REcon 2022

REcon 2022  Video Archive

Zooming in on Zero-click Exploits by Natalie Silvanovich
Reverse engineering of black-box binaries with symbolic and concolic execution techniques by Jannis Kirschner
Instrumenting system applications on Android stock images by Vitor Ventura
Reversing an M32C firmware -- Lesson learned from playing with an uncommon architecture by Philippe Laulheret
Breaking the Glass Sandbox: Find Linux Kernel Bugs and Escape by Valentina Palmiotti
Researching the Unisoc baseband, like in the army by Slava Makkaveev
The Next Generation of Virtualization-based Obfuscators by Moritz Schloegel and Tim Blazytko
Project TEMPA - Demystifying Tesla's Bluetooth Passive Entry system by Martin Herfurt
Beyond AlphaGolang: Automated hunting based on reversing Go binaries by Juan Andres Guerrero-Saade
Function overrides, from a Security mitigation to a fully-fledged Performance Feature in Windows by Andrea Allievi
Living Off the Walled Garden: Abusing the Features of the Early Launch Antimalware Ecosystem by Matt Graeber
Malware Wars: DarkSide Strikes Back as BlackMatter by James Niven and Lindsay Kaye
Pulling MikroTik into the Limelight: Demystifying and Jailbreaking RouterOS by Ian Dupont and Harrison Green
OopsSec -The bad, the worst and the ugly of APT’s operations security by Tomer Bar
Samsara Metamorphic Engine by Michael Grube
Under the hood of Wslink’s multilayered virtual machine by Vladislav Hrčka
The Mysterious Life of an Exception by Marius Muench and Fabian Freyer
A Dirty Little History: Bypassing Spectre Hardware Defenses to Leak Kernel Data by Pietro Frigo and Enrico Barberis
Detect Me If You Can - Anti-Firmware Forensics by Takahiro Haruyama
Dotnetfile: parsing .NET PE files has never been easier by Yaron Samuel
When Wireless Malware Stays On After Turning Off iPhones by jiska