REcon 2026 Speakers
Conference Dates: June 19-21, 2026
Location: Hilton DoubleTree Montreal
Confirmed Conference Speakers
Current speakers from the CFP featured sessions:
Toshinori Usui
8 Years of Reverse-Engineering Interpreters: Techniques, Automation, and One Framework
Talk (60 minutes)
John McIntosh
Agentic Reverse Engineering: Building Custom AI Skills with Coding Agents
Workshop (3hrs)
Grégoire Menguy
Black-box deobfuscation: reverse engineering binaries with your eyes closed (or almost)
Short Talk (30 minutes)
Alejandro Pinna
Chaining Microsoft binaries to get privileged primitives in Windows kernel
Talk (60 minutes)
Mathilde Venault
Click Once and Stay Forever: uncovering a new abuse of the ClickOnce technology
Talk (60 minutes)
Lennert Wouters
Failure Is Not an Option: A Reliable Process to Exploit STM32F2/F4 Microcontrollers
Talk (60 minutes)
Joe Grand
Failure Is Not an Option: A Reliable Process to Exploit STM32F2/F4 Microcontrollers
Talk (60 minutes)
bryce case, jr. / ytcracker
FAT Chungus: CVE-2025-24857 - A Journey Through U-Boot Exploitation
Talk (60 minutes)
Philippe Laulheret
I have to use AI, so what now? A skeptic guide to vibing RE/VR
Short Talk (30 minutes)
Nicole Fishbein
Short Talk (30 minutes)
Todd Manning
Putting the Genie Back in the Bottle: Agentic Reverse Engineering of Claude's Security Architecture
Talk (60 minutes)
Olivier THOMAS - Texplained
Talk (60 minutes)
Elias Bachaalany
SELECT * FROM binary - Vibe Reversing Across IDA, Ghidra, and Binary Ninja
Talk (60 minutes)
View source list on CFP | View sessions
Trainers
Our 2026 training instructors include world-class security researchers and practitioners:
Sina Kheirkhah
Advanced .NET Exploitation
Full-time vulnerability researcher specializing in low-level exploitation. Pwn2Own "Master of Pwn" 2025.
Olivier Thomas
Advanced IC Reverse Engineering & Data Extraction
Expert in integrated circuit reverse engineering and hardware security.
Marion Marschalek
Advanced Malware Reverse Engineering
Renowned malware researcher and reverse engineer.
Keith Ramphal
Advanced Malware Reverse Engineering
Security researcher focusing on nation-state malware and distributed system security
Richard Johnson
AI Agents for Cybersecurity
Expert in applying AI and machine learning to security research.
Tim Blazytko
Software Deobfuscation Techniques
Co-founder of emproof, expert in code deobfuscation and fuzzing.
Yarden Shafir
Windows Internals for Reverse Engineers
Vulnerability researcher at Vigilant Labs, Windows internals expert.
Andrey Konovalov
Exploiting the Linux Kernel
Linux kernel security researcher and exploit developer.
Cristofaro Mune
The Art of Fault Injection
Co-founder of Raelize, 25+ years in security, expert in hardware attacks.
Niek Timmers
The Art of Fault Injection
Co-founder of Raelize, device security expert specializing in fault injection and secure boot bypass.
Julien Cohen-Scali
Attacking Real World IoT
Cybersecurity Researcher at FuzzingLabs, specializing in IoT and embedded security research.
Lucas Van Haaren
Attacking Real World IoT
Security researcher at FuzzingLabs focused on IoT vulnerability research and embedded systems.
Kyle Martin
Automated Reverse Engineering with Binary Ninja
Cyber security software engineer, leads Binary Ninja trainings and develops advanced analysis tools.
Dr. Malachi Jones
Automating RE with AI/ML
Principal Cybersecurity AI/LLM Researcher at Microsoft, leads research on red team agent autonomy.
Joe Mansour
Automating RE with AI/ML
Security Researcher at Microsoft specializing in reverse engineering malware.
Corentin Bayet
Bug Hunting in Hypervisors
CTO of REverse Tactics, Pwn2Own VM escape expert and hypervisor security researcher.
Bruno Pujos
Bug Hunting in Hypervisors
CEO of REverse Tactics, expert in firmware and UEFI reverse engineering.
John McIntosh
Building Agentic Reverse Engineering Tools
Security researcher at Clearseclabs, Ghidra tooling expert and automation specialist.
Caleb Davis
Embedded and Shredded
Founding member of SolaSec, specialist in embedded hardware security and PCB analysis.
The FLARE Team
FLARE Team Guide to RE Malware
The FLARE team at Google Cloud (Mandiant) is comprised of veteran reverse engineers.
Silvio La Porta
Modern Malware OPSEC
CEO of RETooling, malware reverse engineering expert with extensive threat analysis experience.
Antonio Villani
Modern Malware OPSEC
Co-Founder of RETooling, specializes in threat actor analysis and malware research.
Kai
Modular Implant Design for Windows
PhD at Northeastern University, specializes in implant development and offensive security.
Daniel Frederic
Reversing Modern Binaries
Expert in reverse engineering Rust and Go binaries, malware analysis specialist.
Mathieu Hoste
Reversing Modern Binaries
Security engineer at FuzzingLabs, Rust and blockchain security expert.
Tanguy Duhamel
Rust Development for Cyber Security
Lead Developer at FuzzingLabs, specializes in distributed fuzzing and Rust tooling.
Tristan Ferreira
Rust Development for Cyber Security
Cybersecurity Expert at FuzzingLabs, developer of FuzzForge fuzzing infrastructure.