| 2025-08-07 | Talk | Blackhat |
Kernel-Enforced DNS Exfiltration Security: Framework Built for Cloud Environments to Stop Data Breaches via DNS at Scale
| Vedang Parasnis | #dns#data-leak#kernel+1 |
| 2025-08-06 | Tool demo | Blackhat |
ARC – Artifact Reuse Comparator
| Rushikesh D Nandedkar | #static-analysis#reverse-engineering#binary-analysis+3 |
| 2025-08-06 | Tool demo | Blackhat |
ParseAndC 4.0 - The Final Cut
| Parbati Kumar Manna | #reverse-engineering#binary-analysis#code-analysis+4 |
| 2025-08-06 | Tool demo | Blackhat |
ROP ROCKET: Advanced Framework for Return-Oriented Programming
| Shiva Shashank, Bramwell Brizendine | #reverse-engineering#exploitation#security-assessment+2 |
| 2025-08-06 | Tool demo | Blackhat |
ShadowSeek: Combining Ghidra and Large Language Models for Advanced Binary Analysis
| Mohammed Tanveer | #reverse-engineering#binary-analysis#static-analysis+3 |
| 2025-04-04 | Talk | Blackhat |
Standing on the Shoulders of Giants: De-Obfuscating WebAssembly Using LLVM
| Vikas Gupta, Peter Garba | #reverse-engineering#code-analysis#software-security |
| 2025-04-04 | Tool demo | Blackhat |
CompartIoT
| Sreesankar S, Aditya Krishna Vinod, Season Cherian | #microcontrollers#hardware-embedded#firmware-analysis+2 |
| 2025-04-03 | Tool demo | Blackhat |
CompartIoT
| Sreesankar S, Aditya Krishna Vinod, Season Cherian | #microcontrollers#hardware-embedded#firmware-analysis+2 |
| 2025-04-03 | Tool demo | Blackhat |
MobXplore
| Aman Pareek, Akarsh Singh | #application-pentesting#ios-security#dynamic-analysis+4 |
| 2025-03-02 | Talk | Nullcon |
Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks
| Shyam Kumar Arshid, Chinmay Krishna | #embedded-security#firmware-analysis#secure-coding+1 |
| 2025-03-02 | Panel | Nullcon |
Tackling Automotive Hardware Vulnerabilities
| Aseem Jakhar, Sachin Jain, Adam Laurie | #automotive-cybersecurity#embedded-systems#hardware-embedded+3 |
| 2025-03-02 | Talk | Nullcon |
Kernel Conquest: Breaking Boundaries and Demystifying Kernel SU for Root Access in Azure Cloud Shell
| Alla Vamsi Krishna, Kandi Abhishek Reddy | #kernel#azure#container-security+2 |
| 2024-12-12 | Tool demo | Blackhat |
Genzai - The IoT Security Toolkit
| Umair Nehri | #genzai#iot-device-management#iot-pentesting+4 |
| 2024-11-21 | Talk | Deepsec |
Hacking with Physics v2.0
| Hrishikesh Somchatwar | #ics-security#embedded-security#firmware-analysis+2 |
| 2024-11-21 | Talk | Securityfest |
Wheels of Wonder
| Hrishikesh Somchatwar | #automotive-cybersecurity#car-hacking#embedded-systems+4 |
| 2024-10-23 | Tool demo | Blackhat |
DarkWidow: Customizable Dropper Tool Targeting Windows
| Soumyanil Biswas | #darkwidow#windows#exploit-delivery+4 |
| 2024-10-02 | Talk | Virusbulletin |
Arming WinRAR: deep dive into APTs exploiting WinRAR’s 0-day vulnerability - a SideCopy case study
| Sathwik RAM Prakki | #reverse-engineering#apt#malware-reverse-engineering |
| 2024-08-15 | Talk | Usenix |
TYGR: Type Inference on Stripped Binaries using Graph Neural Networks
| Aravind Machiry, Adam Doupe, Chang Zhu, Yibo Liu, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Ati Bajaj, Wil Gibbs, Ziyang Li, Anton Xue, Rajeev Alur, Hanjun Dai, Mayur Naik | #binary-analysis#reverse-engineering#deep-learning+1 |
| 2024-08-10 | Talk | Defcon |
Compromising an Electronic Logging Device and Creating a Truck2Truck Worm
| Rik Chatterjee, Jake Jepson | #eld#embedded-systems#ics-security+3 |
| 2024-04-19 | Talk | Blackhat |
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems
| Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay | #embedded-security#firmware-analysis#architecture+1 |
