Ya están disponibles para descarga las presentaciones de la Recon 2012 celebrada el pasado mes de junio.
- Backside optical analysis hardware/software running on ICs - Slides (application/pdf - 3.2 MB)
- Be Social. Use Rewoltke. - Slides (application/pdf - 4.9 MB)
- Bootkit Threats: In-Depth Reverse Engineering & Defense - Slides (application/pdf - 3.9 MB)
- Compiler Internals: Exceptions and RTTI - Scripts (application/zip - 44.5 KB)Slides (application/pdf - 872.3 KB)
- Cryptographic Function Identification in Obfuscated Binary Programs - Slides (application/pdf - 3.7 MB)
- Designing a minimal operating system to emulate 32/64bits x86 code snippets, shellcode or malware in Bochs - Slides (application/pdf - 957.8 KB)
- Dynamic Binary Instrumentation Frameworks: I know you're there spying on me - Slides (application/pdf - 1.8 MB)
- Extraordinary String Based Attacks - Slides (application/pdf - 3 MB)
- Facedancer USB: Exploiting the Magic School Bus - Slides (application/pdf - 16.2 MB)
- GPUs for Mobile Malware, Mitigation and More - Slides (application/pdf - 831.7 KB)
- Thinking outside-the-CPU - Slides (application/pdf - 831.7 KB)
- Injecting custom payload into signed Windows executables - Slides (application/octet-stream - 3.7 MB)
- Analysis of the CVE-2012-0151 vulnerability - Slides (application/octet-stream - 3.7 MB)
- Inside AVM - Slides (application/pdf - 1.2 MB)
- Modern static security checking of C / C++ programs - Slides (application/pdf - 1.3 MB)
- Predicting English keywords from Java Bytecodes using Machine Learning - Slides (application/pdf - 401.5 KB)
- Recognition of binary patterns by Morphological analysis - Slides (application/pdf - 4.6 MB)
- Reverse engineering of binary programs for custom virtual machines - Slides (application/pdf - 554.6 KB)
- The Case for Semantics-Based Methods in Reverse Engineering - Slides (application/pdf - 763.8 KB)
- reversing dwarf fortress for !!fun!! and ruby - Slides (application/pdf - 448.2 KB)