| DAY 1 (2015-06-19) | |
|---|---|
|
08:00 |
|
|
09:00 |
|
|
10:00 |
A Tour in Espionage Cartoons
|
|
11:00 |
Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection
|
|
12:00 |
The Soprano rooms are located on the 4th floor of the hotel.
|
|
13:00 |
Reversing Midway Arcade Audio With DeDCS
|
|
Creating an open source reverse engineering ecosystem.
|
|
|
14:00 |
|
|
15:00 |
Processor Side Channels to Enable Cross VM Code Execution
|
|
16:00 |
Featuring Practical Matryoshka Protocols for a 21st Century Numbers Station
|
|
17:00 |
|
|
18:00 |
|
|
19:00 |
|
|
20:00 |
|
|
21:00 |
|
|
22:00 |
|
| DAY 2 (2015-06-20) |
|---|
|
Introducing Dynamic IDA Enrichment framework (a.k.a DIE)
|
|
The Soprano rooms are located on the 4th floor of the hotel.
|
|
An open source PCB reverse-engineering suite
|
|
Stealthy Instrumentation Techniques for Windows 10
|
|
Turning 'mov' into a soul-crushing RE nightmare
|
|
Ubertooth attack and injection tool suite
|
| DAY 3 (2015-06-21) |
|---|
|
The Soprano rooms are located on the 4th floor of the hotel.
|
|
Reverse-Engineering the CoolRunner-II Bitstream Format
|
|
Reversing a 20 year old copy protection chip
|
|
Uncovering the Intricacies of the Ancillary Function Driver
|
|
"A story of cross-software ownage, shared codebases and advanced exploitation"
|