Title | Track | Speakers | |
---|---|---|---|
Apple SMC, The place to be, definitely! (For an implant)
At NoSuchCon 2013 in Paris, I first revealed the details behind Apple's... |
Main | ||
Automatic Reverse Compilation & Semantic Comprehension
|
Main | ||
DRM obfuscation versus auxiliary attacks
Code obfuscation is used in many places nowadays: - in software protection,... |
Main | ||
Dynamic Analysis Kung-Fu with PANDA
We've created a new platform for doing dynamic analysis and reverse... |
Main | ||
Exploit tips and techniques
3xploit techniques/tricks will present our engineering analysis and response... |
Main | ||
Exploring the impact of a hard drive backdoor
This talk presents a firmware attack on an off-the-shelf hard drive. The... |
Main | ||
FunCap
The presentation will be about a tool called FunCap... |
Main | ||
Fuzzing and Patch Analysis: SAGEly Advice
Last year, in "Taint Nobody Got Time for Crash Analysis", we presented... |
Main | ||
Glitching For n00bs
|
Main | ||
Going gets tough: a tale of encounters with novel evasive malware.
|
Main | ||
Here be Dragons
Have you ever wanted to know what happens deep in the boot cycle on the... |
Main | ||
How do I RE object oriented code (and you should too)
In this talk I will present my award winning IDA plugin hexrays_tools.... |
Main | ||
Intel Management Engine Secrets
|
Main | ||
Keynote
|
Main | ||
Memory Tracing: Forensic Reverse Engineering
*Memory tracing* is an entirely novel reverse engineering technique, which we... |
Main | ||
Performing Open Heart Surgery on a Furby
No product has fueled more nightmares in children than the satanic toy known... |
Main | ||
PIN-Point Control for Analyzing Malware
Reversing malware can be tedious and time-consuming, especially when it comes... |
Main | ||
Power Analysis and Clock Glitching with the Open-Source ChipWhisperer Platform
There's a variety of well-known attack methods which seem to have 'mythical'... |
Main | ||
Reverse Engineering Flash Memory For Fun and Benefit
There are many benefits to interacting directly with Flash memory when you're... |
Main | ||
Reversing on the Edge
GraphDBs are becoming the new hot thing for research in many fields,... |
Main | ||
Rewriting x86 Binaries
Binary code from untrusted sources remains one of the primary vehicles for... |
Main | ||
SDR Tricks with HackRF
|
Main | ||
Shall we play a game?
|
Main | ||
Static Translation of X86 Instruction Semantics to LLVM With McSema
We have developed McSema, a new framework for analyzing and transforming... |
Main | ||
Breaking Out of VirtualBox through 3D Acceleration
|
Main | ||
The Making of the Kosher Phone
A Kosher phone would be an adapted feature phone to the "special" needs of a... |
Main |