Recon 2022 June 3, 2022 to June 3, 2022, Montreal, Canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Conference Opening N/a Conference opening
Zooming in on Zero-click Exploits Natalie Silvanovich Zoom is a video conferencing solution that has gained popularity throughout the pandemic. It is ...
Reverse engineering of black-box binaries with symbolic and concolic execution techniques Jannis Kirschner Big control-flow graphs are scary! Imagine opening a target and IDA tells you that the ...
Instrumenting system applications on Android stock images Vitor Ventura Android has the largest install base on the mobile landscape, with it there are a ...
Reversing an M32C firmware -- Lesson learned from playing with an uncommon architecture Philippe Laulheret While busy hacking the planet, have you ever encountered an unfamiliar architecture and simply had ...
Breaking the Glass Sandbox: Find Linux Kernel Bugs and Escape Valentina Palmiotti Linux kernel bugs are plentiful and also powerful. However, sandboxing limits the amount of kernel ...
Researching the Unisoc baseband, like in the army Slava Makkaveev Do you still remember push-button phones? Many of them were based on chips from Spreadtrum, ...
The Next Generation of Virtualization-based Obfuscators Tim Schloegel Code obfuscation has become a vital tool to protect, for example, intellectual property against the ...
Project TEMPA - Demystifying Tesla's Bluetooth Passive Entry system Martin Herfurt Tesla is a company that has been innovating in the automobile industry for many years. ...
Analysis of a nation-state Chrome exploit David Manouchehri In 2021, Project Zero publicly disclosed multiple Chrome exploits they found in the wild. This ...
Beyond AlphaGolang: Automated hunting based on reversing Go binaries Juan Andrés Guerrero-saade We released a project called AlphaGolang – a series of IDAPython scripts to automatically reconstruct ...
Function overrides, from a Security mitigation to a fully-fledged Performance Feature in Windows Andrea Allievi The talk will discuss how Microsoft deals with performance-related problems while developing Security mitigations. For ...
Living Off the Walled Garden: Abusing the Features of the Early Launch Antimalware Ecosystem Matt Graeber Early Launch Antimalware (ELAM) functionality in Windows offers robust anti-tampering mitigations whereby security vendors declare ...
Malware Wars: DarkSide Strikes Back as BlackMatter Lindsay Niven Ransomware, and malware as a whole, does not exist in a vacuum; it is often ...
Pulling MikroTik into the Limelight: Demystifying and Jailbreaking RouterOS Ian Green We will provide a comprehensive system overview of RouterOS internals, enhanced by technical demonstrations to ...
OopsSec -The bad, the worst and the ugly of APT’s operations security Tomer Bar Advanced Persistent Threat (APT) groups invest in developing their arsenal of exploits and malware to ...
Samsara Metamorphic Engine Michael Grube Samsara is a viral metamorphic engine for the JVM. A metamorphic mutation engine is code ...
Under the hood of Wslink’s multilayered virtual machine Vladislav Hrčka Wslink is a unique loader, linked to the Lazarus group, that we documented at the ...
The Mysterious Life of an Exception Marius Freyer Exceptions are an important control flow mechanism used in many modern programming languages. They allow ...
A Dirty Little History: Bypassing Spectre Hardware Defenses to Leak Kernel Data Pietro Barberis Back in 2018 when Spectre was found, you could exploit its second and most dangerous ...
Detect Me If You Can - Anti-Firmware Forensics Takahiro Haruyama As firmware threats are becoming more prevalent, security companies are starting to provide UEFI firmware ...
Dotnetfile: parsing .NET PE files has never been easier Yaron Samuel The .NET PE file format is one of the most complicated file formats, documented in ...
When Wireless Malware Stays On After Turning Off iPhones Jiska After power off, modern iPhones keep their wireless chips on. Find My advertisements are sent ...