© recon.cx 2005-2015
  • home
  • conference
  • training
  • schedule
  • cfp
  • sponsors
  • travel
  • archives
  • contact

Recon 2015 Schedule

  • Schedule
  • Speakers
  • Events
  • iCalendar
  • -
  • xCal
  • -
  • XML
  • -
  • JSON


  Name Events
Person_small
Jihui Lu
  • This Time Font hunt you down in 4 bytes
Person_small
Abdul-Aziz Hariri
  • Abusing Silent Mitigations
Person_small
Alex Ionescu
  • Hooking Nirvana
Person_small
Alexander Matrosov
  • Attacking and Defending BIOS in 2015
Person_small
Andrew Furtak
  • Attacking and Defending BIOS in 2015
Person_small
Andrew Zonenberg
  • From Silicon to Compiler
Person_small
Brian Gorenc
  • Abusing Silent Mitigations
Person_small
Chris Weedon
  • Building a Better Bluetooth Attack Framework
Person_small
Christopher Domas
  • The M/o/Vfuscator
Person_small
Colin O’Flynn
  • Glitching and Side-Channel Analysis for All
Person_small
David Carne
  • Introducing PCBRE
Person_small
Jeffrey Crowell
  • Radare2, building a new IDA
Person_small
Joan Calvet
  • Totally Spies!
Person_small
John McMaster
  • Reversing the Nintendo 64 CIC
Person_small
Julian Kirsch
  • Towards Transparent Dynamic Binary Instrumentation using Virtual Machine Introspection
Person_small
Julien Voisin
  • Radare2, building a new IDA
Person_small
Marion Marschalek
  • Totally Spies!
Person_small
marshallh
  • Reversing the Nintendo 64 CIC
Person_small
Mateusz "j00ru" Jurczyk
  • "One font vulnerability to rule them all"
Person_small
Mickey Shkatov
  • Attacking and Defending BIOS in 2015
Person_small
Mike Ryan
  • Reversing the Nintendo 64 CIC
Person_small
Mikhail Gorobets
  • Attacking and Defending BIOS in 2015
Person_small
Nitay Artenstein
  • Pandora's Cash Box: The Ghost Under Your POS
Person_small
Oleksandr Bazhaniuk
  • Attacking and Defending BIOS in 2015
Person_small
Paul Rascagnères
  • Totally Spies!
Person_small
Peter Hlavaty
  • This Time Font hunt you down in 4 bytes
Person_small
Sergey Bratus
  • Polyglots and Chimeras in Digital Radio Modes
Person_small
Shift Reduce
  • Pandora's Cash Box: The Ghost Under Your POS
Person_small
Simon Zuckerbraun
  • Abusing Silent Mitigations
Person_small
Sophia D'Antoine
  • Exploiting Out-of-Order-Execution
Person_small
Steven Vittitoe
  • Reverse Engineering Windows AFD.sys
Person_small
Travis Goodspeed
  • Polyglots and Chimeras in Digital Radio Modes
Person_small
Yaniv Balmas
  • '0x3E9 Ways to DIE'
Person_small
Yong Chuan, Koh
  • Understaning the Microsoft Office Protected-View Sandbox
Person_small
Yuriy Bulygin
  • Attacking and Defending BIOS in 2015
Person_small
exide
  • Finish Him!