| 2024-04-18 | Talk | Blackhat |
The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition
| Arun Kanuparthi, Hareesh Khattri, Jeyavijayan Jv Rajendran, Jason Fung, Ahmad Reza Sadeghi | #hacking#embedded-systems#ctf+1 |
| 2024-03-11 | Talk | Nullcon |
Achilles Heel In Secure Boot: Breaking RSA Authentication And Bitstream Recovery From Zynq-7000 SoC
| Arpan Jati | #vulnerability-assessment#embedded-systems#firmware-analysis |
| 2023-09-23 | Talk | Nullcon |
Android-SigMorph: Covert Communication Exploiting Android Signing Schemes
| Ayan Saha, Achute Sharma | #android#application-pentesting#static-analysis+1 |
| 2023-09-23 | Talk | Nullcon |
Reverse Engineering RGB Keyboard Backlights With Linux Kernel Drivers
| Rishit Bansal | #reverse-engineering#linux#firmware-analysis |
| 2023-08-13 | Tool demo | Blackhat |
Advanced ROP Framework: Pushing ROP to Its Limits
| Shiva Shashank, Bramwell Brizendine | #reverse-engineering#security-assessment#exploitation+2 |
| 2023-08-10 | Talk | Defcon |
Attacking Vehicle Fleet Management Systems
| Yashin Mehaboobe | #automotive-cybersecurity#ics-security#embedded-systems+4 |
| 2023-08-10 | Talk | Defcon |
Wheels of Wonder: Unveiling Car Hacking Poetry
| Hrishikesh Somchatwar | #firmware-analysis#reverse-engineering#automotive-cybersecurity |
| 2023-08-09 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security.
| Sagar Bhure | #kernel#machine-learning#forensics+4 |
| 2023-05-11 | Tool demo | Blackhat |
Damn Vulnerable Bank
| Rewanth Tammana, Hrushikesh Kakade, Akshansh Jaiswal | #android-security#application-pentesting#dynamic-analysis+3 |
| 2023-05-11 | Tool demo | Blackhat |
CANalyse 2.0 : A Vehicle Network Analysis and Attack Tool
| Kartheek Lade | #automobile#car-hacking#iot-device-management+4 |
| 2023-05-11 | Tool demo | Blackhat |
KernelGoat
| Shivankar Madaan | #kernel#secure-development#security-training |
| 2022-12-08 | Talk | Blackhat |
Exploring a New Class of Kernel Exploit Primitive
| Rohit Mothe, Andrew Ruddick | #kernel#exploit-delivery#privilege-escalation |
| 2022-09-24 | Talk | C0c0n |
Introduction to RFID/NFC Hacking
| Davis Sojan | #embedded-security#firmware-analysis#security-assessment+1 |
| 2022-09-06 | Panel | Nullcon |
IoT Supply Chain Blues and the way forward
| Aseem Jakhar, Kedar Sovani, Anantharaman Iyer, Suvabrata Sinha, Sudarshan Rajagopal, Sachin Jain | #iot-device-management#iot-pentesting#supply-chain-security+3 |
| 2022-08-10 | Tool demo | Blackhat |
CANalyse (2.0): A vehicle network analysis and attack tool
| Kartheek Lade, Rahul Jeyasingh | #automobile#car-hacking#iot-device-management+4 |
| 2022-05-18 | Talk | Cansecwest |
Launching EMUX - A framework for emulating ARM and MIPS IoT Devices
| Saumil Shah | #firmware-analysis#reverse-engineering#embedded-security |
| 2022-05-12 | Talk | Blackhat |
Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems
| Prashant Rajput, Michail Maniatakos | #ics-security#control-systems#hardware-embedded+3 |
| 2021-11-12 | Talk | C0c0n |
IoT Security Guidelines & Standards
| Yashodhan Vivek Mandke | #embedded-security#iot-device-management#iot-security-testing+3 |
| 2021-11-11 | Tool demo | Blackhat |
Damn Vulnerable Bank
| Akshansh Jaiswal, Hrushikesh Kakade, Rewanth Tammana | #android#android-security#application-pentesting+3 |
| 2021-08-05 | Talk | Blackhat |
PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors
| Hareesh Khattri, Nagaraju N Kodalapura, Nam N Nguyen | #hardware-embedded#endpoint-protection#incident-management+1 |
| 2021-05-07 | Tool demo | Blackhat |
CANalyse: A Vehicle Network Analysis and Attack Tool
