Recon 2015 June 19, 2015 to June 21, 2015, Montreal,Canada
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
0x3E9 Ways to DIE | Yaniv Balmas | Along the years many attempts have been made to combine static and dynamic... | |
Abusing Silent Mitigations | Brian Gorenc , Simon Zuckerbraun , Abdul-aziz Hariri | In the summer of 2014, Microsoft silently introduced two new exploit... | |
Attacking and Defending BIOS in 2015 | Yuriy Bulygin , Mickey Shkatov , Andrew Furtak , Oleksandr Bazhaniuk , Alexander Matrosov , Mikhail Gorobets | In this presentation we will demonstrate multiple types of recently... | |
Building a Better Bluetooth Attack Framework | Chris Weedon | Bluetooth attacks have been around for some time. Previously we did... | |
Exploiting Out-of-Order-Execution | Sophia D'antoine | Given the rise in popularity of cloud computing and platform-as-a-service,... | IncludeThinkstScapes |
Finish Him! | Exide | For a decade from the early 90's to the early 2000's, Williams' Digital... | |
From Silicon to Compiler | Andrew Zonenberg | Programmable logic devices have historically been locked up behind... | |
Glitching and Side-Channel Analysis for All | Colin O’flynn | The super-cool area of side-channel power analysis and glitching attacks are... | |
Hooking Nirvana | Alex Ionescu | In this talk we will cover 5 novel instrumentation techniques that all rely... | |
Introducing PCBRE | David Carne | PCB Reverse engineering is the process of taking a physical Printed Circuit... | |
One font vulnerability to rule them all | Mateusz “j00ru” Jurczyk | "Font rasterization software is clearly among the most desirable attack... | IncludeThinkstScapes |
Pandora's Cash Box: The Ghost Under Your POS | Nitay Artenstein , Shift Reduce | We're all used to seeing the ubiquitous cash drawer - that steel box, usually... | |
Polyglots and Chimeras in Digital Radio Modes | Sergey Bratus , Travis Goodspeed | Ah Matryoshkas, who doesn't like these Russian nesting dolls? But why should... | |
Radare2, building a new IDA | Julien Voisin , Jeffrey Crowell | We will present radare2, a free, lgpl-licenced, modular reverse engineering... | |
Reverse Engineering Windows AFD.sys | Steven Vittitoe | What happens when you make a socket() call in Windows? This presentation will... | |
Reversing the Nintendo 64 CIC | Mike Ryan , Marshallh , John Mcmaster | This presentation covers our successful efforts to reverse engineer and clone... | |
The M/o/Vfuscator | Christopher Domas | Based on a paper that proves that the "mov" instruction is Turing complete,... | IncludeThinkstScapes |
This Time Font hunt you down in 4 bytes | Peter Hlavaty , Jihui Lu | In our recent work we targeted also win32k, what seems to be fruit giving... | |
Totally Spies! | Paul Rascagneres , Joan Calvet , Marion Marschalek | For some months now, there were rumors of cartoon-named malware employed in... | |
Towards Transparent Dynamic Binary Instrumentation using Virtual Machine Introspection | Julian Kirsch | The idea is simple enough: Binary instrumentation as done by DynamoRIO and... |