REcon 2022 Sessions
- Zooming in on Zero-click Exploits - Natalie Silvanovich
- Reverse engineering of black-box binaries with symbolic and concolic execution techniques - Jannis Kirschner
- Instrumenting system applications on Android stock images - Vitor Ventura
- Reversing an M32C firmware - Lesson learned from playing with an uncommon architecture - Philippe Laulheret
- Breaking the Glass Sandbox: Find Linux Kernel Bugs and Escape - Valentina Palmiotti
- Researching the Unisoc baseband, like in the army - Slava Makkaveev
- The Next Generation of Virtualization-based Obfuscators - Moritz Schloegel & Tim Blazytko
- Project TEMPA - Demystifying Tesla's Bluetooth Passive Entry system - Martin Herfurt
- Beyond AlphaGolang: Automated hunting based on reversing Go binaries - Juan Andres Guerrero-Saade
- Function overrides, from a Security mitigation to a fully-fledged Performance Feature in Windows - Andrea Allievi
- Living Off the Walled Garden: Abusing the Features of the Early Launch Antimalware Ecosystem - Matt Graeber
- Malware Wars: DarkSide Strikes Back as BlackMatter - James Niven & Lindsay Kaye
- Pulling MikroTik into the Limelight: Demystifying and Jailbreaking RouterOS - Ian Dupont & Harrison Green
- OopsSec - The bad, the worst and the ugly of APT's operations security - Tomer Bar
- Samsara Metamorphic Engine - Michael Grube
- Under the hood of Wslink's multilayered virtual machine - Vladislav Hrcka
- The Mysterious Life of an Exception - Marius Muench & Fabian Freyer
- A Dirty Little History: Bypassing Spectre Hardware Defenses to Leak Kernel Data - Pietro Frigo & Enrico Barberis
- Detect Me If You Can - Anti-Firmware Forensics - Takahiro Haruyama
- Dotnetfile: parsing .NET PE files has never been easier - Yaron Samuel
- When Wireless Malware Stays On After Turning Off iPhones - jiska
Watch recorded talks in our Video Archive