REcon 2010 July 9, 2010 to July 11, 2010, Montreal,Canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Ethical Considerations of Intelligence and Information Security Richard Thieme An incisive illumination of how the transformational engines of information technologies alter our religious structures, ...
Understanding Swizzor's Obfuscation Scheme Joan Calvet , Pierre-marc Bureau Swizzor is a malware family that was first seen on the Internet in 2002 and, ...
Using Fireshark to Analyze Malicious Websites Stephan Chenette In this 20 minute presentation I will review an open-source tool I've written called Fireshark. ...
Packer Genetics: The Selfish Code Ero ( Ertia ) Carrera , Jose Duart Unpacking automation has been attacked in many different ways. In this paper we propose a ...
Syndicate Wars Port: How to port a DOS game to modern systems Gynvael Coldwind , Unavowed During the presentation we will introduce the Syndicate Wars Port (http://swars.vexillium.org/), and discuss in detail ...
Mac OS X Return-Oriented Exploitation Dino Dai Zovi The latest advances in exploitation of memory corruption vulnerabilities revolve around applying return-oriented exploitation techniques ...
Reversing Trojan.Mebroot's Obfuscation Nicolas Falliere Trojan.Mebroot is one of the most complex malware we've seen in the past years. It ...
Metasm Feelings Yoann Guillot , Alexandre Gazet Metasm is an open source ruby framework developed by Yoann Guillot. It can: work with ...
Building hardware for exploring deeply embedded systems Travis Goodspeed Before exploiting any system, it is necessary to have tools--debuggers, disassemblers, emulators, packet sniffers, and ...
Applying Taint Analysis and Theorem Proving to Exploit Development Sean Heelan As reverse engineers and exploit writers we spend much of our time trying to illuminate ...
Debugger-based Target-to-Host Cross-System Attacks Alex Ionescu This talk will present a critical design flaw in the Windows KD (Kernel Debugger) protocol ...
Picking Electronic Locks Using TCP Sequence Prediction Ricky Lawshae Electronic physical access systems are being relied on more and more for securing our infrastructure. ...
Memory analysis - Looking into the eye of the bits Assaf Nativ Memory analysis is a reverse engineering method every reverser uses, but we rarely pay attention ...
Reverse Engineering with Hypervisors Danny Quist Hypervisors make very good tools to aide in reverse engineering. This talk will concentrate on ...
Finding Chinks in the Armor - Reverse-Engineering Locks Deviant Ollam I find the stories that surround how lockpickers and researchers have been able to exploit ...
How to really obfuscate your malware PDF files Sebastian Porst During my work as a PDF malware analyst I have seen lots and lots of ...
Reverse Engineering with Hardware Debuggers Jason Raber , Jason Cheatham This is a brief tutorial of one of the reverse engineering tools (Hardware Emulator) used ...
Escaping the Sandbox Stephen A. Ridley This presentation will discuss and demonstrate practical techniques for the evasion and escape of "Sand-boxing" ...
Intro to Embedded Reverse Engineering for PC reversers Igor Skochinsky These days many researchers working in the PC software area are starting to get interested ...
SDSL reverse engineering Michael Sokolov SDSL is a trailing-edge telecom technology that was originally intended to fill the gap between ...
DMS, 5ESS and Datakit VCS II: interfaces and internals Jonathan Stuart In a nutshell: 5ESS (include VCDX under emulation), demonstration using either the simulator and/or the ...
Reversing, better William Whistler This fast-paced talk will be the first public unveiling of REvealer, a new standalone application ...
dirtbox, a highly scalable x86/Windows Emulator Georg Wicherski dirtbox is an attempt to implement a highly scalable x86/Windows emulator that can be both ...