| 2025-08-06 | Tool demo | Blackhat |
ARC – Artifact Reuse Comparator
| Rushikesh D Nandedkar | #static-analysis#reverse-engineering#binary-analysis+3 |
| 2025-08-06 | Tool demo | Blackhat |
ParseAndC 4.0 - The Final Cut
| Parbati Kumar Manna | #reverse-engineering#binary-analysis#code-analysis+4 |
| 2025-08-06 | Tool demo | Blackhat |
ProcessInjection
| Chirag Savla | #security-assessment#red-teaming#reverse-engineering+1 |
| 2025-08-06 | Tool demo | Blackhat |
ROP ROCKET: Advanced Framework for Return-Oriented Programming
| Shiva Shashank, Bramwell Brizendine | #reverse-engineering#exploitation#security-assessment+2 |
| 2025-08-06 | Tool demo | Blackhat |
ShadowSeek: Combining Ghidra and Large Language Models for Advanced Binary Analysis
| Mohammed Tanveer | #reverse-engineering#binary-analysis#static-analysis+3 |
| 2025-04-04 | Talk | Blackhat |
Standing on the Shoulders of Giants: De-Obfuscating WebAssembly Using LLVM
| Vikas Gupta, Peter Garba | #reverse-engineering#code-analysis#software-security |
| 2024-11-15 | Talk | C0c0n |
Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate
| Kartik Lalan | #automotive-cybersecurity#reverse-engineering#security-assessment+1 |
| 2024-10-02 | Talk | Virusbulletin |
Arming WinRAR: deep dive into APTs exploiting WinRAR’s 0-day vulnerability - a SideCopy case study
| Sathwik RAM Prakki | #reverse-engineering#apt#malware-reverse-engineering |
| 2024-08-30 | Talk | Hitbsecconf |
Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles
| Ravi Rajput | #web-security#security-assessment#exploitation+2 |
| 2024-08-29 | Talk | Hitbsecconf |
COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts
| Chetan Raghuprasad, Joey Chen | #reverse-engineering#security-assessment#incident-management |
| 2024-08-15 | Talk | Usenix |
TYGR: Type Inference on Stripped Binaries using Graph Neural Networks
| Aravind Machiry, Adam Doupe, Chang Zhu, Yibo Liu, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Ati Bajaj, Wil Gibbs, Ziyang Li, Anton Xue, Rajeev Alur, Hanjun Dai, Mayur Naik | #binary-analysis#reverse-engineering#deep-learning+1 |
| 2024-08-14 | Talk | Usenix |
Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors
| Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay | #reverse-engineering#architecture#security-assessment |
| 2023-11-17 | Talk | Deepsec |
Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption
| Shubham Dubey | #reverse-engineering#exploitation#architecture |
| 2023-09-23 | Talk | Nullcon |
Reverse Engineering RGB Keyboard Backlights With Linux Kernel Drivers
| Rishit Bansal | #reverse-engineering#linux#firmware-analysis |
| 2023-09-23 | Talk | Nullcon |
The Convergence Of eBPF, Buildroot, And QEMU For Automated Linux Malware Analysis
| Nikhil Ashok Hegde | #malware-detection#linux#dynamic-analysis+2 |
| 2023-08-24 | Talk | Hitbsecconf |
Hardware Backdooring an eScooter
| Arun Mane | #reverse-engineering#ics-security#automotive-cybersecurity |
| 2023-08-13 | Tool demo | Blackhat |
Advanced ROP Framework: Pushing ROP to Its Limits
| Shiva Shashank, Bramwell Brizendine | #reverse-engineering#security-assessment#exploitation+2 |
| 2023-08-10 | Talk | Defcamp |
Hardware Backdooring an e-Scooter
| Arun Mane | #reverse-engineering#ics-security#automotive-cybersecurity |
| 2023-08-10 | Talk | Defcon |
Wheels of Wonder: Unveiling Car Hacking Poetry
| Hrishikesh Somchatwar | #firmware-analysis#reverse-engineering#automotive-cybersecurity |
| 2023-08-07 | Talk | C0c0n |
Cellibrite Premium Mobile Forensic tool iPhone analysis
| Vaibhav Kumar | #mobile-forensics#reverse-engineering#forensics+2 |
| 2023-08-07 | Talk | C0c0n |
Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs
| Sathwik RAM Prakki | #apt#reverse-engineering#incident-management |
| 2023-08-07 | Talk | C0c0n |
Uncovering the Hidden Dangers Lurking as Android Apps using ML Algos
| Nikhil Prabhakar | #android-security#reverse-engineering#dynamic-analysis |
| 2023-08-06 | Talk | C0c0n |
Developments in Deep Fake detection
| Tapas Saini | #architecture#security-training#reverse-engineering |
| 2023-06-01 | Talk | Securityfest |
Bypassing Anti-Cheats & Hacking Competitive Games
| Rohan Aggarwal | #reverse-engineering#appsec#endpoint-protection+4 |
| 2022-09-24 | Talk | C0c0n |
Introduction to RFID/NFC Hacking
| Davis Sojan | #embedded-security#firmware-analysis#security-assessment+1 |
| 2022-09-23 | Talk | C0c0n |
Hacking SmartContracts
| Anto Joseph | #smart-contracts#reverse-engineering#secure-coding |
| 2022-09-23 | Talk | C0c0n |
Pwning Android Apps at Scale
| Sparsh Kulshrestha, Shashank Barthwal | #android-security#mobile-pentesting#reverse-engineering+2 |
| 2022-09-23 | Talk | C0c0n |
TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor
| Saurabh Sharma, Noushin Shabab | #reverse-engineering#security-assessment#iot-pentesting |
| 2022-08-10 | Tool demo | Blackhat |
ParseAndC 2.0 – We Don’t Need No C Programs (for Parsing)
| Parbati Kumar Manna | #reverse-engineering#dynamic-analysis#network-pentesting+4 |
| 2022-05-18 | Talk | Cansecwest |
Launching EMUX - A framework for emulating ARM and MIPS IoT Devices
| Saumil Shah | #firmware-analysis#reverse-engineering#embedded-security |
| 2021-11-13 | Talk | C0c0n |
Decoding new age hackers and Criminal Investigation
| Amit Dubey | #incident-management#digital-forensics#reverse-engineering |
| 2021-11-13 | Talk | C0c0n |
New way of looking at the hidden mysteries in the code
| Vandana Verma Sehgal | #code-review#static-analysis#reverse-engineering+2 |
| 2021-11-12 | Talk | C0c0n |
Dissecting Malicious Software and Analysis
| Shrutirupa Banerjiee | #reverse-engineering#dynamic-analysis#static-analysis |
| 2021-08-07 | Talk | Defcon |
The Curious Case of Knowing the Unknown
| Vandana Verma Sehgal | #threat-hunting#threat-modeling#architecture+1 |
| 2021-08-04 | Tool demo | Blackhat |
ParseAndC: A Universal Parser and Data Visualization Tool for Security Testing
| Parbati Kumar Manna | #reverse-engineering#application-pentesting#code-review+4 |
| 2020-10-07 | Talk | Rootcon |
Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing
| Kaustubh Padwad | #red-teaming#security-assessment#reverse-engineering |
| 2020-10-01 | Tool demo | Blackhat |
Adhrit: Android Security Suite
| Abhishek Jm, Akhil Mahendra | #android#code-analysis#reverse-engineering+1 |
| 2020-09-18 | Talk | C0c0n |
Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux
| Munawwar Hussain Shelia | #reverse-engineering#firmware-analysis#embedded-systems+4 |
| 2020-03-18 | Talk | Cansecwest |
The ARM-X Firmware Emulation Framework
| Saumil Shah | #red-teaming#arm#firmware+4 |
| 2019-11-09 | Talk | Toorcon |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Ang Cui | #reverse-engineering#hardware-reverse-engineering#architecture+2 |
| 2019-11-07 | Talk | Powerofcommunity |
Software Zero-Day Discovery - How To? Targets/Seeds? Methods - Fuzzing, Reverse-Engg, ‘Neither’??
| Kushal Shah | #vulnerability-assessment#fuzzing#reverse-engineering+2 |
| 2019-10-22 | Talk | Hacklu |
Intro to Dark Arts: Getting Started with CTFs
| Geethna T K, Shruti Dixit, Sowmya Potluri | #reverse-engineering#binary-analysis#exploitation+1 |
| 2019-10-12 | Talk | Texascybersummit |
HX-3012 PErfidious: Make PE Backdooring Great Again!
