© recon.cx 2005-2014
  • home
  • conference
  • training
  • schedule
  • cfp
  • sponsors
  • travel
  • archives
  • contact

Recon 2014 Schedule

  • Schedule
  • Speakers
  • Events
  • iCalendar
  • -
  • xCal
  • -
  • XML
  • -
  • JSON


  Title Track Speakers
Event_small
Apple SMC, The place to be, definitely! (For an implant)
At NoSuchCon 2013 in Paris, I first revealed the details behind Apple's...
Main
  • Alex Ionescu
Event_small
Automatic Reverse Compilation & Semantic Comprehension
Main
  • Christopher Abad (aempirei)
Event_small
DRM obfuscation versus auxiliary attacks
Code obfuscation is used in many places nowadays: - in software protection,...
Main
  • Mougey Camille
  • Francis Gabriel
Event_small
Dynamic Analysis Kung-Fu with PANDA
We've created a new platform for doing dynamic analysis and reverse...
Main
  • Brendan Dolan-Gavitt
Event_small
Exploit tips and techniques
3xploit techniques/tricks will present our engineering analysis and response...
Main
  • William Peteroy
  • Swamy Gangadhara
Event_small
Exploring the impact of a hard drive backdoor
This talk presents a firmware attack on an off-the-shelf hard drive. The...
Main
  • Jonas Zaddach
Event_small
FunCap
The presentation will be about a tool called FunCap...
Main
  • Andrzej Dereszowski
Event_small
Fuzzing and Patch Analysis: SAGEly Advice
Last year, in "Taint Nobody Got Time for Crash Analysis", we presented...
Main
  • Richard Johnson
Event_small
Glitching For n00bs
Main
  • exide
Event_small
Going gets tough: a tale of encounters with novel evasive malware.
Main
  • Marta Janus
Event_small
Here be Dragons
Have you ever wanted to know what happens deep in the boot cycle on the...
Main
  • Josh "m0nk" Thomas
  • Nathan Keltner
Event_small
How do I RE object oriented code (and you should too)
In this talk I will present my award winning IDA plugin hexrays_tools....
Main
  • Milan Bohacek
Event_small
Intel Management Engine Secrets
Main
  • Igor Skochinsky
Event_small
Keynote
Main
  • Eva Galperin
Event_small
Memory Tracing: Forensic Reverse Engineering
*Memory tracing* is an entirely novel reverse engineering technique, which we...
Main
  • Endre Bangerter
  • Dominic Fischer
Event_small
Performing Open Heart Surgery on a Furby
No product has fueled more nightmares in children than the satanic toy known...
Main
  • Michael Coppola (mncoppola)
Event_small
PIN-Point Control for Analyzing Malware
Reversing malware can be tedious and time-consuming, especially when it comes...
Main
  • Jason Jones
Event_small
Power Analysis and Clock Glitching with the Open-Source ChipWhisperer Platform
There's a variety of well-known attack methods which seem to have 'mythical'...
Main
  • Colin O'Flynn
Event_small
Reverse Engineering Flash Memory For Fun and Benefit
There are many benefits to interacting directly with Flash memory when you're...
Main
  • Matt Oh
Event_small
Reversing on the Edge
GraphDBs are becoming the new hot thing for research in many fields,...
Main
  • Jason Jones
  • Jasiel Spelman
Event_small
Rewriting x86 Binaries
Binary code from untrusted sources remains one of the primary vehicles for...
Main
  • Wartortell
Event_small
SDR Tricks with HackRF
Main
  • Michael Ossmann
Event_small
Shall we play a game?
Main
  • Elad Shapira ("Zest")
Event_small
Static Translation of X86 Instruction Semantics to LLVM With McSema
We have developed McSema, a new framework for analyzing and transforming...
Main
  • Artem Dinaburg
  • Andrew Ruef
Event_small
Breaking Out of VirtualBox through 3D Acceleration
Main
  • Francisco Falcon
Event_small
The Making of the Kosher Phone
A Kosher phone would be an adapted feature phone to the "special" needs of a...
Main
  • Assaf Nativ