Schedule for Recon 2017:

Friday January 27:
10:00
Opening Ceremony
10:30

Your Chakra Is Not Aligned

11:00

Reverse Engineering Satellite Based IP Content Distribution

12:00
Lunch
13:00

Harnessing Intel Processor Trace on Windows for fuzzing and dynamic analysis

14:00

Contributor analysis

14:30
Coffee Break
15:00

Transforming Open Source to Open Access in Closed Applications

16:00

Embedded devices reverse engineering

17:00

A Little Less Conversation, A Little More ActionScript

Saturday January 28:
10:00

GRAP: define and match graph patterns within binaries

11:00

Getting Physical with USB Type-C: Windows 10 RAM Forensics and UEFI Attacks

12:00
Lunch
13:00

Poutine: Dusting Forgotten Lore

14:00

r2m2

14:30
Coffee Break
15:00

Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware

16:00

Breaking Code Read Protection on the NXP LPC-family Microcontrollers

17:00

Teaching Old Shellcode New Tricks

Sunday January 29:
10:00

Analyzing iOS apps: road from AppStore to security analysis report

11:00

Reverse engineering of file formats and network protocols using Kaitai Struct

12:00
Lunch
13:00

Hopeless Relay Protection for Substation Automation

14:00

miLazyCracker

14:30
Coffee Break
15:00

Baring the system: New vulnerabilities in SMM of Coreboot and UEFI based systems

16:00

Legacy Crypto Never Dies

16:30
Closing Ceremony