BugTraq
Recon 2010 - Speaker list, new additional capacity for sold-out training, party details Jun 07 2010 06:06PM
Hugo Fortier (hfortier recon cx)
CONNECT 2010

+ + + +
+ + +
+ +
\ /
+ _ - _+_ - ,__
_=. .:. /=\ _|===|_ ||::|
| | _|. | | | | | | __===_ -=- ||::|
|==| | | __ |.:.| /\| |:. | | | | .|| : |||::|
| |- |.:|_|. :__ |.: |--|==| | .| |_ | ' |. ||. |||:.|
__|. | |_|. | |.|...||---| |==| | | | |_--. || |||. |
| | | |. | | |::.||: .| |==| | . : |=|===| :|| . ||| .|
|:.| .| | | | |:.:|| . | |==| | |=|===| . |' | | |
| | | | |' : . | ; ; ' |
' : ` : ' . ' . . :
' . R E C O N 2 0 1 0 .
` . . '
. Speakers Announcement

++ REC0N 2010
++ MONTREAL
++ JULY 9-11

++ http://www.recon.cx

+ RECON returns for 2010

- Training sessions + conference

+ The conference is nearly sold out, if you didn't register yet, hurry up
while there are still tickets left.

+ We expanded the two sold-out training courses - Rolf Rolles and Alex
Ionescu will each train a second session July 12-14.

July 6-8:
- Binary Literacy: Static Reverse Engineering by Rolf Rolles (sold out)
- Binary Vulnerabilities and Exploit Writing by Gerardo 'gera' Richarte
- Windows Internals for Reverse Engineers by Alex Ionescu (sold out)
- Coding Unpackers for Fun and Profit: TitanEngine by Tomislav Pericin

July 12-14:
- Binary Literacy: Static Reverse Engineering by Rolf Rolles
- Windows Internals for Reverse Engineers by Alex Ionescu

++ Speakers lineup (Description at http://recon.cx/2010/speakers.html)

+ Keynote

- Richard Thieme - Ethical Considerations of Intelligence and
Information Security

+ Speakers

- Pierre-Marc Bureau and Joan Calvet - Understanding Swizzor's
Obfuscation Scheme
- Ero Carrera and Jose Duart - Packer Genetics: The Selfish Code
- Gynvael Coldwind and Unavowed - Syndicate Wars Port: How to port a DOS
game to modern systems
- Dino Dai Zovi - Mac OS X Return-Oriented Exploitation
- Nicolas Falliere - Reversing Trojan.Mebroot's Obfuscation
- Yoann Guillot and Alexandre Gazet - Metasm Feelings (30 minutes)
- Travis Goodspeed - Building hardware for exploring deeply embedded systems
- Sean Heelan - Applying Taint Analysis and Theorem Proving to Exploit
Development
- Alex Ionescu - Debugger-based Target-to-Host Cross-System Attacks
- Ricky Lawshae - Picking Electronic Locks Using TCP Sequence Prediction
(20 minutes)
- Assaf Nativ - Memory analysis - Looking into the eye of the bits
- Deviant Ollam - Finding Chinks in the Armor - Reverse-Engineering Locks
- Sebastien Porst - How to really obfuscate your malware PDF files
- Danny Quist - Reverse Engineering with Hypervisors
- Jason Cheatham and Jason Raber - Reverse Engineering with Hardware
Debuggers (20 minutes)
- Stephen Ridley - Escaping the Sandbox
- Igor Skochinsky - Intro to Embedded Reverse Engineering for PC reversers
- Michael Sokolov - SDSL reverse engineering
- Jonathan Stuart - DMS, 5ESS and Datakit VCS II: interfaces and internals
- William Whistler - Reversing, better
- Georg Wicherski - dirtbox, a highly scalable x86/Windows Emulator
- Sebastian Wilhelm Graf - Rainbowtables re-implemented

++ Recon wouldn't be Recon without a Party!

- Saturday 10 July at Cafe Campus (http://www.cafecampus.com)
- Open to everyone (not just Recon attendees)
- Lightning talks (1-10 minutes each), come prepared!
- More details to be posted on the website soon.

+ DJ & VJ (http://cruzcontrol.org/)
- Banditos
- DualCore (http://dualcoremusic.com/nerdcore/)
- The Gulf Stream
- HpNoTik
- Kasdal
- Ma"
- YanKat
- More to come

NO CARRIER

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus