home
conference
training
schedule
cfp
sponsors
travel
archives
contact
Recon 2015 Schedule
Schedule
Speakers
Events
iCalendar
-
xCal
-
XML
-
JSON
Name
Events
Jihui Lu
This Time Font hunt you down in 4 bytes
Abdul-Aziz Hariri
Abusing Silent Mitigations
Alex Ionescu
Hooking Nirvana
Alexander Matrosov
Attacking and Defending BIOS in 2015
Andrew Furtak
Attacking and Defending BIOS in 2015
Andrew Zonenberg
From Silicon to Compiler
Brian Gorenc
Abusing Silent Mitigations
Chris Weedon
Building a Better Bluetooth Attack Framework
Christopher Domas
The M/o/Vfuscator
Colin O’Flynn
Glitching and Side-Channel Analysis for All
David Carne
Introducing PCBRE
Jeffrey Crowell
Radare2, building a new IDA
Joan Calvet
Totally Spies!
John McMaster
Reversing the Nintendo 64 CIC
Julian Kirsch
Towards Transparent Dynamic Binary Instrumentation using Virtual Machine Introspection
Julien Voisin
Radare2, building a new IDA
Marion Marschalek
Totally Spies!
marshallh
Reversing the Nintendo 64 CIC
Mateusz "j00ru" Jurczyk
"One font vulnerability to rule them all"
Mickey Shkatov
Attacking and Defending BIOS in 2015
Mike Ryan
Reversing the Nintendo 64 CIC
Mikhail Gorobets
Attacking and Defending BIOS in 2015
Nitay Artenstein
Pandora's Cash Box: The Ghost Under Your POS
Oleksandr Bazhaniuk
Attacking and Defending BIOS in 2015
Paul Rascagnères
Totally Spies!
Peter Hlavaty
This Time Font hunt you down in 4 bytes
Sergey Bratus
Polyglots and Chimeras in Digital Radio Modes
Shift Reduce
Pandora's Cash Box: The Ghost Under Your POS
Simon Zuckerbraun
Abusing Silent Mitigations
Sophia D'Antoine
Exploiting Out-of-Order-Execution
Steven Vittitoe
Reverse Engineering Windows AFD.sys
Travis Goodspeed
Polyglots and Chimeras in Digital Radio Modes
Yaniv Balmas
'0x3E9 Ways to DIE'
Yong Chuan, Koh
Understaning the Microsoft Office Protected-View Sandbox
Yuriy Bulygin
Attacking and Defending BIOS in 2015
exide
Finish Him!