Star 0


Title Humans
GRAP: define and match graph patterns within binaries Aurelien Thierry , Jonathan Thieuleux
Reverse Engineering Satellite Based IP Content Distribution Taylor Jacob
Getting Physical with USB Type-C: Windows 10 RAM Forensics and UEFI Attacks Alex Ionescu
Reverse engineering of file formats and network protocols using Kaitai Struct Mikhail Yakshin
Harnessing Intel Processor Trace on Windows for fuzzing and dynamic analysis Andrea Allievi , Richard Johnson
Legacy Crypto Never Dies David Hulton
Contributor analysis Francisco Blas Izquierdo Riera (Klondike)
A Little Less Conversation, A Little More ActionScript WanderingGlitch
Poutine: Dusting Forgotten Lore Yannick Lamarre
Breaking Code Read Protection on the NXP LPC-family Microcontrollers Chris Gerlinsky
miLazyCracker Kevin Larson
Analyzing iOS apps: road from AppStore to security analysis report Lenar Safin , Yaroslav Alexandrov , Egor Fominykh , Alexander Chernov
Embedded devices reverse engineering Vitor Ventura , Vladan Nikolić
r2m2 Guillaume “guedou” Valadon
Your Chakra Is Not Aligned Natalie Silvanovich
Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware Fotis Loukos
Transforming Open Source to Open Access in Closed Applications Brian Gorenc , Jasiel Spelman , Abdul-Aziz Hariri
Baring the system: New vulnerabilities in SMM of Coreboot and UEFI based systems Yuriy Bulygin , Oleksandr Bazhaniuk
Hopeless Relay Protection for Substation Automation Kirill Nesterov , Alexander Tlyapov
Teaching Old Shellcode New Tricks Josh Pitts