| 2025-08-07 | Talk | Blackhat |
Uncovering ‘NASty’ 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing
| Kanika Gupta | reverse-engineeringfirmware-analysismobile-security+2 |
| 2025-08-06 | Tool demo | Blackhat |
ARC – Artifact Reuse Comparator
| Rushikesh D Nandedkar | static-analysisreverse-engineeringbinary-analysis+3 |
| 2025-08-06 | Tool demo | Blackhat |
ParseAndC 4.0 - The Final Cut
| Parbati Kumar Manna | reverse-engineeringbinary-analysiscode-analysis+4 |
| 2025-08-06 | Tool demo | Blackhat |
ProcessInjection
| Chirag Savla | pentestingred-teamingreverse-engineering+1 |
| 2025-08-06 | Tool demo | Blackhat |
ROP ROCKET: Advanced Framework for Return-Oriented Programming
| Shiva Shashank | reverse-engineeringexploitationpentesting+3 |
| 2025-08-06 | Tool demo | Blackhat |
ShadowSeek: Combining Ghidra and Large Language Models for Advanced Binary Analysis
| Mohammed Tanveer | reverse-engineeringbinary-analysisstatic-analysis+3 |
| 2025-04-04 | Talk | Blackhat |
Standing on the Shoulders of Giants: De-Obfuscating WebAssembly Using LLVM
| Vikas Gupta | reverse-engineeringcode-analysissoftware-security |
| 2025-03-02 | Talk | Nullcon |
Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks
| Shyam Kumar Arshid, Chinmay Krishna | embedded-securityfirmware-analysishardware-security+3 |
| 2024-11-21 | Talk | Deepsec |
Hacking with Physics v2.0
| Hrishikesh Somchatwar | industrial-control-systems-securityembedded-securityfirmware-analysis+3 |
| 2024-11-15 | Talk | C0c0n |
Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate
| Kartik Lalan | automotive-cybersecurityvulnerability-managementreverse-engineering+2 |
| 2024-10-02 | Talk | Virus Bulletin |
Arming WinRAR: deep dive into APTs exploiting WinRAR’s 0-day vulnerability - a SideCopy case study
| Sathwik RAM Prakki | reverse-engineeringvulnerability-managementapt+1 |
| 2024-08-30 | Talk | Hitb Sec Conf |
Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles
| Ravi Rajput | web-securitypentestingexploitation+4 |
| 2024-08-29 | Talk | Hitb Sec Conf |
COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts
| Chetan Raghuprasad | reverse-engineeringpentestingincident-response |
| 2024-08-14 | Talk | Usenix |
Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors
| Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay | reverse-engineeringvulnerability-managementsecurity-architecture+1 |
| 2024-04-19 | Talk | Blackhat |
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems
| Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay | embedded-securityfirmware-analysisvulnerability-management+2 |
| 2023-11-17 | Talk | Deepsec |
Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption
| Shubham Dubey | vulnerability-managementreverse-engineeringexploitation+1 |
| 2023-09-23 | Talk | Nullcon |
Reverse Engineering RGB Keyboard Backlights With Linux Kernel Drivers
| Rishit Bansal | reverse-engineering |
| 2023-08-13 | Tool demo | Blackhat |
Advanced ROP Framework: Pushing ROP to Its Limits
| Shiva Shashank | reverse-engineeringpentestingexploitation+3 |
| 2023-08-10 | Talk | Defcon |
Hardware Backdooring an e-Scooter
| Arun Mane | reverse-engineeringindustrial-control-systems-securityvulnerability-management+2 |
| 2023-08-10 | Talk | Defcon |
Wheels of Wonder: Unveiling Car Hacking Poetry
| Hrishikesh Somchatwar | firmware-analysisreverse-engineeringautomotive-cybersecurity+1 |
| 2023-08-07 | Talk | C0c0n |
Cellibrite Premium Mobile Forensic tool iPhone analysis
| Vaibhav Kumar | mobile-securitymobile-forensicsreverse-engineering+3 |
| 2023-08-07 | Talk | C0c0n |
Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs
