• WHAT

    REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It is held annually in Montreal, Canada. It offers a single track of presentations over the span of three days with a focus on reverse engineering and advanced exploitation techniques.

    For more information, including pricing and hotel reservation details, head over to the conference page.

    WHEN

    Conference: June 15 - 17, 2018

    Training: June 11 - 14, 2018

    WHERE

    REcon will be held in downtown Montreal, Canada at the Hyatt Regency Montreal.

    Important Note: As of last year many foreign travelers to Canada will require an Electronic Travel Authorization (eTA) prior to entering the country. Please check the following website to find out if this applies to you: http://www.cic.gc.ca/english/visit/visas.asp

    Most of the dates at Hyatt are sold out for a Alternative hotel 5 minutes walk away from the conference go to Monville Montreal. It's is brand you and probably the most technologique hotel in Canada. It is the first hotel with Robot room service, please do not steal the robot.

    REGISTER

    Conference registration is now open.

  • The final talks selection have been annouced

    We’d like to congratulate the submitters who have been selected for Recon Montreal CFP!

    • Reverse Engineering Windows Defender Part II

      – by Alexei Bulazel

    • Reverse Engineering Of Blockchain Smart Contracts

      – by Patrick Ventuzelo

    • Discovering the iOS Instruments Server

      – by Troy Bowman

    • Unknown Known DLLs and other Code Integrity Trust Violations

      – by Alex Ionescu and James Forshaw

    • A Code Pirate's Cutlass

      – by EVM

    • An Open-Source Machine-Code Decompiler

      – by Marek Milkovič and Peter Matula

    • Analyzing TRISIS - the first Safety Instrumented System malware

      – by K. Reid Wightman and Jimmy Wylie

    • Breath of the RF Field

      – by James Chambers

    • Bushwhacking your way around a bootloader

      – by Rebecca ".bx" Shapiro

    • Cloudy With a Chance of Malware

      – by Marika Chauvin

    • Exploiting User-land vulnerabilities to Get Rogue App Installed Remotely on iOS 11

      – by Liang Chen and Marco Grassi

    • Hack the Nintendo Switch, Break the NVIDIA Embedded... Everything?

      – by Kate Temkin and Hedgeberg

    • Malware Analysis and Automation using Binary Ninja

      – by Erika Noerenberg

    • Meet Salinas, the first ever SMS-commanded Car Infotainment RAT

      – by Daniel Regalado, Ken Hsu and Gerardo Iglesias

    • Modern Linux Malware Exposed

      – by Emanuele Cozzi, Mariano Graziano

    • PreVice: Static Detection of Hooking Capabilities in Machine Code

      – by Andy Wortman, Claudiu Teodorescu, Derek Soeder

    • Pwning Intel PIN

      – by Julian Kirsch and Zhechko Zhechev

    • Sandbagility - Reverse Engineering Framework for Windows dynamic analysis

      – by François Khourbiga and Eddy Deligne

    • SiliVaccine: North Korea's weapon of Mass Detection

      – by Mark Lechtik and Michael Kajiloti

    • Static instrumentation based on executable file formats

      – by Romain Thomas

    • Sum Total of ISA Knowledge

      – by Alex Kropivny

    • PWN Flash with Reflection and HashTables

      – by Tao Yan and Bo Qu

    • TPM Genie: Attacking the Hardware Root of Trust For Less Than $50

      – by Jeremy Boone

    • Taint-based return oriented programming

      – by Colas Le Guernic and François Khourbiga

    • This Dump is a Puzzle

      – by Phoebe Queen

    • Tracing Struct Accesses with Struct Stalker

      – by Jeff Dileo

    • Bulding a Damned Good Watch

      – by Travis Goodspeed

    • Rattle - an Ethereum EVM binary analysis framework

      – by Ryan Stortz

  • The first round of talks have been accepted

    We’d like to congratulate the submitters who have been selected for the first phase of the CFP!

    • Reverse Engineering Windows Defender Part II

      – by Alexei Bulazel

    • Reverse Engineering Of Blockchain Smart Contracts

      – by Patrick Ventuzelo

    • Discovering the iOS Instruments Server

      – by Troy Bowman

    • Unknown Known DLLs and other Code Integrity Trust Violations

      – by Alex Ionescu and James Forshaw

  • New training dates announced

    We’ve decided to add extra sessions for Alex Ionescu’s Windows Internals and Rolf Rolles’ Binary Literacy after the conference from June 18th to 21st.

    Click here to register.

  • REcon MTL 2018 CFP

    The REcon Montreal 2018 CFP and Trainings have been announced!

subscribe via RSS