What

REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It is held annually in Montreal, Canada.


The conference offers a single track of presentations over the span of three days along with technical training sessions held before the presentation dates. Technical training varies in length between two and four days.

When

Conference: June 3-5   2022

Training: May 30-June 2  2022

Where

REcon will be held in downtown Montreal, Canada at the Hilton Double Tree Montreal

Training will be held both at Hilton Double Tree and at Monville Hotel a block away from Hilton Double Tree.

Register

Conference registration is now open .

News

2022/05/12 The talks of Recon 2022 have been selected! Full schedule and description comming soon. The presentations are:

- Beyond AlphaGolang: Automated hunting based on reversing Go binaries by Juan Andres Guerrero-Saade
- Pulling MikroTik into the Limelight: Demystifying and Jailbreaking RouterOS by Harrison Green and Ian Dupont
- Dotnetfile: parsing .NET PE files has never been easier by Yaron Samuel
- Reversing an M32C firmware -- Lesson learned from playing with an uncommon architecture by Philippe Laulheret
- Exploring a New Class of Kernel Exploit Primitive by Andrew Ruddick and Rohit Mothe
- Zooming in on Zero-click Exploits by Natalie Silvanovich
- Detect Me If You Can - Anti-Firmware Forensics by Takahiro Haruyama
- Under the hood of Wslink's multilayered virtual machine by Vladislav HrĨka
- A Dirty Little History: Bypassing Spectre Hardware Defenses to Leak Kernel Data by Enrico Barberis and Pietro Frigo
- Samsara Metamorphic Engine by Michael Grube
- Function overrides, from a Security mitigation to a fully-fledged Performance Feature in Windows by Andrea Allievi
- Analysis of a nation-state Chrome exploit by David Manouchehri
- The Mysterious Life of an Exception by Fabian Freyer and Marius Muench
- The Next Generation of Virtualization-based Obfuscators by Tim Blazytko and Moritz Schloegel
- Malware Wars: DarkSide Strikes Back as BlackMatter by Lindsay Kaye and James Niven
- Living Off the Walled Garden: Abusing the Features of the Early Launch Antimalware Ecosystem by Matt Graeber
- Researching the Unisoc baseband, like in the army by Slava Makkaveev
- Reverse engineering of black-box binaries with symbolic and concolic execution techniques by Jannis Kirschner(Workshop)
- Breaking the Glass Sandbox: Find Linux Kernel Bugs and Escape by Valentina Palmiotti
- When Wireless Malware Stays On After Turning Off iPhones by Jiska
- Project TEMPA - Demystifying Tesla's Bluetooth Passive Entry system by Martin Herfurt
- Instrumenting system applications on Android stock images (followed by a workshop) by Vitor Ventura

2022/03/07 The REcon 2022 CFP and Trainings have been announced!

2022/04/15 The first phase CFP talks of Recon 2022 have been selected, with more announcements coming soon! These presentations are:

- Researching the Unisoc baseband, like in the army by Slava Makkaveev
- Reverse engineering of black-box binaries with symbolic and concolic execution techniques by Jannis Kirschner(Workshop)
- Breaking the Glass Sandbox: Find Linux Kernel Bugs and Escape by Valentina Palmiotti
- When Wireless Malware Stays On After Turning Off iPhones by Jiska
- Project TEMPA - Demystifying Tesla's Bluetooth Passive Entry system by Martin Herfurt
- Instrumenting system applications on Android stock images (followed by a workshop) by Vitor Ventura