Reverse Engineering

Title Speakers Conference Tags
Reconstructing Gapz: Position-Independent Code Analysis Problem Aleksandr Matrosov , Eugene Rodionov REcon-2013 - Montreal,Canada Reverse Engineering Malware Defence
REVERSE AND SIMULATE YOUR ENEMY BOTNET C&C Georges Bossert , Frederic Guihery Blackhat Abu Dhabi-2012 - Abu Dhabi, UAE Reverse Engineering Network Protocols
STEALING FROM THIEVES: BREAKING IONCUBE VM TO REVERSE EXPLOIT KITS Mohamed Saher Blackhat Abu Dhabi-2012 - Abu Dhabi, UAE Reverse Engineering Web Security PHP ionCube
The Diviner Digital Clairvoyance Breakthrough Gaining Access to the Source Code & Server Side Memory Structure of ANY Application Shay Chen ZeroNights-2012 - Moscow, Russia Reverse Engineering Web Security Blackbox Testing
Adding temporal component to memory forensics Endre Bangerter , Dominic Fischer Hashdays-2012 - Lucerne,Switzerland Computer Forensics Reverse Engineering Tool
A CRITICAL ANALYSIS OF DROPBOX SOFTWARE SECURITY Nicolas Ruff , Florian Ledoux Hack.Lu-2012 - Dommeldange,Luxembourg Reverse Engineering Dropbox
REVERSE ENGINEERING A MASS TRANSIT TICKETING SYSTEM Trainhack Ruxcon-2012 - Melbourne, Australia Reverse Engineering Cryptography Attack
Practical Exploitation of Embedded Systems Andrea Barisani , Daniele Bianco HITBSecConf Malaysia-2012 - KL, Malaysia Reverse Engineering Attack Embedded
Supercompu4ng, Malware and Correla4on: What a Year in the Life of a MD5 Taught Us Wes Brown HITBSecConf Malaysia-2012 - KL, Malaysia Computer Forensics Reverse Engineering Malware
Behavior--based Methods for Automated, Scalable Malware Analysis Stefano Zanero HITBSecConf Malaysia-2012 - KL, Malaysia Reverse Engineering Malware Static Analysis At Scale Dynamic Analysis
HOW THE ANALYSIS OF ELECTRICAL CURRENT CONSUMPTION OF EMBEDDED SYSTEMS COULD LEAD TO CODE REVERSING? Yann Allain , Julien Moinard BlackHat USA-2012 - Las Vegas, USA Reverse Engineering Hardware Reverse Engineering Power Analysis
The Case for Semantics-Based Methods in Reverse Engineering Rolf Rolles REcon-2012 - Montreal, Canada Reverse Engineering Formal Methods SMT Solvers
Compiler Internals: Exceptions and RTTI Igor Skochinsky REcon-2012 - Montreal, Canada Reverse Engineering VisualC++ GCC
Recognition of binary patterns by Morphological analysis Aurelien Thierry REcon-2012 - Montreal, Canada Reverse Engineering
Reverse engineering of binary programs for custom virtual machines Alexander Troshina , Katerina Troshina REcon-2012 - Montreal, Canada Reverse Engineering Recommended
Designing a minimal operating system to emulate 32/64bits x86 code snippets, shellcode or malware in Bochs Elias Bachaalany REcon-2012 - Montreal, Canada Reverse Engineering Emulators Bochs
Dynamic Binary Instrumentation Frameworks: I know you're there spying on me Francisco Falcon , Nahuel Riva REcon-2012 - Montreal, Canada Reverse Engineering Instrumentation Anti-Instrumentation
Reversing dwarf fortress for !!fun!! and ruby Yoann Guillot REcon-2012 - Montreal, Canada Reverse Engineering Gaming
Predicting English keywords from Java Bytecodes using Machine Learning Pablo Duboue REcon-2012 - Montreal, Canada Reverse Engineering Java Machine Learning
[Cryptographic Function Identification in Obfuscated Binary Programs] Joan Calvet Hackito Ergo Sum-2012 - Paris, France Reverse Engineering Cryptography
Intermediate Reversing Wishi ( wishi ) Berlinsides-2010 - Berlin, Germany Reverse Engineering
Code Deobfuscation By Optimization Gljiva Berlinsides-2010 - Berlin, Germany Security Reverse Engineering
Building Custom Disassemblers Felix ( FX ) Lindner Berlinsides-2010 - Berlin, Germany Rootkits Reverse Engineering
Code Deobfuscation By Optimization Branko Spasojevic , Branko Spasojevic Chaos Communication Congress-27 - Berlin, Germany Reverse Engineering
A New Tracer For Reverse Engineering Tsukasa Ooi PacSec-2010 - Tokyo, Japan Reverse Engineering
You Spent All That Money And You Still Got Owned... Joseph Mccray BruCON-2010 - Brussels, Belgium Security Risk Reverse Engineering Network Penetration
Trolling Reverse-Engineers W/Math Frank^2 THOTCON-1 - Chicago, USA Reverse Engineering
Red And Tiger Team Chris Nickerson BruCON-2009 - Brussels, Belgium Mobile Security Security Others Deep Knowledge Application Security Monitoring Social Engineering Reverse Engineering Network Penetration Physical Pentesting
Reversing - A Structured Approach Michael Thumann TROOPERS-2008 - Munich, German Reverse Engineering
Reverse Engineering For Fun And Bof It! Bof Chris Eagle ShmooCon-2005 - Washington DC, USA Reverse Engineering
Reconstructing Root Fu; A Post-Mortem Peter ( Divide ) Zdebski ShmooCon-2005 - Washington DC, USA Reverse Engineering
Decoding And Understanding Internet Worms Ryan Permeh , Dale Coddington Blackhat Europe-2001 - Amsterdam, The Netherlands Security Exploitation Reverse Engineering Analysis Malware