Good news everyone !
Here is the list of selected talks for Recon Brussels 2018.
-
Breaking state-of-the-art binary code obfuscation - A program synthesis based approach
– by Tim Blazytko & Moritz Contag
-
Decompiler internals: microcode
– Ilfak Guilfanov
-
DIY ARM Debugger for Wi-Fi Chips
– by Matthias Schulz
-
Dissecting QNX - Analyzing & Breaking QNX Exploit Mitigations and Secure Random Number Generators
– by Ali Abbasi & Jos Wetzels
-
Hacking Toshiba Laptops - Or how to mess up your firmware security
– by Michał Kowalczyk & Serge Bazanski
-
Linux Vulnerabilities, Windows Exploits: Escalating Privileges with WSL
– by Saar Amar
-
Mess with the best, die like the rest (mode).
– by Volodymyr Pikhur
-
Neurosurgery for Industrial Routers: Security of Sarian OS
– by Danila Parnishchev
-
Reverse Engineering Windows Defender’s JavaScript Engine
– by Alexei Bulazel
-
Reversing IoT: Xiaomi ecosystem - Gain cloud independence and additional functionality by firmware modification
– by Dennis Giese & Daniel Wegemer
-
Robin Hood vs Cisco ASA AnyConnect - Discovering and exploiting a vulnerability in your firewall
– by Cedric Halbronn
-
Starcraft: Emulating a buffer overflow for fun and profit
– by Elias “@0xeb” Bachaalany
-
Subverting your server through its BMC: the HPE iLO4 case
– by Alexandre Gazet, Joffrey Czarny & Fabien Perigaud
-
Visiting The Snake Nest
– by Matthieu Faou & Jean-Ian Boutin
-
When Virtual Hell Freezes Over - Reversing C++ Code
– by Gal Zaban