Recon 2014 June 27, 2014 to June 29, 2014, Montreal,Canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Conference Opening Hugo Fortier N/A
Keynote Eva Galperin N/A
Intel Management Engine Secrets Igor Skochinsky Intel Management Engine ("ME") is a dedicated microcontroller embedded in all recent Intel motherboard chipsets. ...
SDR Tricks with HackRF Michael Ossmann HackRF and some other Software Defined Radio platforms can be used in creative ways. I'll ...
Glitching For n00bs Exide A Journey to Coax Out Chips' Inner Secrets A shroud of mystery surrounds the topic ...
Reversing on the Edge Jason Jones , Jasiel Spelman Traversing the paths for using GraphDBs in RE GraphDBs are becoming the new hot thing ...
Breaking Out of VirtualBox through 3D Acceleration Francisco Falcon Oracle VirtualBox is a popular virtualization software which provides -among many other features- 3D Acceleration ...
Going gets tough: a tale of encounters with novel evasive malware. Marta Janus Few years ago the aim of malware writers was to hide the malicious activity from ...
Reverse Engineering Flash Memory For Fun and Benefit Matt Oh There are many benefits to interacting directly with Flash memory when you're having a hard ...
Automatic Reverse Compilation & Semantic Comprehension Christopher Abad (aempirei) The machine code to source code problem can be simplified by relaxing the problem constraints ...
Static Translation of X86 Instruction Semantics to LLVM With McSema Artem Dinaburg , Andrew Ruef We have developed McSema, a new framework for analyzing and transforming machine-code programs. McSema translates ...
Here be Dragons Nathan Keltner , Josh "m0nk" Thomas A Bedtime Tale for Sleepless Nights Have you ever wanted to know what happens deep ...
The Making of the Kosher Phone Assaf Nativ A Kosher phone would be an adapted feature phone to the “special” needs of a ...
Fuzzing and Patch Analysis: SAGEly Advice Richard Johnson Last year, in “Taint Nobody Got Time for Crash Analysis”, we presented implementations of analyses ...
PIN-Point Control for Analyzing Malware Jason Jones Reversing malware can be tedious and time-consuming, especially when it comes to dealing with binary ...
Apple SMC, The place to be, definitely! (For an implant) Alex Ionescu At NoSuchCon 2013 in Paris, I first revealed the details behind Apple's System Management Controller, ...
Memory Tracing: Forensic Reverse Engineering Endre Bangerter , Dominic Fischer *Memory tracing* is an entirely novel reverse engineering technique, which we have developed and used ...
How do I RE object oriented code (and you should too) Milan Bohacek In this talk I will present my award winning IDA plugin hexrays_tools. Hex-Rays is great ...
Performing Open Heart Surgery on a Furby Michael Coppola (mncoppola) No product has fueled more nightmares in children than the satanic toy known only as ...
Shall we play a game? Elad Shapira (“zest”) Lessons learned while playing CoreWars8086 Core War is a programming game created by D. G. ...
FunCap Andrzej Dereszowski The presentation will be about a tool called FunCap (http://github.com/deresz/funcap). This script records function calls ...
DRM obfuscation versus auxiliary attacks Mougey Camille , Francis Gabriel Code obfuscation is used in many places nowadays: - in software protection, to prevent cracking; ...
Rewriting x86 Binaries Wartortell Many PEs, Such Secure, Wow. Binary code from untrusted sources remains one of the primary ...
Dynamic Analysis Kung-Fu with PANDA Brendan Dolan-gavitt We've created a new platform for doing dynamic analysis and reverse engineering on multiple architectures ...
Power Analysis and Clock Glitching with the Open-Source ChipWhisperer Platform Colin O’flynn There’s a variety of well-known attack methods which seem to have ‘mythical’ power, in particular ...
Exploit tips and techniques William Peteroy , Swamy Gangadhara 3xploit techniques/tricks will present our engineering analysis and response to the top exploitation techniques and ...
Exploring the impact of a hard drive backdoor Jonas Zaddach This talk presents a firmware attack on an off-the-shelf hard drive. The implemented backdoor is ...