Schedule
Schedule for Recon 2017:
Reverse Engineering Satellite Based IP Content Distribution
Harnessing Intel Processor Trace on Windows for fuzzing and dynamic analysis
Transforming Open Source to Open Access in Closed Applications
Embedded devices reverse engineering
A Little Less Conversation, A Little More ActionScript
GRAP: define and match graph patterns within binaries
Getting Physical with USB Type-C: Windows 10 RAM Forensics and UEFI Attacks
Poutine: Dusting Forgotten Lore
Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware
Breaking Code Read Protection on the NXP LPC-family Microcontrollers
Teaching Old Shellcode New Tricks
Analyzing iOS apps: road from AppStore to security analysis report
Reverse engineering of file formats and network protocols using Kaitai Struct
Hopeless Relay Protection for Substation Automation
Baring the system: New vulnerabilities in SMM of Coreboot and UEFI based systems