| Kartheek Lade | #automobile#car-hacking#iot-device-management+4 |
| 2021-03-05 | Talk | Nullcon |
Arbitrary code execution on RISC-V using fault injection
| Praveen Vadnala, Nils Wiersma | #code-analysis#hardware-embedded#embedded-systems+1 |
| 2020-11-11 | Talk | Powerofcommunity |
Arbitrary code execution on RISC-V using fault injection
| Praveen Vadnala, Nils Wiersma | #fault-injection#embedded-security#firmware-analysis+1 |
| 2020-10-02 | Talk | Blackhat |
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
| Aravind Machiry, Nilo Redini, Andrea Continella, Ruoyu Wang, Yan Shoshitaishvili, Cristopher Kruegel, Giovanni Vigna, Chad Spensky | #embedded-systems#firmware-analysis#static-analysis+1 |
| 2020-10-01 | Tool demo | Blackhat |
Adhrit: Android Security Suite
| Abhishek Jm, Akhil Mahendra | #android#code-analysis#reverse-engineering+1 |
| 2020-10-01 | Tool demo | Blackhat |
Mobexler: An All-in-One Mobile Pentest VM
| Abhinav Mishra | #android#ios#security-assessment+2 |
| 2020-09-18 | Talk | C0c0n |
Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux
| Munawwar Hussain Shelia | #reverse-engineering#firmware-analysis#embedded-systems+4 |
| 2020-09-18 | Talk | C0c0n |
Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing
| Kaustubh Padwad | #red-teaming#security-assessment#iot-device-management+4 |
| 2020-03-18 | Talk | Cansecwest |
The ARM-X Firmware Emulation Framework
| Saumil Shah | #red-teaming#arm#firmware+4 |
| 2020-03-06 | Tool demo | Nullcon |
Mobexler
| Abhinav Mishra, Abhishek Jaiswal | #android#ios#security-assessment+2 |
| 2019-12-04 | Talk | Blackhat |
Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing
| Karthik Ramasamy, Eric Hampshire | #blueteam#smartcard#mfa+4 |
| 2019-11-09 | Talk | Toorcon |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Ang Cui | #reverse-engineering#hardware-reverse-engineering#architecture+2 |
| 2019-10-22 | Talk | Hacklu |
Intro to Dark Arts: Getting Started with CTFs
| Geethna T K, Shruti Dixit, Sowmya Potluri | #reverse-engineering#binary-analysis#exploitation+1 |
| 2019-10-16 | Tool demo | Hitbsecconf |
Introducing ARM-X - The ARM IoT Firmware Emulation Framework
| Saumil Shah | #arm#linux#firmware-analysis+4 |
| 2019-10-12 | Talk | Texascybersummit |
HX-3012 PErfidious: Make PE Backdooring Great Again!
| Shreyans Doshi | #reverse-engineering#binary-analysis#executable-analysis+1 |
| 2019-10-03 | Talk | Virusbulletin |
Curious tale of 8.t used by multiple campaigns against South Asia
| Niranjan Jayanand, Ivan Macalintal, Debalina Ghosh | #reverse-engineering#apt#malware-reverse-engineering |
| 2019-09-27 | Talk | C0c0n |
Defense in Depth for Embedded Systems
| Jiggyasu Sharma | #embedded-systems#blueteam#hardware-embedded+4 |
| 2019-08-09 | Talk | Defcon |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Rick Housley, Ang Cui | #reverse-engineering#architecture#hardware-reverse-engineering+1 |
| 2019-08-09 | Award | |
Thrangrycat - Pwnie Award for Most Under-Hyped Research
| Jatin Kataria, Richard Housley, Ang Cui | #reverse-engineering#hardware-embedded#firmware-analysis+2 |
| 2019-08-08 | Talk | Blackhat |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Richard Housley, Ang Cui | #reverse-engineering#hardware-embedded#exploit-delivery+3 |
| 2019-05-21 | Talk | Phdays |
How to fail in hardware hacking
| Arun Magesh | #red-teaming#embedded-systems#firmware-analysis+1 |
| 2019-05-21 | Talk | Phdays |
Rapid hardware hacking 101
| Arun Magesh | #red-teaming#iot-pentesting#hardware-embedded+2 |
| 2019-05-09 | Talk | Hitbsecconf |
Make ARM Shellcode Great Again
