Version alpha
Events
Software Reverse Engineering
Title | Track | Speakers | |
---|---|---|---|
A Code Pirate's Cutlass
Large binaries produce giant call graphs and dividing up functionality in an... |
Software Reverse Engineering | ||
An Open-Source Machine-Code Decompiler
We present our machine-code decompiler called RetDec (Retargetable... |
Software Reverse Engineering | ||
Bushwhacking your way around a bootloader
|
Software Reverse Engineering | ||
Discovering the iOS Instruments Server
This presentation documents how I was able to reverse-engineer a privileged... |
Software Reverse Engineering | ||
PreVice: Static Detection of Hooking Capabilities in Machine Code
In the future, static analysis catches hookers before they have a chance to... |
Software Reverse Engineering | ||
Rattle - an Ethereum EVM binary analysis framework
|
Software Reverse Engineering | ||
Reverse Engineering Of Blockchain Smart Contracts
|
Software Reverse Engineering | ||
Reverse Engineering Windows Defender Part II
|
Software Reverse Engineering | ||
Sandbagility - Reverse Engineering Framework for Windows dynamic analysis
|
Software Reverse Engineering | ||
SiliVaccine: North Korea's weapon of Mass Detection
|
Software Reverse Engineering | ||
Static instrumentation based on executable file formats
Many instrumentation techniques are based on modifying code or system... |
Software Reverse Engineering | ||
This Dump is a Puzzle
Developing a puzzle solver to reconstruct embedded java firmwares from an... |
Software Reverse Engineering | ||
Tracing Struct Accesses with Struct Stalker
Struct Stalker is an LLDB script that instruments processes to trace... |
Software Reverse Engineering |
Malware Reverse Engineering
Title | Track | Speakers | |
---|---|---|---|
Analyzing TRISIS - the first Safety Instrumented System malware
|
Malware Reverse Engineering | ||
Cloudy With a Chance of Malware
In 2017, KASPERAGENT and a malware we’re calling Cloudy were identified... |
Malware Reverse Engineering | ||
Malware Analysis and Automation using Binary Ninja
|
Malware Reverse Engineering | ||
Modern Linux Malware Exposed
|
Malware Reverse Engineering |
RF Reverse Enginering
Title | Track | Speakers | |
---|---|---|---|
Breath of the RF Field
|
RF Reverse Enginering |
Hardware Reverse Enginnering
Title | Track | Speakers | |
---|---|---|---|
Building a Damned Good Watch
|
Hardware Reverse Enginnering |
Firmware Reverse Engineering
Title | Track | Speakers | |
---|---|---|---|
Create your own Fitness Tracker Firmware
|
Firmware Reverse Engineering | ||
Meet Salinas, the first ever SMS-commanded Car Infotainment RAT
Nowadays any recent car up to 5 years old comes with something called... |
Firmware Reverse Engineering | ||
Sum Total of ISA Knowledge
|
Firmware Reverse Engineering |
Exploitation
Title | Track | Speakers | |
---|---|---|---|
Exploiting User-land vulnerabilities to Get Rogue App Installed Remotely on iOS 11
|
Exploitation | ||
PWN Flash with Reflection and HashTables
|
Exploitation | ||
Pwning Intel PIN
|
Exploitation | ||
Taint-based return oriented programming
|
Exploitation | ||
Unknown Known DLLs and other Code Integrity Trust Violations
|
Exploitation |