Recon 2015 June 19, 2015 to June 21, 2015, Montreal,Canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
0x3E9 Ways to DIE Yaniv Balmas Along the years many attempts have been made to combine static and dynamic...
Abusing Silent Mitigations Brian Gorenc , Simon Zuckerbraun , Abdul-aziz Hariri In the summer of 2014, Microsoft silently introduced two new exploit...
Attacking and Defending BIOS in 2015 Yuriy Bulygin , Mickey Shkatov , Andrew Furtak , Oleksandr Bazhaniuk , Alexander Matrosov , Mikhail Gorobets In this presentation we will demonstrate multiple types of recently...
Building a Better Bluetooth Attack Framework Chris Weedon Bluetooth attacks have been around for some time. Previously we did...
Exploiting Out-of-Order-Execution Sophia D'antoine Given the rise in popularity of cloud computing and platform-as-a-service,... IncludeThinkstScapes
Finish Him! Exide For a decade from the early 90's to the early 2000's, Williams' Digital...
From Silicon to Compiler Andrew Zonenberg Programmable logic devices have historically been locked up behind...
Glitching and Side-Channel Analysis for All Colin O’flynn The super-cool area of side-channel power analysis and glitching attacks are...
Hooking Nirvana Alex Ionescu In this talk we will cover 5 novel instrumentation techniques that all rely...
Introducing PCBRE David Carne PCB Reverse engineering is the process of taking a physical Printed Circuit...
One font vulnerability to rule them all Mateusz “j00ru” Jurczyk "Font rasterization software is clearly among the most desirable attack... IncludeThinkstScapes
Pandora's Cash Box: The Ghost Under Your POS Nitay Artenstein , Shift Reduce We're all used to seeing the ubiquitous cash drawer - that steel box, usually...
Polyglots and Chimeras in Digital Radio Modes Sergey Bratus , Travis Goodspeed Ah Matryoshkas, who doesn't like these Russian nesting dolls? But why should...
Radare2, building a new IDA Julien Voisin , Jeffrey Crowell We will present radare2, a free, lgpl-licenced, modular reverse engineering...
Reverse Engineering Windows AFD.sys Steven Vittitoe What happens when you make a socket() call in Windows? This presentation will...
Reversing the Nintendo 64 CIC Mike Ryan , Marshallh , John Mcmaster This presentation covers our successful efforts to reverse engineer and clone...
The M/o/Vfuscator Christopher Domas Based on a paper that proves that the "mov" instruction is Turing complete,... IncludeThinkstScapes
This Time Font hunt you down in 4 bytes Peter Hlavaty , Jihui Lu In our recent work we targeted also win32k, what seems to be fruit giving...
Totally Spies! Paul Rascagneres , Joan Calvet , Marion Marschalek For some months now, there were rumors of cartoon-named malware employed in...
Towards Transparent Dynamic Binary Instrumentation using Virtual Machine Introspection Julian Kirsch The idea is simple enough: Binary instrumentation as done by DynamoRIO and...