Version alpha
Events
Software Reverse Engineering
Title | Track | Speakers | |
---|---|---|---|
![]() |
A Code Pirate's Cutlass
Large binaries produce giant call graphs and dividing up functionality in an... |
Software Reverse Engineering | |
![]() |
An Open-Source Machine-Code Decompiler
We present our machine-code decompiler called RetDec (Retargetable... |
Software Reverse Engineering | |
![]() |
Bushwhacking your way around a bootloader
|
Software Reverse Engineering | |
![]() |
Discovering the iOS Instruments Server
This presentation documents how I was able to reverse-engineer a privileged... |
Software Reverse Engineering | |
![]() |
PreVice: Static Detection of Hooking Capabilities in Machine Code
In the future, static analysis catches hookers before they have a chance to... |
Software Reverse Engineering | |
![]() |
Rattle - an Ethereum EVM binary analysis framework
|
Software Reverse Engineering | |
![]() |
Reverse Engineering Of Blockchain Smart Contracts
|
Software Reverse Engineering | |
![]() |
Reverse Engineering Windows Defender Part II
|
Software Reverse Engineering | |
![]() |
Sandbagility - Reverse Engineering Framework for Windows dynamic analysis
|
Software Reverse Engineering | |
![]() |
SiliVaccine: North Korea's weapon of Mass Detection
|
Software Reverse Engineering | |
![]() |
Static instrumentation based on executable file formats
Many instrumentation techniques are based on modifying code or system... |
Software Reverse Engineering | |
![]() |
This Dump is a Puzzle
Developing a puzzle solver to reconstruct embedded java firmwares from an... |
Software Reverse Engineering | |
![]() |
Tracing Struct Accesses with Struct Stalker
Struct Stalker is an LLDB script that instruments processes to trace... |
Software Reverse Engineering |
Malware Reverse Engineering
Title | Track | Speakers | |
---|---|---|---|
![]() |
Analyzing TRISIS - the first Safety Instrumented System malware
|
Malware Reverse Engineering | |
![]() |
Cloudy With a Chance of Malware
In 2017, KASPERAGENT and a malware we’re calling Cloudy were identified... |
Malware Reverse Engineering | |
![]() |
Malware Analysis and Automation using Binary Ninja
|
Malware Reverse Engineering | |
![]() |
Modern Linux Malware Exposed
|
Malware Reverse Engineering |
RF Reverse Enginering
Title | Track | Speakers | |
---|---|---|---|
![]() |
Breath of the RF Field
|
RF Reverse Enginering |
Hardware Reverse Enginnering
Title | Track | Speakers | |
---|---|---|---|
![]() |
Building a Damned Good Watch
|
Hardware Reverse Enginnering |
Firmware Reverse Engineering
Title | Track | Speakers | |
---|---|---|---|
![]() |
Create your own Fitness Tracker Firmware
|
Firmware Reverse Engineering | |
![]() |
Meet Salinas, the first ever SMS-commanded Car Infotainment RAT
Nowadays any recent car up to 5 years old comes with something called... |
Firmware Reverse Engineering | |
![]() |
Sum Total of ISA Knowledge
|
Firmware Reverse Engineering |
Exploitation
Title | Track | Speakers | |
---|---|---|---|
![]() |
Exploiting User-land vulnerabilities to Get Rogue App Installed Remotely on iOS 11
|
Exploitation | |
![]() |
PWN Flash with Reflection and HashTables
|
Exploitation | |
![]() |
Pwning Intel PIN
|
Exploitation | |
![]() |
Taint-based return oriented programming
|
Exploitation | |
![]() |
Unknown Known DLLs and other Code Integrity Trust Violations
|
Exploitation |