© recon.cx 2005-2014
  • home
  • conference
  • training
  • schedule
  • cfp
  • sponsors
  • travel
  • archives
  • contact

Recon 2014 Schedule

  • Schedule
  • Speakers
  • Events
  • iCalendar
  • -
  • xCal
  • -
  • XML
  • -
  • JSON


  Name Events
Person_small
Alex Ionescu
  • Apple SMC, The place to be, definitely! (For an implant)
Person_small
Andrew Ruef
  • Static Translation of X86 Instruction Semantics to LLVM With McSema
Person_small
Andrzej Dereszowski
  • FunCap
Person_small
Artem Dinaburg
  • Static Translation of X86 Instruction Semantics to LLVM With McSema
Person_small
Assaf Nativ
  • The Making of the Kosher Phone
Person_small
Brendan Dolan-Gavitt
  • Dynamic Analysis Kung-Fu with PANDA
Person_small
Christopher Abad (aempirei)
  • Automatic Reverse Compilation & Semantic Comprehension
Person_small
Colin O'Flynn
  • Power Analysis and Clock Glitching with the Open-Source ChipWhisperer Platform
Person_small
Dominic Fischer
  • Memory Tracing: Forensic Reverse Engineering
Person_small
Elad Shapira ("Zest")
  • Shall we play a game?
Person_small
Endre Bangerter
  • Memory Tracing: Forensic Reverse Engineering
Person_small
Eva Galperin
  • Keynote
Person_small
Francis Gabriel
  • DRM obfuscation versus auxiliary attacks
Person_small
Francisco Falcon
  • Breaking Out of VirtualBox through 3D Acceleration
Person_small
Igor Skochinsky
  • Intel Management Engine Secrets
Person_small
Jasiel Spelman
  • Reversing on the Edge
Person_small
Jason Jones
  • Reversing on the Edge
  • PIN-Point Control for Analyzing Malware
Person_small
Jonas Zaddach
  • Exploring the impact of a hard drive backdoor
Person_small
Josh "m0nk" Thomas
  • Here be Dragons
Person_small
Marta Janus
  • Going gets tough: a tale of encounters with novel evasive malware.
Person_small
Matt Oh
  • Reverse Engineering Flash Memory For Fun and Benefit
Person_small
Michael Coppola (mncoppola)
  • Performing Open Heart Surgery on a Furby
Person_small
Michael Ossmann
  • SDR Tricks with HackRF
Person_small
Milan Bohacek
  • How do I RE object oriented code (and you should too)
Person_small
Mougey Camille
  • DRM obfuscation versus auxiliary attacks
Person_small
Nathan Keltner
  • Here be Dragons
Person_small
Richard Johnson
  • Fuzzing and Patch Analysis: SAGEly Advice
Person_small
Swamy Gangadhara
  • Exploit tips and techniques
Person_small
Wartortell
  • Rewriting x86 Binaries
Person_small
William Peteroy
  • Exploit tips and techniques
Person_small
exide
  • Glitching For n00bs