| Sathwik RAM Prakki | aptreverse-engineeringincident-response |
| 2023-08-07 | Talk | C0c0n |
Uncovering the Hidden Dangers Lurking as Android Apps using ML Algos
| Nikhil Prabhakar | android-securitymobile-securityreverse-engineering+1 |
| 2023-08-06 | Talk | C0c0n |
Developments in Deep Fake detection
| Tapas Saini | security-architecturesecurity-awarenessreverse-engineering+1 |
| 2022-09-24 | Talk | C0c0n |
Introduction to RFID/NFC Hacking
| Davis Sojan | embedded-securityfirmware-analysishardware-security+3 |
| 2022-09-23 | Talk | C0c0n |
Hacking SmartContracts
| Anto Joseph | blockchain-securitysmart-contractsvulnerability-management+2 |
| 2022-09-23 | Talk | C0c0n |
Pwning Android Apps at Scale
| Sparsh Kulshrestha, Shashank Barthwal | android-securitymobile-securitymobile-pentesting+3 |
| 2022-09-23 | Talk | C0c0n |
TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor
| Saurabh Sharma | reverse-engineeringvulnerability-managementpentesting |
| 2022-08-10 | Tool demo | Blackhat |
ParseAndC 2.0 – We Don’t Need No C Programs (for Parsing)
| Parbati Kumar Manna | reverse-engineering |
| 2022-05-18 | Talk | Can Sec West |
Launching EMUX - A framework for emulating ARM and MIPS IoT Devices
| Saumil Shah | firmware-analysisreverse-engineeringembedded-security+1 |
| 2021-11-13 | Talk | C0c0n |
Decoding new age hackers and Criminal Investigation
| Amit Dubey | incident-responsedigital-forensicsreverse-engineering |
| 2021-11-13 | Talk | C0c0n |
New way of looking at the hidden mysteries in the code
| Vandana Verma Sehgal | code-reviewstatic-analysisreverse-engineering+2 |
| 2021-11-12 | Talk | C0c0n |
Dissecting Malicious Software and Analysis
| Shrutirupa Banerjiee | malwarereverse-engineeringdynamic-analysis+1 |
| 2021-11-12 | Talk | C0c0n |
IoT Security Guidelines & Standards
| Yashodhan Vivek Mandke | embedded-securityiot-device-managementiot-security-testing+3 |
| 2021-08-07 | Talk | Defcon |
The Curious Case of Knowing the Unknown
| Vandana Verma Sehgal | threat-huntingthreat_modelingsecurity-architecture+2 |
| 2021-08-04 | Tool demo | Blackhat |
ParseAndC: A Universal Parser and Data Visualization Tool for Security Testing
| Parbati Kumar Manna | reverse-engineering |
| 2021-03-05 | Talk | Nullcon |
Arbitrary code execution on RISC-V using fault injection
| Praveen Vadnala | code-analysis |
| 2020-10-07 | Talk | Rootcon |
Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing
| Kaustubh Padwad | iotredteampentest+1 |
| 2020-10-01 | Tool demo | Blackhat |
Adhrit: Android Security Suite
| Abhishek Jm, Akhil Mahendra | androidcode-analysisreverse-engineering+2 |
| 2020-10-01 | Tool demo | Blackhat |
Mobexler: An All-in-One Mobile Pentest VM
| Abhinav Mishra | mobileandroidios+4 |
| 2020-09-18 | Talk | C0c0n |
Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux
| Munawwar Hussain Shelia | reverse-engineeringiot |
| 2020-03-18 | Talk | Can Sec West |
The ARM-X Firmware Emulation Framework
| Saumil Shah | redteamarmfirmware+5 |
| 2020-03-06 | Tool demo | Nullcon |
Mobexler
| Abhinav Mishra, Abhishek Jaiswal | mobileandroidios+4 |
| 2019-11-09 | Talk | Toor Con |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria | reverse-engineeringhardware-reverse-engineeringvulnerability-management+3 |
| 2019-10-22 | Talk | Hacklu |
Intro to Dark Arts: Getting Started with CTFs
| Geethna T K, Shruti Dixit, Sowmya Potluri | reverse-engineeringbinary-analysisexploitation+1 |
| 2019-10-16 | Tool demo | Hitb Sec Conf |
Introducing ARM-X - The ARM IoT Firmware Emulation Framework
| Saumil Shah | armiotlinux |
| 2019-10-12 | Talk | Texas Cyber Summit |
HX-3012 PErfidious: Make PE Backdooring Great Again!
