Directory Tree

.
├── index.html
├── recon2015-01-joan-calvet-marion-marschalek-paul-rascagneres-Totally-Spies.pdf
├── recon2015-03-exide-Finish-Him.zip
├── recon2015-04-jeffrey-crowell-julien-voisin-Radare2-building-a-new-IDA.pdf
├── recon2015-05-peter-hlavaty-jihui-lu-This-Time-Font-hunt-you-down-in-4-bytes.pdf
├── recon2015-06-sophia-d-antoine-Exploiting-Out-of-Order-Execution.pdf
├── recon2015-07-travis-goodspeed-sergey-bratus-Polyglots-and-Chimeras-in-Digital-Radio-Modes.pdf
├── recon2015-09-yuriy-bulygin-oleksandr-bazhaniuk-Attacking-and-Defending-BIOS-in-2015.pdf
├── recon2015-10-yaniv-balmas-0x3E9-Ways-to-DIE.PDF
├── recon2015-13-colin-o-flynn-Glitching-and-Side-Channel-Analysis-for-All.pdf
├── recon2015-14-christopher-domas-The-movfuscator.pdf
├── recon2015-16-yong-chuan-koh-Understaning-the-Microsoft-Office-Protected-View-Sandbox.pdf
├── recon2015-17-nitay-artenstein-shift-reduce-Pandora-s-Cash-Box-The-Ghost-Under-Your-POS.pdf
├── recon2015-18-andrew-zonenberg-From-Silicon-to-Compiler.pdf
├── recon2015-19-mike-ryan-john-mcmaster-marshallh-Reversing-the-Nintendo-64-CIC.pdf
├── recon2015-20-steven-vittitoe-Reverse-Engineering-Windows-AFD-sys.pdf
└── recon2015-21-j00ru-One-font-vulnerability-to-rule-them-all.pdf


0 directories, 17 files