home
conference
training
schedule
cfp
sponsors
travel
archives
contact
Recon 2014 Schedule
Schedule
Speakers
Events
iCalendar
-
xCal
-
XML
-
JSON
Name
Events
Alex Ionescu
Apple SMC, The place to be, definitely! (For an implant)
Andrew Ruef
Static Translation of X86 Instruction Semantics to LLVM With McSema
Andrzej Dereszowski
FunCap
Artem Dinaburg
Static Translation of X86 Instruction Semantics to LLVM With McSema
Assaf Nativ
The Making of the Kosher Phone
Brendan Dolan-Gavitt
Dynamic Analysis Kung-Fu with PANDA
Christopher Abad (aempirei)
Automatic Reverse Compilation & Semantic Comprehension
Colin O'Flynn
Power Analysis and Clock Glitching with the Open-Source ChipWhisperer Platform
Dominic Fischer
Memory Tracing: Forensic Reverse Engineering
Elad Shapira ("Zest")
Shall we play a game?
Endre Bangerter
Memory Tracing: Forensic Reverse Engineering
Eva Galperin
Keynote
Francis Gabriel
DRM obfuscation versus auxiliary attacks
Francisco Falcon
Breaking Out of VirtualBox through 3D Acceleration
Igor Skochinsky
Intel Management Engine Secrets
Jasiel Spelman
Reversing on the Edge
Jason Jones
Reversing on the Edge
PIN-Point Control for Analyzing Malware
Jonas Zaddach
Exploring the impact of a hard drive backdoor
Josh "m0nk" Thomas
Here be Dragons
Marta Janus
Going gets tough: a tale of encounters with novel evasive malware.
Matt Oh
Reverse Engineering Flash Memory For Fun and Benefit
Michael Coppola (mncoppola)
Performing Open Heart Surgery on a Furby
Michael Ossmann
SDR Tricks with HackRF
Milan Bohacek
How do I RE object oriented code (and you should too)
Mougey Camille
DRM obfuscation versus auxiliary attacks
Nathan Keltner
Here be Dragons
Richard Johnson
Fuzzing and Patch Analysis: SAGEly Advice
Swamy Gangadhara
Exploit tips and techniques
Wartortell
Rewriting x86 Binaries
William Peteroy
Exploit tips and techniques
exide
Glitching For n00bs