Area needed
|
30 +
|
Arrival and build up
|
26th of December, day 0 +
|
Brings
|
- a hand full desktop computers +
|
Extra power
|
{{{Extra power}}} +
|
Has assembly tag
|
binary +
, security +
, reverse engineering +
, fuzzing +
, exploitation +
, microcode +
|
Has assembly type
|
place to show and meet +
|
Has contact
|
phrazer (Twitter: @mr_phrazer) +
|
Has description
|
We are an open assembly for everyone interested in aspects of binary software security. We discuss and work on projects such as reverse engineering, fuzzing, CPU microcode updates, deobfuscation, exploitation, ... +
|
Has orga contact
|
mr.phrazer@gmail.com +
|
Near passage
|
whatever +
|
Need fibre
|
no +
|
Needs extra seats
|
7 +
|
Needs seats
|
22 +
|
Plans sessions
|
- reverse engineering of CPU microcode
- fuzzing
- SMT solving and formal program analysis +
|
Projekte
|
- kernel fuzzing and bug hunting (https://github.com/RUB-SysSec/kAFL)
- software reverse engineering and exploitation
- probabilistic program analysis
- microcode reverse engineering (https://github.com/RUB-SysSec/Microcode) +
|
Provides session location
|
maybe +
|
Provides stage
|
no +
|
Related to Assembly
|
Assembly:Offensive AI +
, Assembly:Deepcyber +
, Assembly:Schinfo +
|
Uses money
|
no money handling +
|
Has queryThis property is a special property in this wiki.
|
Assembly:Binary Security +
, Assembly:Binary Security +
, Assembly:Binary Security +
, Assembly:Binary Security +
, Assembly:Binary Security +
, Assembly:Binary Security +
, Assembly:Binary Security +
|
Categories |
Session location +
, Assembly +
, Parent Assembly +
|
Modification dateThis property is a special property in this wiki.
|
21 November 2017 11:48:15 +
|