| Saumil Shah | #arm#embedded-systems#firmware-analysis+1 |
| 2019-05-04 | Talk | Thotcon |
What The Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing
| Priyank Nigam | #frida#application-pentesting#dynamic-analysis+3 |
| 2019-02-28 | Talk | Nullcon |
Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida
| Shivang Desai | #secure-coding#security-assessment#dynamic-analysis+4 |
| 2018-11-08 | Talk | Defcamp |
Backdooring DVR/NVR devices
| Arun Mane | #hardware-reverse-engineering#embedded-security#security-assessment+2 |
| 2018-11-02 | Talk | Hackfest |
Exploiting Connected Medical Devices: Lessons Learned & Data Earned
| Saurabh Harit | #red-teaming#wearables#iot-device-management+4 |
| 2018-10-15 | Talk | Hacklu |
Make ARM Shellcode Great Again
| Saumil Shah | #arm#embedded-systems#firmware-analysis |
| 2018-10-10 | Talk | Brucon |
Simplifying the art of instrumentation
| Krishnakant Patil, Rushikesh D Nandedkar | #reverse-engineering#static-analysis#dynamic-analysis+2 |
| 2018-09-27 | Talk | Rootcon |
Expl-iot: Hacking IoT like a boss
| Aseem Jakhar | #red-teaming#iot-security-testing#firmware-analysis+2 |
| 2018-09-12 | Talk | 44con |
Make ARM Shellcode Great Again
| Saumil Shah | #arm#embedded-systems#security-tools+3 |
| 2018-08-12 | Talk | Defcon |
Last mile authentication problem: Exploiting the missing link in end-to-end secure communication
| Siddharth Rao, Thanh Bui | #encryption#authentication#ipc+1 |
| 2018-03-03 | Panel | Nullcon |
IoT : How long till D Day?
| Aseem Jakhar, Shobha Jagathpal, Rishikesh Kamat, Daniel Cisowski, Michael Pyle | #iot-device-management#iot-pentesting#embedded-systems+3 |
| 2017-12-06 | Talk | Blackhat |
BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES
| Saurabh Harit | #red-teaming#data-leak#identity-theft+1 |
| 2017-12-06 | Talk | Blackhat |
DIFUZZING ANDROID KERNEL DRIVERS
| Aravind Machiry, Chris Salls, Yan Shoshitaishvili, Jake Corina, Shuang Hao | #android#red-teaming#linux+2 |
| 2017-11-14 | Talk | Blackhat |
Pwning a Smart Home in Under 10 Minutes
| Aditya Gupta | #iot-pentesting#embedded-security#security-assessment+2 |
| 2017-10-19 | Talk | Hacklu |
Bug hunting using symbolic virtual machines!
| Anto Joseph | #bug-hunting#binary-analysis#fuzzing+2 |
| 2017-10-05 | Talk | Virusbulletin |
The router of all evil: more than just default passwords and silly scripts
| Himanshu Anand, Chastine Menrige | #reverse-engineering#security-assessment#firmware-analysis |
| 2017-08-18 | Talk | C0c0n |
Dynamic Binary Instrumentation
| Vivek Arora, Bhaskar Rastogi | #dynamic-analysis#reverse-engineering#binary-analysis+1 |
| 2017-08-18 | Talk | C0c0n |
CoAP versus MQTT: IoT Protocol Vulnerability analysis
| Rajiv Pandey | #security-assessment#iot-pentesting#embedded-systems+1 |
| 2017-08-18 | Talk | C0c0n |
Exploiting the smartness of BLE Stack
| Apoorva Gupta | #bluetooth#red-teaming#mobile-hacking+3 |
| 2017-08-18 | Talk | C0c0n |
Hacking Homes: A hardware insight for IoT [in]Security
| Jiggyasu Sharma | #red-teaming#hardware-embedded#firmware-analysis+2 |
| 2017-08-18 | Talk | C0c0n |
The Internet Of Things: Essentials of Secur(IOT)y
| Arpit Bajpai, Ronald Michael | #blueteam#iot-device-management#iot-pentesting+4 |
| 2017-08-18 | Talk | Usenix |
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers
| Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, Giovanni Vigna | #linux#kernel#static-analysis+4 |
| 2017-08-17 | Talk | Usenix |
BootStomp: On the Security of Bootloaders in Mobile Devices
| Aravind Machiry, Dipanjan Das, Nilo Redini, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvali, Christopher Kruegel, Giovanni Vigna | #firmware-analysis#embedded-security#binary-analysis+1 |
