© recon.cx 2005-2014
  • home
  • conference
  • training
  • schedule
  • cfp
  • sponsors
  • travel
  • archives
  • contact

Recon 2014 Schedule

  • Schedule
  • Speakers
  • Events
  • iCalendar
  • -
  • xCal
  • -
  • XML
  • -
  • JSON


DAY 1 (2014-06-27)

08:00

08:15

08:30

08:45

09:00

09:15

09:30

Conference Opening

Hugo Fortier

09:45

10:00

Keynote

Eva Galperin

10:15

10:30

Intel Management Engine Secrets

Igor Skochinsky

10:45

11:00

11:15

11:30

SDR Tricks with HackRF

Michael Ossmann

11:45

12:00

Lunch - Room: Soprano

12:15

12:30

12:45

13:00

Glitching For n00bs

A Journey to Coax Out Chips' Inner Secrets
exide

13:15

13:30

13:45

Reversing on the Edge

Traversing the paths for using GraphDBs in RE
Jason Jones, Jasiel Spelman

14:00

14:15

Breaking Out of VirtualBox through 3D Acceleration

Francisco Falcon

14:30

14:45

15:00

Going gets tough: a tale of encounters with novel evasive malware.

Marta Janus

15:15

15:30

Coffee Break

15:45

16:00

Reverse Engineering Flash Memory For Fun and Benefit

Matt Oh

16:15

16:30

16:45

17:00

Automatic Reverse Compilation & Semantic Comprehension

Christopher Abad (aempirei)

17:15

17:30

17:45

18:00

18:15

18:30

18:45

19:00

19:15

19:30

19:45

20:00

20:15

20:30

20:45

21:00

21:15

21:30

21:45

22:00

22:15

22:30

22:45

23:00

23:15

DAY 2 (2014-06-28)
 
 
 
 
 
 
 
 

Static Translation of X86 Instruction Semantics to LLVM With McSema

Artem Dinaburg, Andrew Ruef

Here be Dragons

A Bedtime Tale for Sleepless Nights
Josh "m0nk" Thomas, Nathan Keltner

Lunch - Room: Soprano

The Making of the Kosher Phone

Assaf Nativ

Fuzzing and Patch Analysis: SAGEly Advice

Richard Johnson

PIN-Point Control for Analyzing Malware

Jason Jones

Coffee Break

Apple SMC, The place to be, definitely! (For an implant)

Alex Ionescu

Memory Tracing: Forensic Reverse Engineering

Endre Bangerter, Dominic Fischer

Coffee Break

How do I RE object oriented code (and you should too)

Milan Bohacek

Performing Open Heart Surgery on a Furby

Michael Coppola (mncoppola)
 
 
 
 
 
 
 
 
 
 
 
 
 
 
DAY 3 (2014-06-29)
 
 
 
 
 
 
 
 

Shall we play a game?

Lessons learned while playing CoreWars8086
Elad Shapira (“Zest”)

FunCap

Andrzej Dereszowski

DRM obfuscation versus auxiliary attacks

Mougey Camille, Francis Gabriel

Lunch - Room: Soprano

Rewriting x86 Binaries

Many PEs, Such Secure, Wow.
Wartortell

Dynamic Analysis Kung-Fu with PANDA

Brendan Dolan-Gavitt

Power Analysis and Clock Glitching with the Open-Source ChipWhisperer Platform

Colin O’Flynn

Coffee Break

Exploit tips and techniques

William Peteroy, Swamy Gangadhara

Exploring the impact of a hard drive backdoor

Jonas Zaddach

Closing Ceremony

Hugo Fortier