Schedule
Schedule for Recon 2017:
You can run, but you can’t hide
Bochspwn Reloaded: Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking
Fun with Sam: Inside the Surface Aggregator Module
BinCAT: purrfecting binary static analysis
Hacking Cell Phone Embedded Systems
Exporting IDA Debug Information
BASS Automated Signature Synthesizer
The HyperV Architecture and its Memory Manager
Bubble Struggle - Call Graph Visualization with Radare2
The Lightbulb Worm - A Debriefing on Philips Hue Attacks
HDI PCB Netlist Recovery: a new (old) technique
Miasm: reverse engineering framework
FreeCalypso: a fully liberated GSM baseband
Coverage Guided Kernel Fuzzing
Crypton - Exposing malware’s deepest secrets
SGX Enclave programming: common mistakes
MazeWalker - Enriching static malware analysis
The Life-Changing Magic of IDAPython: Embedded Device Edition
APT3 Uncovered - The code evolution of Pirpi