underground.org.mx
0
  • Enero 23, 2020, 07:44:41 am
  • Bienvenido(a), Visitante
Por favor ingresa o regístrese.

Ingresar con nombre de usuario, contraseña y duración de la sesión
Búsqueda Avanzada  

Autor Tema: REcon Montreal [Junio 28 - Julio 4]  (Leído 64 veces)

hkm

  • Miembro
  • *
  • Karma: +1/-0
  • Mensajes: 49
    • Ver Perfil
    • http://hak.im
REcon Montreal [Junio 28 - Julio 4]
« on: Enero 13, 2020, 09:05:52 pm »

https://recon.cx/

WHAT
REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It is held annually in Montreal, Canada. It offers a single track of presentations over the span of three days with a focus on reverse engineering and advanced exploitation techniques.

For more information, including pricing and hotel reservation details, head over to the conference page.

WHEN
Conference: June 28 - 30, 2019

Training: June 24 - 27, 2019

Training: July 1 - 4, 2019

WHERE
REcon will be held in downtown Montreal, Canada at the Hilton Double Tree.

Some training will be held at Monville a block away from Hilton Double Tree. Training location will be annouced when registration open

Important Note: As of last year many foreign travelers to Canada will require an Electronic Travel Authorization (eTA) prior to entering the country. Please check the following website to find out if this applies to you: http://www.cic.gc.ca/english/visit/visas.asp

The second round of talks have been accepted
We’d like to congratulate the submitters who have been selected for the second phase of the CFP!

Attacking Hexagon: Security Analysis of Qualcomm's ADSP by Dimitrios Tatsis
Automating the exploit primitive discovery process in embedded devices by Christopher Roberts
Automation Techniques in C++ Reverse Engineering by Rolf Rolles
Burned in Ashes: Baseband Fairy Tale Stories by Guy
Defeating APT10 Compiler-level Obfuscations by Takahiro Haruyama
MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection by Colin O'Flynn
Mining Disputed Territories: Studying Attacker Signatures for Improved Situational Awareness by Juan Andres Guerrero-Saade
Open-Source Ghidra: The First Few Months by emteere and ghidracadabra
Reversing and Exploiting Broadcom Bluetooth by Dennis Mantz and jiska
Seeing Inside the Encrypted Envelope by Natalie Silvanovich
Snow Crashing Virtual Reality, 2019 Edition by Alex Radocea
The (Long) Journey To A Multi-Architecture Disassembler by Joan Calvet
The Backdoor Foundry: A Toolchain for Building Application Specific Implants by Evan Jensen
The Last Generic Win32k KASLR Defeat in Windows 10 by Alex Ionescu
The Path to the Payload: Android Edition by Maddie Stone
The ROM matrix revolutions: Unscrambling bits by Chris Gerlinsky
The road to Qualcomm TrustZone apps fuzzing by Slava Makkaveev
Unveiling the underground world of Anti-Cheats by Joel Noguera
Using WPP and TraceLogging Tracing to Facilitate Dynamic and Static Windows RE by Matt Graeber
Vectorized Emulation: Putting it all together by Brandon Falk
April 23, 2019
The first round of talks have been accepted
We’d like to congratulate the submitters who have been selected for the first phase of the CFP!

Burned in Ashes: Baseband Fairy Tale Stories by Guy (@shiftreduce)
The ROM matrix revolutions: Unscrambling bits by Chris Gerlinsky
Unveiling the underground world of Anti-Cheats by Joel Noguera
The Backdoor Foundry: A Toolchain for Building Application Specific Implants by Evan Jensen
The Path to the Payload: Android Edition by Maddie Stone
MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection by Colin O'Flynn
Seeing Inside the Encrypted Envelope by Natalie Silvanovich
Open-Source Ghidra: The First Few Months by emteere and ghidracadabra
Attacking Hexagon: Security Analysis of Qualcomm's ADSP by Dimitrios Tatsis

https://recon.cx/
En línea