| 2017-07-26 | Tool demo | Blackhat |
Devknox - Autocorrect Security Issues from Android Studio
| Subho Halder | #android#code-analysis#secure-coding |
| 2017-04-14 | Talk | Hitbsecconf |
COMMSEC: IoT Hacking Simplified
| Aseem Jakhar | #red-teaming#iot-pentesting#hardware-embedded+2 |
| 2017-03-30 | Tool demo | Blackhat |
Devknox - Autocorrect Security Issues from Android Studio
| Subho Halder | #android#code-analysis#secure-coding |
| 2017-03-03 | Panel | Nullcon |
Hardware Security: Foundational Block of Cyber Battlefield
| Vinayak Godse, Amit Sharma, Aseem Jakhar, Minatee Mishra | #hardware-embedded#firmware-analysis#embedded-systems+4 |
| 2016-11-04 | Tool demo | Blackhat |
Firmware Analysis Toolkit (FAT)
| Aditya Gupta | #firmware#security-assessment#embedded-systems+3 |
| 2016-08-05 | Talk | Defcon |
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
| Jatin Kataria, Ang Cui, Francois Charbonneau | #reverse-engineering#hardware-reverse-engineering#firmware-analysis+2 |
| 2016-08-03 | Tool demo | Blackhat |
Visual Network and File Forensics Using Rudra
| Ankur Tyagi | #blueteam#forensics#network-forensics+2 |
| 2016-06-18 | Talk | Recon |
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
| Jatin Kataria, Ang Cui, Francois Charbonneau | #reverse-engineering#hardware-reverse-engineering#firmware-analysis+2 |
| 2016-03-11 | Talk | Nullcon |
Million Dollar Baby: Towards ANGRly conquering DARPA CGC
| Aravind Machiry | #red-teaming#security-assessment#application-pentesting+4 |
| 2015-11-05 | Talk | Groundzerosummit |
Sanctioned to Hack: Your SCADA HMIs Belong to Us!
| Aditya K Sood | #ics-security#web-security#firmware-analysis+2 |
| 2015-08-01 | Talk | C0c0n |
Reversing and Deciphering the Cyber Espionage Malware Communications
| Monnappa K A | #reverse-engineering#decipher#malware-research+3 |
| 2015-08-01 | Talk | C0c0n |
From AOSP ( Android OpenSource Project ) to ABD ( Android Based Devices )
| Anto Joseph | #android#mobile-device-management#embedded-systems+2 |
| 2015-03-15 | Talk | Hitbsecconf |
Sniffing the Airwaves with RTLSDR
| Yashin Mehaboobe | #network-pentesting#packet-analysis#network-monitoring+2 |
| 2015-02-06 | Talk | Nullcon |
Generic Executable Unpacking using Dynamic Binary Instrumentation
| Shubham Bansal | #blueteam#dynamic-binary-instrumentation#executable-analysis+1 |
| 2014-11-13 | Talk | Groundzerosummit |
Hacking consumer electronics for Fun
| Atul Alex | #red-teaming#embedded-systems#firmware-analysis+1 |
| 2014-11-13 | Talk | Groundzerosummit |
SCADA Exploitation through Firmware
| Ashish Saxena | #red-teaming#firmware-analysis#ics-security+3 |
| 2014-10-29 | Talk | Ekoparty |
Security vulnerabilities in DVB-C networks: Hacking Cable tV network part 2
| Rahul Sasi | #red-teaming#dvb-c#firmware-analysis+1 |
| 2014-10-17 | Talk | Blackhat |
Android Kernel and OS Security Assessment with Iron Crow
| Akhil Arora, Sumanth Naropanth | #android#kernel#android-security+1 |
| 2014-05-29 | Talk | Hitbsecconf |
LOL (Layers On Layers) – Bypassing Endpoint Security for Fun and Profit
| Rahul Kashyap, Rafal Wojtzcuk | #red-teaming#windows#kernel |
| 2014-05-21 | Talk | Phdays |
Android Exploitation
| Aditya Gupta | #android#red-teaming#security-assessment+1 |
| 2014-05-21 | Talk | Phdays |
ARM Exploitation
| Aseem Jakhar | #arm#linux#android |
| 2014-03-18 | Talk | Troopers |
Evolution of SIM Card Security
| Ravishankar Borgaonkar | #3gpp#gsma#embedded-systems+4 |
| 2014-02-14 | Talk | Nullcon |
Hacking YOu’r Cable TV Network.
