REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It is held annually in Montreal, Canada. It offers a single track of presentations over the span of three days with a focus on reverse engineering and advanced exploitation techniques.

    For more information, including pricing and hotel reservation details, head over to the conference page.


    Conference: June 16 - 18, 2017

    Training: June 12 - 15, 2017


    REcon will be held in downtown Montreal, Canada at the Hyatt Regency Montreal.

    Important Note: As of this year many foreign travelers to Canada will require an Electronic Travel Authorization (eTA) prior to entering the country. Please check the following website to find out if this applies to you: http://www.cic.gc.ca/english/visit/visas.asp


    Conference registration is now open.

  • Recon MTL 2017 Recordings

    The REcon MTL 2017 Recordings are starting to be released!

  • Recon MTL 2017 Slides

    The REcon MTL 2017 Slides have been published!

  • Recon MTL 2017 Schedule

    The REcon MTL 2017 Schedule has been released!

  • HELLO ! Announcing RECON 2017 Talks

    RECON 2017 Talks

    • zapZap! bangBang!

      – Ang Cui, Rick Housley

    • You can run, but you can’t hide

      – Vlad Sabaka

    • Mazewalker

      – Yevgeniy Kulakov

    • APT3 Uncovered - The code evolution of Pirpi

      – Micah Yates

    • FreeCalypso: a fully liberated GSM baseband

      – Mychaela Falconia

    • Exporting IDA Debug Information

      – Adam Schwalm

    • Fun with Sam: Inside the Surface Aggregator Module

      – Alex Ionescu


      – Fabrice Desclaux, Camille Mougey

    • SGX Enclave Programming: Common Mistakes

      – Michael Atlas

    • Hacking Cell Phone Embedded Systems

      – Keegan Ryan

    • Bubble Struggle

      – Marion Marschalek

    • Crypton

      – Julia Karpin, Anna Dorfman

    • The Life-Changing Magic of IDAPython: Embedded Device Edition

      – Maddie Stone

    • The HyperV Architecture and its Memory Manager

      – Andrea Allievi

    • The Lightbulb Worm

      – Colin O’Flynn, Eyal Ronen

    • Coverage Guided Kernel Fuzzing

      – Richard Johnson

    • BinCAT: purrfecting binary static analysis

      – Philippe Biondi, Xavier Mehrenberger, Raphaël Rigo, Sarah Zennou

    • BASS Automated Signature Synthesizer

      – Mariano Graziano, Jonas Zaddach

    • Bochspwn Reloaded: Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking

      – Mateusz “j00ru” Jurczyk

    • Digging Into the Core of Boot

      – Yuriy Bulygin, Oleksandr Bazhaniuk

    • Reverse Engineering DSSS

      – Michael Ossmann

    • HDI PCB Netlist Recovery: a new (old) technique

      – David Carne

  • Sold-Out

    Good news everyone! The conference is now at full capacity! We realize this might be troublesome to some people requiring longer times for approvals; if you’re in a situation where you would like take part in the training sessions and stay for the conference as well, please contact us, as a small quantity of slots have been held for this purpose.

    If you would like to register your interest for the conference in case some participants release or cancel their tickets, please do so directly on the Recon Store by adding yourself to the waiting-list.

    We will be releasing any leftover spots that were previously held on a first-come, first-served basis, so we recommend you sign-up early. Please note that signing-up to the waiting-list does not oblige you to pay anything on its own.

    Thank you so much for your overwhelming support this year again, we are looking forward to seeing you all in Montreal next month!

  • The first round of talks have been accepted

    We’d like to congratulate the submitters who have been selected for the first phase of the CFP!

    • Bubble Wars: Call Graph Visualization with Radare2

      – by Marion Marschalek

    • Damn vulnerable SGX enclave

      – by Michael Atlas

    • Fun with Sam: Inside the Surface Aggregator Module

      – by Alex Ionescu

    • The HyperV Architecture and its Memory Manager

      – by Andrea Allievi

    • The Lightbulb Worm: A Debriefing on Philips Hue Attacks

      – by Colin O’Flynn and Eyal Ronen

    • You can run, but you can’t hide

      – by Vlad Sabaka

    • zapZap! bangBang! - Defeating Secure Boot Using Electromagnetic Pulses and badFET

      – by Ang Cui and Rick Housley

    There is still time to get your submissions in for this edition of Recon Montreal; the CFP closes on April 15th, and the final selection will be announced during the first week of May!

  • A new training has appeared!

    Announcing a new training by Robert C. Seacord : Secure coding in C and C++

  • Recon 2017 CFP

    The REcon 2017 CFP and Trainings have been announced!

subscribe via RSS