| Shreyans Doshi | #reverse-engineering#binary-analysis#executable-analysis+1 |
| 2019-10-03 | Talk | Virusbulletin |
Curious tale of 8.t used by multiple campaigns against South Asia
| Niranjan Jayanand, Ivan Macalintal, Debalina Ghosh | #reverse-engineering#apt#malware-reverse-engineering |
| 2019-08-09 | Talk | Defcon |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Rick Housley, Ang Cui | #reverse-engineering#architecture#hardware-reverse-engineering+1 |
| 2019-08-09 | Award | |
Thrangrycat - Pwnie Award for Most Under-Hyped Research
| Jatin Kataria, Richard Housley, Ang Cui | #reverse-engineering#hardware-embedded#firmware-analysis+2 |
| 2019-08-08 | Talk | Blackhat |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Richard Housley, Ang Cui | #reverse-engineering#hardware-embedded#exploit-delivery+3 |
| 2019-08-08 | Talk | Defcon |
Hacking ICS devices for Fun Penetration Testing of Vehicle Components
| Arun Mane | #automotive-cybersecurity#can-bus#ics-security+2 |
| 2018-10-10 | Talk | Brucon |
Simplifying the art of instrumentation
| Krishnakant Patil, Rushikesh D Nandedkar | #reverse-engineering#static-analysis#dynamic-analysis+2 |
| 2018-10-05 | Talk | C0c0n |
SCANDA: To Unbosom Malware Behavior
| Rajesh Nikam, Parmanand Mishra | #reverse-engineering#dynamic-analysis#malware-research+1 |
| 2017-10-05 | Talk | Virusbulletin |
The router of all evil: more than just default passwords and silly scripts
| Himanshu Anand, Chastine Menrige | #reverse-engineering#security-assessment#firmware-analysis |
| 2017-08-18 | Talk | C0c0n |
Dynamic Binary Instrumentation
| Vivek Arora, Bhaskar Rastogi | #dynamic-analysis#reverse-engineering#binary-analysis+1 |
| 2017-08-18 | Talk | C0c0n |
Your friendly neighbourhood exploit
| Aseem Jakhar | #exploitation#security-assessment#reverse-engineering |
| 2017-08-04 | Talk | Sha |
Attacking OpenSSL using Side-channel Attacks: The RSA case study
| Praveen Vadnala, Lukasz Chmielewski | #reverse-engineering#architecture#embedded-security |
| 2016-11-06 | Talk | Groundzerosummit |
Hacking The Droids
| Anto Joseph | #android-security#reverse-engineering#security-assessment+2 |
| 2016-10-27 | Talk | Brucon |
Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!!
| Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil | #reverse-engineering#evil-twin-attack#network-monitoring+3 |
| 2016-10-13 | Talk | Appsecusa |
When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE
| Sumanth Naropanth, Kavya Racharla, Chandra Prakash Gopalaiah | #reverse-engineering#secure-development#ble+4 |
| 2016-10-05 | Talk | Virusbulletin |
One-Click Fileless Infection
| Himanshu Anand, Chastine Menrige | #reverse-engineering#incident-management#endpoint-protection+3 |
| 2016-08-07 | Talk | Defcon |
Cyber Grand Shellphish
| Aravind Machiry, Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Jacopo Corbetta, Francensco Disperati, Andrew Dutcher, Giovanni Vigna, Chris Salls, Nick Stephens, Fish Wang, John Grosen | #automated-exploit-detection#reverse-engineering#vulnerability-assessment+1 |
| 2016-08-05 | Talk | Defcon |
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
| Jatin Kataria, Ang Cui, Francois Charbonneau | #reverse-engineering#hardware-reverse-engineering#firmware-analysis+2 |
| 2016-06-18 | Talk | Recon |
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
| Jatin Kataria, Ang Cui, Francois Charbonneau | #reverse-engineering#hardware-reverse-engineering#firmware-analysis+2 |
| 2016-05-26 | Talk | Hitbsecconf |
HITB Lab: Mobile Application Security for iOS and Android
| Tushar Dalvi, Tony Trummer | #android#ios#security-assessment+2 |
| 2016-03-15 | Talk | Groundzerosummit |
r00tKidz and Hacking
| Triveni Singh, Lea Paul | #security-assessment#ethical-hacking#privilege-escalation+2 |
| 2016-03-11 | Talk | Nullcon |
Physical Lock Security
| Amey Gat, Swapnil Wadwalkar | #security-assessment#reverse-engineering#hardware-hacking |
| 2015-11-05 | Talk | Groundzerosummit |
Exposing Cyber Espionage: Hello from Pakistan- IIC Session
| Jiten Jain | #incident-management#reverse-engineering#security-assessment |
| 2015-08-07 | Talk | Defcon |
Getting into the Trust Store We Trust
| Ajit Hatti | #reverse-engineering#architecture#security-strategy |
| 2015-08-01 | Talk | C0c0n |
Reversing and Deciphering the Cyber Espionage Malware Communications
| Monnappa K A | #reverse-engineering#decipher#malware-research+3 |