| Rahul Sasi, Ahamed Nafeez | #red-teaming#network-pentesting#endpoint-protection+1 |
| 2014-02-14 | Talk | Nullcon |
Attack of the setuid bit - pt_chown and pwning root terminals
| Siddhesh Poyarekar | #glibc#red-teaming#blueteam+2 |
| 2013-11-07 | Talk | Groundzerosummit |
Serial killing of embedded systems
| Atul Alex | #embedded-systems#hardware-embedded#firmware-analysis+1 |
| 2013-09-27 | Talk | C0c0n |
ARM, Thumb and the Finger
| Aseem Jakhar | #reverse-engineering#binary-analysis#assembly-analysis+2 |
| 2013-03-01 | Talk | Nullcon |
Pawing the Droid: Twisting the ARM
| Divyanshu Shekhar, Anshul Kumar | #android#arm#linux+4 |
| 2013-03-01 | Talk | Nullcon |
Mobile Code mining for discovery and exploits
| Hemil Shah | #code-analysis#secure-development#blueteam+4 |
| 2012-11-23 | Talk | Malcon |
Tampering in Energy Meters
| Mohit Arora | #energy-theft#embedded-systems#firmware-analysis+2 |
| 2012-02-15 | Talk | Nullcon |
Binary God
| Atul Alex | #red-teaming#emulator#assembler+2 |
| 2011-12-15 | Talk | Blackhat |
Kautilya: Teensy Beyond Shell
| Nikhil Mittal | #hid#red-teaming#endpoint-protection+3 |
| 2011-12-04 | Talk | Clubhack |
Exploit the Exploit Kits
| Dhruv Soi | #red-teaming#exploit-kit#malware-distribution+4 |
| 2011-08-03 | Talk | Blackhat |
Femtocells: A poisonous needle in the operator’s hay stack
| Ravishankar Borgaonkar, Nico Golde, Kevin Redon | #network-pentesting#identity-theft#firmware-analysis |
| 2011-08-03 | Talk | Blackhat |
Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS
| Jatin Kataria, Ang Cui, Salvatore Stolfo | #cisco-ios#hardware-embedded#firmware-analysis+4 |
| 2011-02-25 | Talk | Nullcon |
Reversing microsoft patches to reveal vulnerable code
| Harsimran Singh Walia | #reverse-engineering#code-review#static-analysis+1 |
| 2011-02-25 | Talk | Nullcon |
Automatic Program Analysis using Dynamic Binary Instrumentation (DBI)
| Sunil Kumar | #dynamic-binary-instrumentation#code-analysis#dynamic-analysis+3 |
| 2011-02-25 | Talk | Nullcon |
Jugaad Beta: Linux Thread Injection malware PoC
| Aseem Jakhar | #linux#red-teaming#malware-research+2 |
| 2011-02-25 | Talk | Nullcon |
Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower
| Hari Krishna Prasad Vemuru | #evm#red-teaming#hardware-embedded+3 |
| 2010-02-25 | Talk | Nullcon |
Penetration Testing versus Source Code
| Nikhil Wagholikar | #security-assessment#code-analysis#application-pentesting+4 |
| 2010-02-25 | Talk | Nullcon |
Intelligent debugging and in memory fuzzing.
| Vishwas Sharma, Amandeep Bharti | #fuzzing#debugging#red-teaming |
| 2009-12-05 | Talk | Clubhack |
Indian IT Act 2000 vs 2009
| Rohas Nagpal | #cyber-law#embedded-systems#firmware-analysis+4 |
| 2009-11-17 | Talk | Securitybyte |
Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors
| Nitin Kumar, Vipin Kumar | #windows#red-teaming#boot-sector+1 |
| 2007-03-29 | Talk | Blackhat |
Vboot Kit: Compromising Windows Vista Security
| Nitin Kumar, Vipin Kumar | #windows#red-teaming#kernel |
| 2006-09-21 | Talk | Hitbsecconf |
Finding Secrets in ISAPI
| Nish Bhalla | #secure-coding#reverse-engineering#application-pentesting+4 |
| 2006-08-05 | Talk | Defcon |
Zulu A Command Line Wireless Frame Generator
| Anmol Sheth, Damon Mccoy | #debugging#network-pentesting#linux+1 |
| 2005-09-29 | Talk | Hitbsecconf |
Analyzing Code for Security Defects
| Nish Bhalla | #code-analysis#blueteam#secure-coding |