GRAP: define and match graph patterns within binaries
|
Aurelien Thierry
,
Jonathan Thieuleux
|
Reverse Engineering Satellite Based IP Content Distribution
|
Taylor Jacob
|
Getting Physical with USB Type-C: Windows 10 RAM Forensics and UEFI Attacks
|
Alex Ionescu
|
Reverse engineering of file formats and network protocols using Kaitai Struct
|
Mikhail Yakshin
|
Harnessing Intel Processor Trace on Windows for fuzzing and dynamic analysis
|
Andrea Allievi
,
Richard Johnson
|
Legacy Crypto Never Dies
|
David Hulton
|
Contributor analysis
|
Francisco Blas Izquierdo Riera (Klondike)
|
A Little Less Conversation, A Little More ActionScript
|
WanderingGlitch
|
Poutine: Dusting Forgotten Lore
|
Yannick Lamarre
|
Breaking Code Read Protection on the NXP LPC-family Microcontrollers
|
Chris Gerlinsky
|
miLazyCracker
|
Kevin Larson
|
Analyzing iOS apps: road from AppStore to security analysis report
|
Lenar Safin
,
Yaroslav Alexandrov
,
Egor Fominykh
,
Alexander Chernov
|
Embedded devices reverse engineering
|
Vitor Ventura
,
Vladan Nikolić
|
r2m2
|
Guillaume “guedou” Valadon
|
Your Chakra Is Not Aligned
|
Natalie Silvanovich
|
Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware
|
Fotis Loukos
|
Transforming Open Source to Open Access in Closed Applications
|
Brian Gorenc
,
Jasiel Spelman
,
Abdul-Aziz Hariri
|
Baring the system: New vulnerabilities in SMM of Coreboot and UEFI based systems
|
Yuriy Bulygin
,
Oleksandr Bazhaniuk
|
Hopeless Relay Protection for Substation Automation
|
Kirill Nesterov
,
Alexander Tlyapov
|
Teaching Old Shellcode New Tricks
|
Josh Pitts
|