
Kouns
Big Data? Big Liability!
Goerlich
Punch and Counter-punch with .Net Apps
Maske
"Hacking Back" is a Bad Idea
SOURCE Boston 2013 - Thursday, April 18
10:00
Ellis
Herding Lizards: How to avoid Security Subsistence Syndrome
11:00
Skoudis
Kinetic Pwnage: Obliterating the Line Between Computers and the Physical World
Crowley
No-Knowledge Crypto Attacks
13:30
Jacobs, Rudis
Data Analysis and Visualization for Security Professionals
Schuetz
Protecting sensitive information on iOS devices
Rege
Adversarial Decision Making in Critical Infrastructure Cyberattacks
14:30
Towne
A Brief History of Physical Security - Schuyler Towne
Jackson
Blitzing with your Defense
Claudius, Jackson, Montoro
HTTP Header Hunting - A Behavioral Approach to Malware Detection
15:30
Dragorn, Kershaw, Ossmann
Building Your Own Packet Capture Platform
Geer, Hay
Facilitating Fluffy Forensics (a.k.a. Considerations for Cloud Forensics)
Sobell
Attacking NFC Mobile Wallets: Where Trust Breaks Down
16:30
Wait! Wait! Don't Pwn Me!
17:30
Closing Remarks


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.