© recon.cx 2005-2015
  • home
  • conference
  • training
  • schedule
  • cfp
  • sponsors
  • travel
  • archives
  • contact

Recon 2015 Schedule

  • Schedule
  • Speakers
  • Events
  • iCalendar
  • -
  • xCal
  • -
  • XML
  • -
  • JSON


  Title Track Speakers
Event_small
'0x3E9 Ways to DIE'
Along the years many attempts have been made to combine static and dynamic...
Main
  • Yaniv Balmas
Event_small
Abusing Silent Mitigations
In the summer of 2014, Microsoft silently introduced two new exploit...
Main
  • Brian Gorenc
  • Simon Zuckerbraun
  • Abdul-Aziz Hariri
Event_small
Attacking and Defending BIOS in 2015
In this presentation we will demonstrate multiple types of recently...
Main
  • Yuriy Bulygin
  • Mikhail Gorobets
  • Andrew Furtak
  • Oleksandr Bazhaniuk
  • Alexander Matrosov
  • Mickey Shkatov
Event_small
Building a Better Bluetooth Attack Framework
Bluetooth attacks have been around for some time. Previously we did...
Main
  • Chris Weedon
Event_small
Exploiting Out-of-Order-Execution
Given the rise in popularity of cloud computing and platform-as-a-service,...
Main
  • Sophia D'Antoine
Event_small
Finish Him!
For a decade from the early 90's to the early 2000's, Williams' Digital...
Main
  • exide
Event_small
From Silicon to Compiler
Programmable logic devices have historically been locked up behind...
Main
  • Andrew Zonenberg
Event_small
Glitching and Side-Channel Analysis for All
The super-cool area of side-channel power analysis and glitching attacks are...
Main
  • Colin O’Flynn
Event_small
Hooking Nirvana
In this talk we will cover 5 novel instrumentation techniques that all rely...
Main
  • Alex Ionescu
Event_small
Introducing PCBRE
PCB Reverse engineering is the process of taking a physical Printed Circuit...
Main
  • David Carne
Event_small
"One font vulnerability to rule them all"
"Font rasterization software is clearly among the most desirable attack...
Main
  • Mateusz "j00ru" Jurczyk
Event_small
Pandora's Cash Box: The Ghost Under Your POS
We're all used to seeing the ubiquitous cash drawer - that steel box, usually...
Main
  • Nitay Artenstein
  • Shift Reduce
Event_small
Polyglots and Chimeras in Digital Radio Modes
Ah Matryoshkas, who doesn't like these Russian nesting dolls? But why should...
Main
  • Travis Goodspeed
  • Sergey Bratus
Event_small
Radare2, building a new IDA
We will present radare2, a free, lgpl-licenced, modular reverse engineering...
Main
  • Jeffrey Crowell
  • Julien Voisin
Event_small
Reverse Engineering Windows AFD.sys
What happens when you make a socket() call in Windows? This presentation will...
Main
  • Steven Vittitoe
Event_small
Reversing the Nintendo 64 CIC
This presentation covers our successful efforts to reverse engineer and clone...
Main
  • Mike Ryan
  • John McMaster
  • marshallh
Event_small
The M/o/Vfuscator
Based on a paper that proves that the "mov" instruction is Turing complete,...
Main
  • Christopher Domas
Event_small
This Time Font hunt you down in 4 bytes
In our recent work we targeted also win32k, what seems to be fruit giving...
Main
  • Peter Hlavaty
  • Jihui Lu
Event_small
Totally Spies!
For some months now, there were rumors of cartoon-named malware employed in...
Main
  • Joan Calvet
  • Marion Marschalek
  • Paul Rascagnères
Event_small
Towards Transparent Dynamic Binary Instrumentation using Virtual Machine Introspection
The idea is simple enough: Binary instrumentation as done by DynamoRIO and...
Main
  • Julian Kirsch
Event_small
Understaning the Microsoft Office Protected-View Sandbox
The first part of this talk will sketch the Protected-View sandbox internals...
Main
  • Yong Chuan, Koh