© recon.cx 2005-2015
  • home
  • conference
  • training
  • schedule
  • cfp
  • sponsors
  • travel
  • archives
  • contact

Recon 2015 Schedule

  • Schedule
  • Speakers
  • Events
  • iCalendar
  • -
  • xCal
  • -
  • XML
  • -
  • JSON


DAY 1 (2015-06-19)

08:00

Registration

09:00

Opening Ceremony

10:00

Totally Spies!

A Tour in Espionage Cartoons
Joan Calvet, Marion Marschalek, Paul Rascagnères

11:00

Abusing Silent Mitigations

Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection
Brian Gorenc, Simon Zuckerbraun, Abdul-Aziz Hariri

12:00

Lunch - Location: Soprano Rooms

The Soprano rooms are located on the 4th floor of the hotel.

13:00

Finish Him!

Reversing Midway Arcade Audio With DeDCS
exide

Radare2, building a new IDA

Creating an open source reverse engineering ecosystem.
Jeffrey Crowell, Julien Voisin

14:00

This Time Font hunt you down in 4 bytes

Peter Hlavaty, Jihui Lu

15:00

Exploiting Out-of-Order-Execution

Processor Side Channels to Enable Cross VM Code Execution
Sophia D'Antoine

Coffee Break

16:00

Polyglots and Chimeras in Digital Radio Modes

Featuring Practical Matryoshka Protocols for a 21st Century Numbers Station
Travis Goodspeed, Sergey Bratus

17:00

Towards Transparent Dynamic Binary Instrumentation using Virtual Machine Introspection

Julian Kirsch
 
 

18:00

 
 
 
 

19:00

 
 
 
 

20:00

 
 
 
 

21:00

 
 
 
 

22:00

 
 
 
 
DAY 2 (2015-06-20)
 
 
 
 
 
 
 
 

Attacking and Defending BIOS in 2015

Yuriy Bulygin, Oleksandr Bazhaniuk

'0x3E9 Ways to DIE'

Introducing Dynamic IDA Enrichment framework (a.k.a DIE)
Yaniv Balmas

Lunch - Location: Soprano Rooms

The Soprano rooms are located on the 4th floor of the hotel.

Introducing PCBRE

An open source PCB reverse-engineering suite
David Carne

Hooking Nirvana

Stealthy Instrumentation Techniques for Windows 10
Alex Ionescu

Glitching and Side-Channel Analysis for All

Colin O’Flynn

Coffee Break

The M/o/Vfuscator

Turning 'mov' into a soul-crushing RE nightmare
Christopher Domas

Building a Better Bluetooth Attack Framework

Ubertooth attack and injection tool suite
Chris Weedon
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
DAY 3 (2015-06-21)
 
 
 
 
 
 
 
 

Understaning the Microsoft Office Protected-View Sandbox

Yong Chuan Koh

Pandora's Cash Box: The Ghost Under Your POS

Nitay Artenstein, Shift Reduce

Lunch - Location: Soprano Rooms

The Soprano rooms are located on the 4th floor of the hotel.

From Silicon to Compiler

Reverse-Engineering the CoolRunner-II Bitstream Format
Andrew Zonenberg

Reversing the Nintendo 64 CIC

Reversing a 20 year old copy protection chip
Mike Ryan, John McMaster, marshallh

Reverse Engineering Windows AFD.sys

Uncovering the Intricacies of the Ancillary Function Driver
Steven Vittitoe

Coffee Break

"One font vulnerability to rule them all"

"A story of cross-software ownage, shared codebases and advanced exploitation"
Mateusz "j00ru" Jurczyk

Closing Ceremony