یکی از کنفرانس های معروف در حوزه امنیت سایبری ، کنفرانس REcon هستش که روی مهندسی معکوس و توسعه اکسپلویت متمرکزه و هر ساله در مونترآل کانادا برگزار میشه.
موضوعاتی که کنفرانس ازش استقبال میکنه (البته محدود به اینا نیست) :
- مهندسی معکوس سخت افزار
- مهندسی معکوس نرم افزار
- مهندسی معکوس پروتکل ها
- کشف آسیب پذیری و توسعه اکسپلویت
- دور زدن محافظت های امنیتی و نرم افزاری
- حمله به رمزنگاری در نرم افزار و سخت افزار
- وایرلس هکینگ
- و …
در کنار کنفرانس ، یسری کارگاه جذاب هم برگزار میشه، مثلا برای سال پیش این کارگاهها برگزار شده بود:
– Hypervisor Development for Security Analysis by Satoshi Tanda
– Risc-V Security Training by Don A. Bailey
– Modern Binary Exploitation by Jeremy Blackthorne
– Program Analysis Training by Sophia D’Antoine and Jordan Wiens
– Windows Internals for reverse Engineers by Alex Ionescu and Yarden Shafir
– Advanced Fuzzing and Crash Analysis by Richard Johnson
– Hunting and Reversing UEFI Firmware Implants by Alex Matrosov
– Practical Web Browser Fuzzing by Patrick Ventuzelo
– Modern Malware OPSEC & Anti-Reverse Techniques Implementation and Reversing by Silvio La Porta and Antonio Villani
– Software Deobfuscation Techniques by Tim Blazytko
– Reversing with Ghidra by Kayla Afanador
– ARM Firmware reverse-engineering with Ghidra by Thomas Roth
– The ARM IoT Exploit Laboratory by Saumil Shah
– Advanced Smart Contract Security by Chris Masden and and Dan Nolan
– Advanced Malware Reverse Engineering by Nicolas Brulez
این کنفرانس سال 2022 در طی سه روز، 3 تا 5 ژوئن ، 13 تا 15 خرداد 1401 ، برگزار شد. ویدیوها و اسلایدهای سال 2022 این کنفرانس رو میتونید از لینکهای زیر دانلود کنید:
- Natalie Silvanovich: Zooming in on Zero-click Exploits ( اسلاید – ویدیو)
- Jannis Kirschner : Reverse engineering of black-box binaries with symbolic and concolic execution techniques (اسلاید – ویدیو)
- Vitor Ventura : Instrumenting system applications on Android stock images (اسلاید – ویدیو)
- Philippe Laulheret : Reversing an M32C firmware — Lesson learned from playing with an uncommon architecture (اسلاید – ویدیو)
- Valentina Palmiotti: Breaking the Glass Sandbox: Find Linux Kernel Bugs and Escape (اسلاید – ویدیو)
- Slava Makkaveev: Researching the Unisoc baseband, like in the army (اسلاید – ویدیو)
- Tim Blazytko: The Next Generation of Virtualization-based Obfuscators (اسلاید – مقاله آکادمیک – ویدیو )
- Martin Herfurt: Project TEMPA – Demystifying Tesla’s Bluetooth Passive Entry system (اسلاید – ویدیو)
- Juan Andres Guerrero-Saade: Beyond AlphaGolang: Automated hunting based on reversing Go binaries (ویدیو)
- Andrea Allievi: Function overrides, from a Security mitigation to a fully-fledged Performance Feature in Windows (اسلاید)
- Matt Graeber: Living Off the Walled Garden: Abusing the Features of the Early Launch Antimalware Ecosystem (اسلاید – ویدیو)
- James Niven & Lindsay Kaye: Malware Wars: DarkSide Strikes Back as BlackMatter (اسلاید – ویدیو)
- Ian Dupont & Harrison Green: Pulling MikroTik into the Limelight: Demystifying and Jailbreaking RouterOS (اسلاید – ویدیو)
- Tomer Bar: OopsSec -The bad, the worst and the ugly of APT’s operations security (ویدیو)
- Michael Grube: Samsara Metamorphic Engine (ویدیو)
- Vladislav Hrčka: Under the hood of Wslink’s multilayered virtual machine (اسلاید – مقاله آکادمیک – ویدیو)
- Fabian Freyer & Marius Muench: The Mysterious Life of an Exception (ویدیو)
- Pietro Frigo & Enrico Barberis: A Dirty Little History: Bypassing Spectre Hardware Defenses to Leak Kernel Data (اسلاید – ویدیو)
- Takahiro Haruyama: Detect Me If You Can – Anti-Firmware Forensics (اسلاید – ویدیو)
- Yaron Samuel: Dotnetfile: parsing .NET PE files has never been easier (اسلاید – ویدیو)
- jiska: When Wireless Malware Stays On After Turning Off iPhones (اسلاید – ویدیو)
این کنفرانس قراره امسال 9 تا 11 ژوئن ، 19 تا 21 خرداد 1403 ، برگزار بشه. امکان ارسال مقاله هم بازه. کارگاههایی هم که قراره امسال برگزار بشه موارد زیر هستش :
– Automating Reverse Engineering with Machine Learning, Binary Analysis, and Natural Language Processing by Malachi Jones
– Modern indows Malware OPSEC and Anti-Reverse Techniques Implementation and REeversing by Silvio La Porta and Antonio Villani
– Practical Browser Fuzzing by Patrick Ventuzelo
– Software Deobfuscation Techniques by Tim Blazytko
– The ARM IoT Exploit Laboratory by Saumil Shah
– Reversing with Ghidra by Jeremy Blackthorne
– Windows Internals for Reverse Engineers by Yarden Shafir
– Automated Analysis with Ghidra by Kayla Afanador
– Advanced IC Reverse Engineering and Data Extraction by Olivier Thomas
– Advanced Malware Reverse Engineering by Nicolas Brulez
– Program Analysis for Vulnerability Research by Sophia D’Antoine & Jordan Wiens
– MacOS Ventura and iOS 16 Kernel Internals for Security Researchers by Stefan Esser
– Practical Baseband Exploitation by Pedro Ribeiro
– Ethereum Smart Contract Security by Chris Masden
– RISC-V Security Training by Don A. Bailey