| 2015-03-15 | Talk | Hitbsecconf |
Sniffing the Airwaves with RTLSDR
| Yashin Mehaboobe | #network-pentesting#packet-analysis#network-monitoring+2 |
| 2015-01-27 | Talk | Owaspappseccalifornia |
Anatomy of memory scraping, credit card stealing POS malware
| Amol Sarwate | #reverse-engineering#incident-management#architecture |
| 2014-10-16 | Talk | Grrcon |
Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design
| Aditya K Sood, Dr. Richard J Enbody | #red-teaming#reverse-engineering#blueteam+1 |
| 2014-09-26 | Talk | Virusbulletin |
Evolution of Android exploits from a static analysis tools perspective
| Jagadeesh Chandraiah, Anna Szalay | #android-security#static-analysis#reverse-engineering |
| 2014-09-18 | Talk | Appsecusa |
Anatomy of memory scraping, credit card stealing POS malware
| Amol Sarwate | #reverse-engineering#memory-forensics#incident-management |
| 2014-05-29 | Talk | Hitbsecconf |
Hacking Your Cable TV Network: Die Hard Style
| Rahul Sasi | #red-teaming#iptv#reverse-engineering |
| 2014-03-15 | Talk | Blackhat |
Anatomy of a Credit Card Stealing POS Malware
| Amol Sarwate | #reverse-engineering#security-assessment#security-testing |
| 2014-01-28 | Talk | Owaspappseccalifornia |
Application Sandboxes: Know thy limits
| Rahul Kashyap | #application-pentesting#reverse-engineering#exploit-development |
| 2013-10-19 | Talk | Toorcon |
Static Malware Analysis with PyTriage
| Yashin Mehaboobe | #malware-detection#static-analysis#malware-research+1 |
| 2013-09-27 | Talk | C0c0n |
ARM, Thumb and the Finger
| Aseem Jakhar | #reverse-engineering#binary-analysis#assembly-analysis+2 |
| 2013-09-27 | Talk | C0c0n |
Sandy - The Malicious Analysis
| Rahul Sasi | #reverse-engineering#static-analysis#dynamic-analysis |
| 2013-03-22 | Talk | Insomnihack |
Guns and Smoke to fight Mobile Malware
| Ruchna Nigam | #android-security#malware-research#reverse-engineering+2 |
| 2012-11-23 | Talk | Malcon |
Surprise paper!
| Atul Alex | #reverse-engineering#ios-security#mobile-hacking |
| 2012-10-25 | Talk | Appsecusa |
Cracking the Code of Mobile Application
| Sreenarayan Ashokkumar | #reverse-engineering#mobile-pentesting#android-security+2 |
| 2012-10-23 | Talk | Hacklu |
Buster: Android Security Buster
| Atul Alex | #android-security#reverse-engineering#mobile-malware |
| 2012-09-28 | Talk | Nullcon |
Attacking Angry Droids
| Aditya Gupta, Subho Halder | #android-security#reverse-engineering#security-assessment+1 |
| 2012-08-03 | Talk | C0c0n |
Cracking the Mobile Application Source Code
| Sreenarayan Ashokkumar | #android#ios#blackberry+2 |
| 2012-08-03 | Talk | C0c0n |
I haz you and pwn your maal
| Harsimran Singh Walia | #android#reverse-engineering#forensics |
| 2012-07-22 | Tool demo | Blackhat |
Kautilya and Nishang
| Nikhil Mittal | #post-exploitation#ethical-hacking#security-assessment+1 |
| 2012-07-14 | Talk | Hope |
Advancements in Botnet Attacks and Malware Distribution
| Aditya K Sood | #botnet#web-security#reverse-engineering+1 |
| 2012-02-15 | Talk | Nullcon |
Binary God
| Atul Alex | #red-teaming#emulator#assembler+2 |
| 2011-11-17 | Talk | Deepsec |
FakeAntiVirus - Journey from Trojan to a Persisent Threat
| Jagadeesh Chandraiah | #trojan#reverse-engineering#security-assessment |
| 2011-08-03 | Talk | Blackhat |
Reverse Engineering Browser Components: Dissecting and Hacking Silverlight, HTML 5 and Flex
| Shreeraj Shah | #reverse-engineering#ajax#web-security+1 |
| 2011-02-25 | Talk | Nullcon |
Reversing microsoft patches to reveal vulnerable code
| Harsimran Singh Walia | #reverse-engineering#code-review#static-analysis+1 |
| 2010-10-29 | Talk | T2 |
Hacking Femtocells
| Ravishankar Borgaonkar, Kevin Redon | #reverse-engineering#device-security#hardware-embedded+3 |
| 2010-08-01 | Talk | C0c0n |
Horses, Rats and Bots
| Jairam Ramesh | #botnet#reverse-engineering#security-assessment |
| 2010-06-18 | Talk | Syscan |
REVERSE ENGINEERING WEB 2.0 APPLICATIONS
| Shreeraj Shah | #reverse-engineering#ajax#web-security+1 |
| 2008-12-06 | Talk | Clubhack |
Reverse Engineering for exploit writers
| Nibin Varghese | #red-teaming#reverse-engineering#exploit-development |
| 2008-12-06 | Talk | Clubhack |
Reverse Engineering v/s Secure Coding
| Atul Alex | #secure-coding#reverse-engineering#red-teaming+2 |
| 2006-09-21 | Talk | Hitbsecconf |
Finding Secrets in ISAPI
| Nish Bhalla | #secure-coding#reverse-engineering#application-pentesting+4 |