Recon 2014 June 27, 2014 to June 29, 2014, Montreal,Canada
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Conference Opening | Hugo Fortier | N/A | |
Keynote | Eva Galperin | N/A | |
Intel Management Engine Secrets | Igor Skochinsky | Intel Management Engine ("ME") is a dedicated microcontroller embedded in all recent Intel motherboard chipsets. ... | |
SDR Tricks with HackRF | Michael Ossmann | HackRF and some other Software Defined Radio platforms can be used in creative ways. I'll ... | |
Glitching For n00bs | Exide | A Journey to Coax Out Chips' Inner Secrets A shroud of mystery surrounds the topic ... | |
Reversing on the Edge | Jason Jones , Jasiel Spelman | Traversing the paths for using GraphDBs in RE GraphDBs are becoming the new hot thing ... | |
Breaking Out of VirtualBox through 3D Acceleration | Francisco Falcon | Oracle VirtualBox is a popular virtualization software which provides -among many other features- 3D Acceleration ... | |
Going gets tough: a tale of encounters with novel evasive malware. | Marta Janus | Few years ago the aim of malware writers was to hide the malicious activity from ... | |
Reverse Engineering Flash Memory For Fun and Benefit | Matt Oh | There are many benefits to interacting directly with Flash memory when you're having a hard ... | |
Automatic Reverse Compilation & Semantic Comprehension | Christopher Abad (aempirei) | The machine code to source code problem can be simplified by relaxing the problem constraints ... | |
Static Translation of X86 Instruction Semantics to LLVM With McSema | Artem Dinaburg , Andrew Ruef | We have developed McSema, a new framework for analyzing and transforming machine-code programs. McSema translates ... | |
Here be Dragons | Nathan Keltner , Josh "m0nk" Thomas | A Bedtime Tale for Sleepless Nights Have you ever wanted to know what happens deep ... | |
The Making of the Kosher Phone | Assaf Nativ | A Kosher phone would be an adapted feature phone to the “special” needs of a ... | |
Fuzzing and Patch Analysis: SAGEly Advice | Richard Johnson | Last year, in “Taint Nobody Got Time for Crash Analysis”, we presented implementations of analyses ... | |
PIN-Point Control for Analyzing Malware | Jason Jones | Reversing malware can be tedious and time-consuming, especially when it comes to dealing with binary ... | |
Apple SMC, The place to be, definitely! (For an implant) | Alex Ionescu | At NoSuchCon 2013 in Paris, I first revealed the details behind Apple's System Management Controller, ... | |
Memory Tracing: Forensic Reverse Engineering | Endre Bangerter , Dominic Fischer | *Memory tracing* is an entirely novel reverse engineering technique, which we have developed and used ... | |
How do I RE object oriented code (and you should too) | Milan Bohacek | In this talk I will present my award winning IDA plugin hexrays_tools. Hex-Rays is great ... | |
Performing Open Heart Surgery on a Furby | Michael Coppola (mncoppola) | No product has fueled more nightmares in children than the satanic toy known only as ... | |
Shall we play a game? | Elad Shapira (“zest”) | Lessons learned while playing CoreWars8086 Core War is a programming game created by D. G. ... | |
FunCap | Andrzej Dereszowski | The presentation will be about a tool called FunCap (http://github.com/deresz/funcap). This script records function calls ... | |
DRM obfuscation versus auxiliary attacks | Mougey Camille , Francis Gabriel | Code obfuscation is used in many places nowadays: - in software protection, to prevent cracking; ... | |
Rewriting x86 Binaries | Wartortell | Many PEs, Such Secure, Wow. Binary code from untrusted sources remains one of the primary ... | |
Dynamic Analysis Kung-Fu with PANDA | Brendan Dolan-gavitt | We've created a new platform for doing dynamic analysis and reverse engineering on multiple architectures ... | |
Power Analysis and Clock Glitching with the Open-Source ChipWhisperer Platform | Colin O’flynn | There’s a variety of well-known attack methods which seem to have ‘mythical’ power, in particular ... | |
Exploit tips and techniques | William Peteroy , Swamy Gangadhara | 3xploit techniques/tricks will present our engineering analysis and response to the top exploitation techniques and ... | |
Exploring the impact of a hard drive backdoor | Jonas Zaddach | This talk presents a firmware attack on an off-the-shelf hard drive. The implemented backdoor is ... |