The slides for my talk today at RE//verse 2025 (@re-verse.io), "Reconstructing Rust Types: A Practical Guide for Reverse Engineers", are now public: github.com/cxiao/recons...
The talk was recorded - will post when video is public!
#reverseengineering #rust #rustlang #malware #infosec #REverse2025
Streamline firmware analysis with inter-image call graphs! Robin David showcases graph-based methodologies for mapping cross-binary dependencies and integrating decompiled code. Expand your reversing toolkit. https://re-verse.sessionize.com/session/783646 #REverse2025 #FirmwareAnalysis
Unlock the complexities of automotive ECU reverse engineering. Martin Petran demonstrates AUTOSAR Classic firmware techniques and introduces a Binary Ninja plugin to enhance your automotive RE workflow. https://re-verse.sessionize.com/session/759122 #REverse2025 #AUTOSAR #FirmwareAnalysis
From hacking the Xbox kernel to acid-etching silicon: Markus Gaasedelen takes you on a full-stack RE journey through the original Xbox. Hardware, software, and everything in between. Don’t miss this adventure! https://re-verse.sessionize.com/session/776595 #REverse2025 #ReverseEngineering
WebAssembly de-obfuscation with LLVM. Vikas Gupta & Peter Garba reveal how to reverse Wasm obfuscation using compiler optimizations. Simplify complex code without pattern rules & tackle real-world scenarios. https://re-verse.sessionize.com/session/763329 #REverse2025 #Wasm #ReverseEngineering
Dynamic binary instrumentation, simplified. Andrew Haberlandt introduces Pyda: a Python-based framework for writing tools on top of DynamoRIO. Replace debugger scripts & explore advanced hooks for ARM64/X86. https://re-verse.sessionize.com/session/776653 #REverse2025 #Instrumentation #Dy…
Static analysis for iOS apps just got smarter! Florian Magin & Angelo DeLuca reveal a Ghidra plugin leveraging heuristics & approximations to tackle Objective-C & Swift challenges. Don’t miss this dive into iOS research. https://re-verse.sessionize.com/session/784068 #REverse2025 #SRE #Decompilation
Rehost embedded ARM firmware at near-native speeds! Lukas Seidel @pr0me.bsky.social introduces SAFIREFUZZ, achieving 690x fuzzing throughput with ARM Cortex-M firmware. Dive into instruction rewriting, emulation, and performance gains. https://re-verse.sessionize.com/session/784004 #REverse2025
Bootkits: the ultimate stealth threat. Takahiro Haruyama shares cutting-edge techniques to detect UEFI implants with code behavior analysis, YARA/FwHunt rules, and retrohunts. Learn how 6 new bootkits were uncovered! https://re-verse.sessionize.com/session/776242 #REverse2025 #FirmwareSecurity #UEFI
SIM cards: more than just storage. Join Marius Muench & Tomasz Lisowski as they reveal SIM vulnerabilities, baseband exploits, and turning SIM interposers into attack tools. Live demos & insights await! https://re-verse.sessionize.com/session/784666 #REverse2025 #BasebandHacking
From sabotaging trains to conquering Tricore: Michał Kowalczyk ( @mkow.bsky.social ) and Jakub Stepniewicz (MrTick) take you on a deep dive into RE challenges—500KB of machine code, Ghidra bugs, and embedded adventures. https://re-verse.sessionize.com/session/778969 #REverse2025 #HardwareHacking
Code reuse: a blessing & a curse in reverse engineering. Max Kersten @maxkersten.nl dives into automation, attribution pitfalls, and lessons learned from the AcidRain & AcidPour wipers. Learn how to streamline analysis & avoid missteps. #REverse2025 #ReverseEngineering #Malware
Struggling to reverse Rust binaries? Cindy Xiao breaks down the Rust type system and shares practical techniques to reconstruct Rust structures. Learn how to tackle Rust malware & analyze binaries like a pro. #REverse2025 #ReverseEngineering #Rust #Malware