| Shreyans Doshi | reverse-engineeringmalwarebinary-analysis+3 |
| 2019-10-03 | Talk | Virus Bulletin |
Curious tale of 8.t used by multiple campaigns against South Asia
| Niranjan Jayanand | reverse-engineeringvulnerability-managementapt+1 |
| 2019-08-09 | Talk | Defcon |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria | reverse-engineeringvulnerability-managementsecurity-architecture+2 |
| 2019-08-08 | Talk | Blackhat |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria | reverse-engineeringhardware/embedded |
| 2019-08-08 | Talk | Defcon |
Hacking ICS devices for Fun Penetration Testing of Vehicle Components
| Arun Mane | automotive-cybersecuritycan-busics-security+3 |
| 2019-05-09 | Talk | Hitb Sec Conf |
Make ARM Shellcode Great Again
| Saumil Shah | shellarm |
| 2019-05-04 | Talk | Thot Con |
What The Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing
| Priyank Nigam | fridamobile |
| 2018-10-15 | Talk | Hacklu |
Make ARM Shellcode Great Again
| Saumil Shah | shellarm |
| 2018-10-10 | Talk | Brucon |
Simplifying the art of instrumentation
| Krishnakant Patil, Rushikesh D Nandedkar | reverse-engineeringstatic-analysisdynamic-analysis+2 |
| 2018-10-05 | Talk | C0c0n |
SCANDA: To Unbosom Malware Behavior
| Rajesh Nikam, Parmanand Mishra | malwarereverse-engineeringdynamic-analysis+2 |
| 2018-09-12 | Talk | 44 Con |
Make ARM Shellcode Great Again
| Saumil Shah | shellarm |
| 2018-08-09 | Talk | Defcon |
Backdooring DVR/NVR devices
| Arun Mane | hardware-reverse-engineeringembedded-securitypentesting+3 |
| 2017-11-14 | Talk | Blackhat |
Pwning a Smart Home in Under 10 Minutes
| Aditya Gupta | iot-pentestingembedded-securitypentesting+3 |
| 2017-10-05 | Talk | Virus Bulletin |
The router of all evil: more than just default passwords and silly scripts
| Himanshu Anand | vulnerability-managementreverse-engineeringpentesting+1 |
| 2017-08-18 | Talk | C0c0n |
Dynamic Binary Instrumentation
| Vivek Arora, Bhaskar Rastogi | dynamic-analysisreverse-engineeringbinary-analysis+1 |
| 2017-08-18 | Talk | C0c0n |
Your friendly neighbourhood exploit
| Aseem Jakhar | exploitationpentestingreverse-engineering+1 |
| 2017-08-04 | Talk | Sha |
Attacking OpenSSL using Side-channel Attacks: The RSA case study
| Praveen Vadnala | reverse-engineeringvulnerability-managementsecurity-architecture+1 |
| 2017-07-26 | Tool demo | Blackhat |
Devknox - Autocorrect Security Issues from Android Studio
| Subho Halder | androidmobilecode-analysis+1 |
| 2017-03-30 | Tool demo | Blackhat |
Devknox - Autocorrect Security Issues from Android Studio
| Subho Halder | androidmobilecode-analysis+1 |
| 2016-11-06 | Talk | Ground Zero Summit |
Hacking The Droids
| Anto Joseph | android-securitymobile-securityreverse-engineering+3 |
| 2016-10-27 | Talk | Brucon |
Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!!
| Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil | malwarereverse-engineering |
| 2016-10-13 | Talk | App Sec Usa |
When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE
| Sumanth Naropanth, Kavya Racharla | mobile-securityvulnerability-managementreverse-engineering+1 |
| 2016-10-05 | Talk | Virus Bulletin |
One-Click Fileless Infection
| Himanshu Anand | reverse-engineeringincident-responsevulnerability-management |
| 2016-08-07 | Talk | Defcon |
Cyber Grand Shellphish
| Aravind Machiry | automated-exploit-detectionreverse-engineeringvulnerability-assessment+1 |
| 2016-08-05 | Talk | Defcon |
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
| Jatin Kataria | reverse-engineeringhardware-reverse-engineeringfirmware-analysis+3 |
| 2016-06-18 | Talk | Recon |
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
| Jatin Kataria | reverse-engineeringhardware-reverse-engineeringfirmware-analysis+3 |
| 2016-05-26 | Talk | Hitb Sec Conf |
HITB Lab: Mobile Application Security for iOS and Android
| Tushar Dalvi | mobileandroidios+3 |
| 2016-03-15 | Talk | Groundzerosummit |
r00tKidz and Hacking
| Triveni Singh | pentestingethical-hackingprivilege-escalation+3 |
| 2016-03-11 | Talk | Nullcon |
Physical Lock Security
| Amey Gat, Swapnil Wadwalkar | pentestingreverse-engineeringvulnerability-management+1 |
| 2015-11-05 | Talk | Ground Zero Summit |
Exposing Cyber Espionage: Hello from Pakistan- IIC Session
| Jiten Jain | incident-responsereverse-engineeringpentesting |
| 2015-11-05 | Talk | Ground Zero Summit |
Sanctioned to Hack: Your SCADA HMIs Belong to Us!
| Aditya K Sood | ics-securityweb-securityvulnerability-management+3 |
| 2015-08-07 | Talk | Defcon |
Getting into the Trust Store We Trust
| Ajit Hatti | reverse-engineeringsecurity-architecturevulnerability-management |
| 2015-08-01 | Talk | C0c0n |
Reversing and Deciphering the Cyber Espionage Malware Communications
| Monnappa K A | reverse-engineeringdecipher |
| 2015-03-15 | Talk | Hitb Sec Conf |
Sniffing the Airwaves with RTLSDR
| Yashin Mehaboobe | network-pentestingpacket-analysisnetwork-monitoring+2 |
| 2015-01-27 | Talk | Owasp App Sec California |
Anatomy of memory scraping, credit card stealing POS malware
| Amol Sarwate | reverse-engineeringvulnerability-managementincident-response+1 |
| 2014-10-16 | Talk | Grrcon |
Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design
| Aditya K Sood | redteamreverse-engineeringblueteam+1 |
| 2014-09-26 | Talk | Virus Bulletin |
Evolution of Android exploits from a static analysis tools perspective
| Jagadeesh Chandraiah | android-securitystatic-analysisvulnerability-management+2 |
| 2014-09-18 | Talk | App Sec Usa |
Anatomy of memory scraping, credit card stealing POS malware
| Amol Sarwate | reverse-engineeringmemory-forensicsincident-response+1 |
| 2014-05-29 | Talk | Hitb Sec Conf |
Hacking Your Cable TV Network: Die Hard Style
| Rahul Sasi | networkredteamiptv+1 |
| 2014-05-21 | Talk | Phdays |
Android Exploitation
| Aditya Gupta | mobileandroidredteam+3 |
| 2014-05-21 | Talk | Phdays |
ARM Exploitation
| Aseem Jakhar | armlinuxandroid+1 |
| 2014-03-15 | Talk | Blackhat |
Anatomy of a Credit Card Stealing POS Malware
| Amol Sarwate | reverse-engineeringpentestingvulnerability-management |
| 2014-01-28 | Talk | Owasp App Sec California |
Application Sandboxes: Know thy limits
| Rahul Kashyap | application-pentestingreverse-engineeringvulnerability-management+1 |
| 2013-09-27 | Talk | C0c0n |
ARM, Thumb and the Finger
| Aseem Jakhar | reverse-engineeringbinary-analysisassembly-analysis+2 |
| 2013-09-27 | Talk | C0c0n |
Sandy - The Malicious Analysis
| Rahul Sasi | reverse-engineeringstatic-analysisdynamic-analysis |
| 2013-03-01 | Talk | Nullcon |
Mobile Code mining for discovery and exploits
| Hemil Shah | mobilecode-analysissecure-development+5 |
| 2013-03-01 | Talk | Nullcon |
Pawing the Droid: Twisting the ARM
| Divyanshu Shekhar, Anshul Kumar | androidmobilearm+8 |
| 2012-11-23 | Talk | Malcon |
Surprise paper!
