Automating Reverse Engineering with AI/ML, Graphs, and LLM Agents


Instructors:  Malachi Jones & Joe Mansour
Dates:  June 15 to 18 2026
Location:  Hilton DoubleTree Montreal
Capacity:  25


Course Overview


This course shifts reverse engineering from isolated single-binary analysis to system-level reasoning by unifying partial program facts recovered from disassembly into a single graph. That graph grounds LLMs and agents in explicit program structure, enabling scalable, evidence-driven automation.


Students begin with Blackfyre, an open-source framework developed for this course that extracts core program artifacts—functions, basic blocks, control flow, calls, imports, and strings—using both interactive and headless Ghidra workflows. This provides a repeatable foundation for prioritizing, comparing, and automating reverse engineering at scale.


Extracted artifacts are loaded into a Neo4j-backed, BinQL-inspired program graph that supports behavioral binary similarity, malware clustering, firmware ecosystem analysis, and vulnerability triage. NL2GQL translates natural-language analysis questions into executable graph queries, making the graph the interface between analyst intent, LLM reasoning, and agent actions. A full open-source reference implementation of BinQL will be released after the training cycle.


The second half of the course builds learning and automation directly on top of this graph. Graph-referenced artifacts are transformed into embeddings for similarity, clustering, and retrieval, guided by Basic Block Rank (BBR) to derive which code paths and artifacts matter most. Transformer models and LLMs extend this pipeline, culminating in fine-tuning LLaMA-family models on A6000 GPUs to improve NL2GQL accuracy for BinQL. The course concludes with agent-based workflows using AutoGen and MCP to automate tasks such as patch impact analysis, N-day vulnerability triage, summarization, and YARA rule generation—while remaining grounded in graph evidence.



Topics by Day


Day 1: Introduction to Core Concepts and Techniques

Establishes a shared graph-based representation so reverse-engineering questions can be asked systematically rather than ad hoc.



Day 2: Graph Workflows & Cross-Binary Analysis

Uses the program graph as an analysis engine for comparing behavior, structure, and risk across binaries.



Day 3: Transformers & Neural Approaches for RE

Extends graph-based program analysis with neural representations that support downstream tasks such as similarity, function naming, and binary-level reasoning.



Day 4: LLMs, Agents & Fine-Tuning

Integrates fine-tuned LLMs and agents to automate analysis while remaining grounded in graph evidence.




What Should Students Bring?


Students should ensure they have a laptop with a minimum of 32 GB RAM, 250 GB of free disk space, and a processor with at least 4 cores, equivalent to an Intel i7 or higher. The processor must be an x86_64 architecture to ensure compatibility with the course-provided virtual machine (VM) and to run VirtualBox version 7.1 or later. Additionally, the processor must support AVX (Advanced Vector Extensions), which are required for running machine learning frameworks such as TensorFlow and PyTorch. Connectivity capabilities are also essential for accessing external services used in the Large Language Models (LLMs) components of the course. VirtualBox should be pre-installed to enable participation in the hands-on labs and exercises.



Prerequisites


Students should have a solid foundation in reverse engineering and be comfortable with Python object-oriented development. Familiarity with basic ML concepts (e.g., vectors, supervised learning, precision/recall) is helpful but not required; these topics are introduced at the start of the course to establish a common baseline.



Objectives




Who Should Take This Course




Who Would Not Be a Good Fit for This Course




Changes from the Previous Offering of the Course


This year's course expands beyond earlier versions by introducing graph-driven workflows, advanced LLM methods, and agentic automation for reverse engineering:




BIO


Malachi Jones Dr. Malachi Jones is a Principal Cybersecurity AI/LLM Researcher and Manager at Microsoft, where he currently leads a team advancing red team agent autonomy within Microsoft Security AI (MSECAI). His present focus is on building autonomous red team agents, while his earlier work centered on fine-tuning large language models (LLMs) for security tasks and developing reverse engineering capabilities in Security Copilot.

With over 15 years in security research, Dr. Jones has contributed to both academia and industry. At MITRE, he advanced ML- and IR-based approaches for automated reverse engineering, and at Booz Allen Dark Labs, he specialized in embedded security and co-authored US Patent 10,133,871.

In addition to his work at Microsoft, Dr. Jones is the founder of Jones Cyber-AI, an organization dedicated to independent research and teaching initiatives. Through Jones Cyber-AI, he has developed and taught his specialized course, Automating Reverse Engineering Processes with AI/ML, NLP, and LLMs, at premier conferences including Black Hat USA (2019, 2021, 2023–2025) and RECON Montreal (2023–2025). His independent research in AI/ML, Graphs, and LLMs agents ensures his courses remain cutting-edge and aligned with the latest advances in cybersecurity and reverse engineering.

He previously served as an Adjunct Professor at the University of Maryland, College Park, and holds a B.S. in Computer Engineering from the University of Florida, as well as an M.S. and Ph.D. from Georgia Tech, where his research applied game theory to cybersecurity. His expertise continues to drive innovation in AI-driven cybersecurity and automated reverse engineering.





Joe Mansour Joe Mansour is a Security Researcher at Microsoft. With a focus on reverse engineering malware, he develops detections to protect customers. His expertise is rooted in a background that spans red teaming, vulnerability assessment, and hardware hacking. Joe has contributed to projects involving automated reverse engineering showcasing his aptitude for binary analysis and tool development to simplify the complexities of reverse engineering. He holds an M.S. in Computer Science from Johns Hopkins University and a B.S. from the University of Illinois at Urbana-Champaign.



To Register

Click here to register.


Hex-Rays Magnet Forensics Trail of Bits