What

REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It is held annually in Montreal, Canada.


The conference offers a single track of presentations over the span of three days along with technical training sessions held before the presentation dates. Technical training varies in length between two and four days.

When

Conference: June 19-21, 2015

Training: June 15-18, 2015

Where

REcon will be held in downtown Montreal, Canada at the Hyatt Regency Montreal

Register

Conference registration is now closed. A more detailed explanation is that while the conference is now sold out, we still have a few training slots available. If you would like to register for both a training session and the conference, please contact us at info (at) recon.cx

News

2015/06/08: The schedule for this year is now up! Feel free to go satisfy your curiosity on some novel abstracts and presentation outlines while waiting for next week!

2015/05/28: Talk selection update:
 - Accepted: The M/o/Vfuscator by Christopher Domas
 - Cancelled: Direct X - Direct way to Microsoft Windows Kernel by Nikita Tarakanov and Axel Monroy

2015/05/27: Recon Conference is now sold out. We still have a few training seats available. If you would like to register for both training and conference, please contact us at info (at) recon.cx.

2015/05/11: The talk selection is nearly complete! We are still waiting on a few confirmations to annouce the final lineup, but so far the selected presentations are:

 - 0x3E9 Ways to DIE by Yaniv Balmas
 - Introducing PCBRE by David Carne
 - Totally Spies! by Joan Calvet, Marion Marschalek and Paul Rascagnères
 - Direct X - Direct way to Microsoft Windows Kernel by Nikita Tarakanov and Axel Monroy
 - From Silicon to Compiler by Andrew Zonenberg
 - Building a Better Bluetooth Attack Framework by Chris Weedon
 - Understaning the Microsoft Office Protected-View Sandbox by Yong Chuan Koh
 - Reverse Engineering Windows AFD.sys by Steven Vittitoe
 - Towards Transparent Dynamic Binary Instrumentation using Virtual Machine Introspection by Julian Kirsch
 - Hooking Nirvana by Alex Ionescu
 - This Time Font hunt you down in 4 bytes by Peter Hlavaty and Jihui Lu
 - Exploiting Out-of-Order-Execution by Sophia D'Antoine
 - Glitching and Side-Channel Analysis for All by Colin O'Flynn
 - Abusing Silent Mitigations by Brian Gorenc, Simon Zuckerbraun, Abdul-Aziz Hariri
 - Reversing the Nintendo 64 CIC by Mike Ryan and John McMaster
 - Pandora's Cash Box: The Ghost Under Your POS by Nitay Artenstein and Shift Reduce
 - Radare2, building a new IDA by Julien Voisin and Jeffrey Crowell
 - One font vulnerability to rule them all by Mateusz "j00ru" Jurczyk
 - Finish Him! by exide
 - Polyglots and Chimeras in Digital Radio Modes by Travis Goodspeed and Sergey Bratus
 - Attacking and Defending BIOS in 2015 by Yuriy Bulygin, Mikhail Gorobets, Andrew Furtak, Oleksandr Bazhaniukm, Alexander Matrosov and Mickey Shkatov

2015/04/27: The Hyatt is currently sold-out from June 15th to June 18th, and is approaching capacity for the conference dates as well. Some alternate hotel suggestions have been posted to the travel page, don't hesitate to contact us if you need assitance locating a nearby hotel.

2015/04/10: The first four talks of Recon 2015 have been selected, with more announcements coming soon! These presentations are:

 - 0x3E9 Ways to DIE by Yaniv Balmas
 - Introducing PCBRE by David Carne
 - Totally Spies! by Joan Calvet, Marion Marschalek and Paul Rascagnères
 - Direct X - Direct way to Microsoft Windows Kernel by Nikita Tarakanov and Axel Monroy

2015/01/08: The REcon 2015 CFP and Trainings have been announced!