πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Binary Analysis

Focus Area: πŸ”¬ Reverse Engineering
19
Total Entries
21
Contributors

Top Contributors

Aravind Machiry(3) Akshansh Jaiswal(2) Hrushikesh Kakade(2) Rewanth Tammana(2) Shiva Shashank(2)

All Entries (19 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-06Tool demoBlackhat ARC – Artifact Reuse Comparator Rushikesh D Nandedkar#static-analysis#reverse-engineering#binary-analysis+3
2025-08-06Tool demoBlackhat ParseAndC 4.0 - The Final Cut Source Code Parbati Kumar Manna#reverse-engineering#binary-analysis#code-analysis+4
2025-08-06Tool demoBlackhat ROP ROCKET: Advanced Framework for Return-Oriented Programming Source Code Shiva Shashank, Bramwell Brizendine#reverse-engineering#exploitation#security-assessment+2
2025-08-06Tool demoBlackhat ShadowSeek: Combining Ghidra and Large Language Models for Advanced Binary Analysis Source Code Mohammed Tanveer#reverse-engineering#binary-analysis#static-analysis+3
2024-08-15TalkUsenix TYGR: Type Inference on Stripped Binaries using Graph Neural Networks Presentation Whitepaper Video Aravind Machiry, Adam Doupe, Chang Zhu, Yibo Liu, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Ati Bajaj, Wil Gibbs, Ziyang Li, Anton Xue, Rajeev Alur, Hanjun Dai, Mayur Naik#binary-analysis#reverse-engineering#deep-learning+1
2023-08-13Tool demoBlackhat Advanced ROP Framework: Pushing ROP to Its Limits Presentation Whitepaper Source Code Video Shiva Shashank, Bramwell Brizendine#reverse-engineering#security-assessment#exploitation+2
2023-05-11Tool demoBlackhat Damn Vulnerable Bank Source Code Rewanth Tammana, Hrushikesh Kakade, Akshansh Jaiswal#android-security#application-pentesting#dynamic-analysis+3
2021-11-11Tool demoBlackhat Damn Vulnerable Bank Source Code Akshansh Jaiswal, Hrushikesh Kakade, Rewanth Tammana#android#android-security#application-pentesting+3
2020-09-18TalkC0c0n Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux Munawwar Hussain Shelia#reverse-engineering#firmware-analysis#embedded-systems+4
2019-10-22TalkHacklu Intro to Dark Arts: Getting Started with CTFs Geethna T K, Shruti Dixit, Sowmya Potluri#reverse-engineering#binary-analysis#exploitation+1
2019-10-12TalkTexascybersummit HX-3012 PErfidious: Make PE Backdooring Great Again! Shreyans Doshi#reverse-engineering#binary-analysis#executable-analysis+1
2017-10-19TalkHacklu Bug hunting using symbolic virtual machines! Video Anto Joseph#bug-hunting#binary-analysis#fuzzing+2
2017-08-18TalkC0c0n Dynamic Binary Instrumentation Vivek Arora, Bhaskar Rastogi#dynamic-analysis#reverse-engineering#binary-analysis+1
2017-08-17TalkUsenix BootStomp: On the Security of Bootloaders in Mobile Devices Presentation Whitepaper Video Aravind Machiry, Dipanjan Das, Nilo Redini, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvali, Christopher Kruegel, Giovanni Vigna#firmware-analysis#embedded-security#binary-analysis+1
2016-08-03Tool demoBlackhat Visual Network and File Forensics Using Rudra Source Code Ankur Tyagi#blueteam#forensics#network-forensics+2
2016-03-11TalkNullcon Million Dollar Baby: Towards ANGRly conquering DARPA CGC Aravind Machiry#red-teaming#security-assessment#application-pentesting+4
2013-09-27TalkC0c0n ARM, Thumb and the Finger Aseem Jakhar#reverse-engineering#binary-analysis#assembly-analysis+2
2011-02-25TalkNullcon Reversing microsoft patches to reveal vulnerable code Presentation Whitepaper Harsimran Singh Walia#reverse-engineering#code-review#static-analysis+1
2006-09-21TalkHitbsecconf Finding Secrets in ISAPI Presentation Nish Bhalla#secure-coding#reverse-engineering#application-pentesting+4