| Atul Alex | malwarereverse-engineeringmobile-security |
| 2012-10-25 | Talk | App Sec Usa |
Cracking the Code of Mobile Application
| Sreenarayan Ashokkumar | mobile-securityreverse-engineeringmobile-pentesting+3 |
| 2012-10-23 | Talk | Hacklu |
Buster: Android Security Buster
| Atul Alex | android-securitymobile-securityreverse-engineering+1 |
| 2012-09-28 | Talk | Nullcon |
Attacking Angry Droids
| Aditya Gupta, Subho Halder | android-securitymobile-securityreverse-engineering+2 |
| 2012-09-27 | Talk | Grrcon |
Reversing Patches for Exploit Creation, Pen-Testing or Just Fun!
| Bharat Jogi | pentestredteamblueteam+2 |
| 2012-08-03 | Talk | C0c0n |
Cracking the Mobile Application Source Code
| Sreenarayan Ashokkumar | mobileandroidios+3 |
| 2012-08-03 | Talk | C0c0n |
I haz you and pwn your maal
| Harsimran Singh Walia | androidmobilereverse-engineering+1 |
| 2012-07-22 | Tool demo | Blackhat |
Kautilya and Nishang
| Nikhil Mittal | post-exploitationethical-hackingpentesting+2 |
| 2012-07-14 | Talk | Hope |
Advancements in Botnet Attacks and Malware Distribution
| Aditya K Sood | malwarebotnetweb-security+2 |
| 2012-02-15 | Talk | Nullcon |
Binary God
| Atul Alex | redteamemulatorassembler+2 |
| 2011-11-17 | Talk | Deepsec |
FakeAntiVirus - Journey from Trojan to a Persisent Threat
| Jagadeesh Chandraiah | malwaretrojanreverse-engineering+1 |
| 2011-08-03 | Talk | Blackhat |
Reverse Engineering Browser Components: Dissecting and Hacking Silverlight, HTML 5 and Flex
| Shreeraj Shah | reverse-engineeringwebajax+6 |
| 2011-02-25 | Talk | Nullcon |
Reversing microsoft patches to reveal vulnerable code
| Harsimran Singh Walia | reverse-engineering |
| 2011-02-25 | Talk | Nullcon |
Automatic Program Analysis using Dynamic Binary Instrumentation (DBI)
| Sunil Kumar | dynamic-binary-instrumentationcode-analysis |
| 2010-10-29 | Talk | T2 |
Hacking Femtocells
| Ravishankar Borgaonkar | mobile-securityreverse-engineeringvulnerability-management |
| 2010-08-01 | Talk | C0c0n |
Horses, Rats and Bots
| Jairam Ramesh | malwarebotnetreverse-engineering+1 |
| 2010-06-18 | Talk | Syscan |
REVERSE ENGINEERING WEB 2.0 APPLICATIONS
| Shreeraj Shah | reverse-engineeringwebajax+6 |
| 2010-02-25 | Talk | Nullcon |
Penetration Testing versus Source Code
| Nikhil Wagholikar | pentestcode-analysis |
| 2008-12-06 | Talk | Clubhack |
Reverse Engineering for exploit writers
| Nibin Varghese | redteamreverse-engineeringexploit-development |
| 2008-12-06 | Talk | Clubhack |
Reverse Engineering v/s Secure Coding
| Atul Alex | secure-codingreverse-engineeringredteam+2 |
| 2006-09-21 | Talk | Hitb Sec Conf |
Finding Secrets in ISAPI
| Nish Bhalla | secure-codingreverse-engineering |
| 2005-09-29 | Talk | Hitb Sec Conf |
Analyzing Code for Security Defects
| Nish Bhalla | code-analysisblueteamsecure-coding |