REcon 2026 Sessions
Conference Dates: June 19-21, 2026
Location: Hilton DoubleTree Montreal
Confirmed Presentations
Current featured sessions from the CFP:
- 8 Years of Reverse-Engineering Interpreters: Techniques, Automation, and One Framework
Toshinori Usui - Talk (60 minutes) - Adapting Ghidra and its Decompiler to new languages
Florian Magin - Workshop (2hrs) - Agentic Reverse Engineering: Building Custom AI Skills with Coding Agents
John McIntosh - Workshop (3hrs) - Basics of .NET Exploitation
Sina Kheirkhah - Workshop (3hrs) - Beyond XNU: Anatomy of the Secure Kernel & Exclaves on Apple Silicon
Stefan Esser - Talk (60 minutes) - Black-box deobfuscation: reverse engineering binaries with your eyes closed (or almost)
Grégoire Menguy - Short Talk (30 minutes) - Breaking the Backbone of Global ISP Networks
Mathieu Farrell - Talk (60 minutes) - Chaining Microsoft binaries to get privileged primitives in Windows kernel
Alejandro Pinna - Talk (60 minutes) - Click Once and Stay Forever: uncovering a new abuse of the ClickOnce technology
Mathilde Venault - Talk (60 minutes) - C++ Symbol and Type Recovery in Binary Ninja
Joshua Reynolds - Workshop (3hrs) - Deobfuscation in the Age of Agentic Reverse Engineering
Nicolò Altamura, Tim Blazytko - Short Talk (30 minutes) - Failure Is Not an Option: A Reliable Process to Exploit STM32F2/F4 Microcontrollers
Lennert Wouters, Joe Grand - Talk (60 minutes) - FAT Chungus: CVE-2025-24857 - A Journey Through U-Boot Exploitation
Tim Noise, bryce case, jr. / ytcracker - Talk (60 minutes) - Forgotten TEE keys in plain sight
Florent TARDIF - Talk (60 minutes) - From Bus Wires to Badges: Breaking Into DUOX PLUS Through RFID
Iceman, Kirils Solovjovs - Talk (60 minutes) - How real-world malware disables EDR systems
Holger Unterbrink - Talk (60 minutes) - I have to use AI, so what now? A skeptic guide to vibing RE/VR
Philippe Laulheret - Short Talk (30 minutes) - IRON GIANT: When The Vault Becomes The Victim
Erik Egsgard - Short Talk (30 minutes) - MIPS Malware Reverse Engineering
Marion Marschalek - Workshop (2hrs) - Orchestrating Chaos: Defeating Guloader's VEH and Obfuscation with Unicorn
Mark Lim - Workshop (3hrs) - Paper Werewolf's Toolbox: Reversing XLL Delivery, EchoGather, and a WinRAR Exploit Chain Targeting Russia
Nicole Fishbein - Short Talk (30 minutes) - Prism Internals: Reversing Microsoft's x86-to-ARM64 Binary Translator
Hugo - Talk (60 minutes) - Putting the Genie Back in the Bottle: Agentic Reverse Engineering of Claude's Security Architecture
Todd Manning - Talk (60 minutes) - Reversing Framework Mobile Applications with Open Source Tools
Nick Anderson, Roy Tu - Workshop (3hrs) - ROM Dump, Descrambling and Decryption using RE Only: the Fully Analytical MEthod (FAME), no FIB, no Guesses...
Olivier THOMAS - Texplained - Talk (60 minutes) - SELECT * FROM binary - Vibe Reversing Across IDA, Ghidra, and Binary Ninja
Elias Bachaalany - Talk (60 minutes) - SmallWorld
Andy, William Janelle - Talk (60 minutes)
View source list on CFP | View speakers
Topics of Interest
REcon encourages submissions in the following areas (but not limited to):
- Hardware reverse engineering
- Software reverse engineering
- Protocol reverse engineering
- Finding vulnerabilities and writing exploits
- Novel data visualization for hackers and reverse engineers
- Bypassing security and software protections
- Attacks on cryptography in hardware and software
- Techniques for any of the above on new or interesting architectures
- Wireless hacking (beyond WiFi)
Session Formats
- 30-minute talks - Focused technical presentations
- 60-minute talks - In-depth research presentations
- Lightning talks - 5-10 minute informal presentations during the REcon party
- Workshops - Hands-on sessions in the village areas