Version alpha

Events

Software Reverse Engineering

  Title Track Speakers
Event small
A Code Pirate's Cutlass
Large binaries produce giant call graphs and dividing up functionality in an...
Software Reverse Engineering
Event small
An Open-Source Machine-Code Decompiler
We present our machine-code decompiler called RetDec (Retargetable...
Software Reverse Engineering
Event small
Bushwhacking your way around a bootloader
Software Reverse Engineering
Event small
Discovering the iOS Instruments Server
This presentation documents how I was able to reverse-engineer a privileged...
Software Reverse Engineering
Event small
PreVice: Static Detection of Hooking Capabilities in Machine Code
In the future, static analysis catches hookers before they have a chance to...
Software Reverse Engineering
Event small
Rattle - an Ethereum EVM binary analysis framework
Software Reverse Engineering
Event small
Reverse Engineering Of Blockchain Smart Contracts
Software Reverse Engineering
Event small
Reverse Engineering Windows Defender Part II
Software Reverse Engineering
Event small
Sandbagility - Reverse Engineering Framework for Windows dynamic analysis
Software Reverse Engineering
Event small
SiliVaccine: North Korea's weapon of Mass Detection
Software Reverse Engineering
Event small
Static instrumentation based on executable file formats
Many instrumentation techniques are based on modifying code or system...
Software Reverse Engineering
Event small
This Dump is a Puzzle
Developing a puzzle solver to reconstruct embedded java firmwares from an...
Software Reverse Engineering
Event small
Tracing Struct Accesses with Struct Stalker
Struct Stalker is an LLDB script that instruments processes to trace...
Software Reverse Engineering

Malware Reverse Engineering

  Title Track Speakers
Event small
Analyzing TRISIS - the first Safety Instrumented System malware
Malware Reverse Engineering
Event small
Cloudy With a Chance of Malware
In 2017, KASPERAGENT and a malware we’re calling Cloudy were identified...
Malware Reverse Engineering
Event small
Malware Analysis and Automation using Binary Ninja
Malware Reverse Engineering
Event small
Modern Linux Malware Exposed
Malware Reverse Engineering

RF Reverse Enginering

  Title Track Speakers
Event small
Breath of the RF Field
RF Reverse Enginering

Hardware Reverse Enginnering

  Title Track Speakers
Event small
Building a Damned Good Watch
Hardware Reverse Enginnering

Firmware Reverse Engineering

  Title Track Speakers
Event small
Create your own Fitness Tracker Firmware
Firmware Reverse Engineering
Event small
Meet Salinas, the first ever SMS-commanded Car Infotainment RAT
Nowadays any recent car up to 5 years old comes with something called...
Firmware Reverse Engineering
Event small
Sum Total of ISA Knowledge
Firmware Reverse Engineering

Exploitation

  Title Track Speakers
Event small
Exploiting User-land vulnerabilities to Get Rogue App Installed Remotely on iOS 11
Exploitation
Event small
PWN Flash with Reflection and HashTables
Exploitation
Event small
Pwning Intel PIN
Exploitation
Event small
Taint-based return oriented programming
Exploitation
Event small
Unknown Known DLLs and other Code Integrity Trust Violations
Exploitation