REcon 2012 June 14, 2012 to June 16, 2012, Montreal, Canada

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
The Case for Semantics-Based Methods in Reverse Engineering Rolf Rolles N/A Reverse Engineering IncludeThinkstScapes Formal Methods SMT Solvers
Extraordinary String Based Attacks Tarjei Mandt N/A ExcludeThinkstScapes Windows
Injecting custom payload into signed Windows executables (Analysis of the CVE-2012-0151 vulnerability) Igor Gl\xc3\xbccksmann A valid signature of a PE executable file doesn't always guarantee that the file hasn't ... ExcludeThinkstScapes Signed Executables
Backside optical analysis hardware/software running on ICs Dmitry Nedospasov Reverse-engineering ICs can be very capital intensive. Traditionally, this process consists of many steps including ... Hardware Reverse Engineering ExcludeThinkstScapes
Bootkit Threats: In-Depth Reverse Engineering & Defense Aleksandr Matrosov , Eugene Rodionov Although bootkit technology isn’t new, it plays an important role nowadays in attack scenarios against ... ExcludeThinkstScapes Bootkit
Compiler Internals: Exceptions and RTTI Igor Skochinsky N/A Reverse Engineering ExcludeThinkstScapes VisualC++ GCC
Facedancer USB: Exploiting the Magic School Bus Sergey Bratus , Travis Goodspeed Here we introduce the Facedancer Board, a tool for implementing USB devices in host-side Python ... ExcludeThinkstScapes USB
Predicting English keywords from Java Bytecodes using Machine Learning Pablo Duboue I've been working on predicting English keywords in source code comments with access only to ... Reverse Engineering ExcludeThinkstScapes Java Machine Learning
Be Social. Use Rewoltke. Jason Geffner , Tillmann Werner Reversing complex software in short time is challenging due to the lack of professional tools ... ExcludeThinkstScapes IDA Pro
Inside AVM Haifei Li In 2011, I presented research[1] at CanSecWest on exploiting Flash JIT type confusion bugs. While ... ExcludeThinkstScapes Flash
Title: Windows 8 User Mode Drivers (Reliability Panacea, or Security Nightmare?) Alex Ionescu N/A Security
Reverse engineering of binary programs for custom virtual machines Alexander Troshina , Katerina Troshina N/A Reverse Engineering ExcludeThinkstScapes Recommended
Reversing Point-of-Sale Systems: Potential Vulnerabilities in Transactions Jonathan Stuart N/A Security
Debugging Baseband Stacks Ralf-Philipp Weinmann N/A Security
Designing a minimal operating system to emulate 32/64bits x86 code snippets, shellcode or malware in Bochs Elias Bachaalany The talk shows how to build a tailored operating system that will be ran using ... Reverse Engineering ExcludeThinkstScapes Emulators Bochs
Reversing dwarf fortress for !!fun!! and ruby Yoann Guillot Last year I gave a talk on Memory Eye, a memory analysis tool, which was ... Reverse Engineering ExcludeThinkstScapes Gaming
Doing it for the Lulz: Anonymous and a Radical Politics of Dissent Gabriella Coleman N/A Security
Recognition of binary patterns by Morphological analysis Aurelien Thierry Morphological analysis is a method that we developed in order to recognize parts of binary ... Reverse Engineering ExcludeThinkstScapes
Cryptographic Function Identification in Obfuscated Binary Programs Joan Calvet N/A Security
Dynamic Binary Instrumentation Frameworks: I know you're there spying on me Francisco Falcon , Nahuel Riva Debuggers have been -and still are- the de-facto tool for dynamic analysis of programs. In ... Reverse Engineering IncludeThinkstScapes Instrumentation Anti-Instrumentation
Toolbag Brandon Edwards , Aaron Portnoy N/A
GPUs for Mobile Malware, Mitigation and More Thinking outside-the-CPU Jared Carlson This talk will discuss how to leverage processors outside of the CPU for both defensive ... IncludeThinkstScapes GPU Shaders