Create your own Fitness Tracker Firmware
|
Jiska Classen
,
Daniel Wegemer
|
SiliVaccine: North Korea's weapon of Mass Detection
|
Mark Lechtik
,
Michael Kajiloti
|
Reverse Engineering Of Blockchain Smart Contracts
|
Patrick Ventuzelo
|
Breath of the RF Field
|
James Chambers
|
Rattle - an Ethereum EVM binary analysis framework
|
Ryan Stortz
|
A Code Pirate's Cutlass
|
evm
|
This Dump is a Puzzle
|
Phoebe Queen
|
Sandbagility - Reverse Engineering Framework for Windows dynamic analysis
|
François Khourbiga
,
Eddy Deligne
|
An Open-Source Machine-Code Decompiler
|
Marek Milkovič
,
Peter Matula
|
Pwning Intel PIN
|
Julian Kirsch
,
Zhechko Zhechev
|
Meet Salinas, the first ever SMS-commanded Car Infotainment RAT
|
Daniel Regalado
,
Ken Hsu
,
Gerardo Iglesias
|
Bushwhacking your way around a bootloader
|
Rebecca ".bx" Shapiro
|
Static instrumentation based on executable file formats
|
Romain Thomas
|
Analyzing TRISIS - the first Safety Instrumented System malware
|
K. Reid Wightman
,
Jimmy Wylie
|
Modern Linux Malware Exposed
|
Emanuele Cozzi
,
Mariano Graziano
|
PWN Flash with Reflection and HashTables
|
Tao Yan
,
Bo Qu
|
Malware Analysis and Automation using Binary Ninja
|
Erika Noerenberg
|
Unknown Known DLLs and other Code Integrity Trust Violations
|
Alex Ionescu
,
James Forshaw
|
Taint-based return oriented programming
|
Colas Le Guernic
,
François Khourbiga
|
Sum Total of ISA Knowledge
|
Alex Kropivny
|
PreVice: Static Detection of Hooking Capabilities in Machine Code
|
Andy Wortman
,
Claudiu Teodorescu
,
Derek Soeder
|
Reverse Engineering Windows Defender Part II
|
Alexei Bulazel
|
Building a Damned Good Watch
|
Travis Goodspeed
|
Tracing Struct Accesses with Struct Stalker
|
Jeff Dileo
|
Exploiting User-land vulnerabilities to Get Rogue App Installed Remotely on iOS 11
|
Liang Chen
,
Marco Grassi
|
Cloudy With a Chance of Malware
|
Marika Chauvin
|
Discovering the iOS Instruments Server
|
Troy Bowman
|