BinCAT: purrfecting binary static analysis
|
Philippe Biondi
,
Xavier Mehrenberger
,
Raphaël Rigo
,
Sarah Zennou
|
Hacking Cell Phone Embedded Systems
|
Keegan Ryan
|
BASS Automated Signature Synthesizer
|
Mariano Graziano
,
Jonas Zaddach
|
You can run, but you can’t hide
|
Vlad Sabaka
|
HDI PCB Netlist Recovery: a new (old) technique
|
David Carne
|
MazeWalker - Enriching static malware analysis
|
Yevgeniy Kulakov
|
Exporting IDA Debug Information
|
Adam Schwalm
|
SGX Enclave programming: common mistakes
|
Michael Atlas
|
The Life-Changing Magic of IDAPython: Embedded Device Edition
|
Maddie Stone
|
Digging Into the Core of Boot
|
Yuriy Bulygin
,
Oleksandr Bazhaniuk
|
Coverage Guided Kernel Fuzzing
|
Richard Johnson
|
APT3 Uncovered - The code evolution of Pirpi
|
Micah Yates
|
The HyperV Architecture and its Memory Manager
|
Andrea Allievi
|
ZapZap! bangBang!
|
Ang Cui
,
Rick Housley
|
FreeCalypso: a fully liberated GSM baseband
|
Mychaela Falconia
|
Fun with Sam: Inside the Surface Aggregator Module
|
Alex Ionescu
|
Bubble Struggle - Call Graph Visualization with Radare2
|
Marion Marschalek
|
Miasm: reverse engineering framework
|
Fabrice Desclaux
,
Camille Mougey
|
Reverse Engineering DSSS
|
Michael Ossmann
|
The Lightbulb Worm - A Debriefing on Philips Hue Attacks
|
Colin O’Flynn
,
Eyal Ronen
|
Bochspwn Reloaded: Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking
|
Mateusz “j00ru” Jurczyk
|
Crypton - Exposing malware’s deepest secrets
|
Julia karpin
,
Anna Dorfman
|