Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from REcon Conference. Dive deep into the latest insights, research, and trends from the world's leading experts.
Reverse engineering Samsung oven firmware to fix temperature inaccuracies and improve performance, demonstrating power analysis, fault injection, and binary patching techniques for e-waste reduction.
Comprehensive security analysis of low-earth satellites, exploring vulnerabilities and demonstrating live exploitation to gain full control. Covers satellite architecture, reverse engineering, and potential impacts on critical services.
Reverse engineering and exploiting cryptographic backdoors in Phicomm routers, demonstrating vulnerabilities and developing tools for unauthenticated root access.
Découvrez les nouvelles techniques de dissimulation du malware PlugX utilisant les API Windows via COM, son exploitation de Windows Explorer et sa capacité de propagation par clé USB.
Explore Windows networking internals, reverse engineering techniques, and recent vulnerabilities like CVE-2023-23415 in this insightful talk on uncovering security flaws in the Windows networking stack.
Exploring MS-DOS malware techniques to create art, blending assembly programming with vintage bootkit analysis. Insights on legacy vulnerabilities and modern applications in firmware and IoT security.
Explore Windows Restart Manager: its architecture, legitimate uses, and potential for malicious exploitation. Learn defense techniques against threats and see live demonstrations of its functionalities.
Explore modifying Qualcomm WiFi chip firmware for security research. Learn about chip architecture, firmware structure, and patching techniques using the Nexmon framework to enhance functionality and find vulnerabilities.
Efficient heuristics for detecting cryptographic algorithms, state machines, and obfuscated code in binaries. Enhance reverse engineering workflows with architecture-agnostic techniques.
Discover how to build a robot for extracting RAM contents from embedded devices using cryogenic techniques. Learn about design challenges, practical solutions, and cost-effective construction methods.
Herramienta para detectar patrones en código binario mediante coincidencia de grafos. Permite definir firmas personalizadas para identificar variantes de malware y extraer información valiosa.
Exploring security risks of integrating open-source components in closed applications, focusing on Adobe Reader's XSLT engine. Techniques for auditing and finding vulnerabilities are demonstrated.
Explore vulnerabilities in popular cryptocurrency hardware wallets with experts Thomas Roth and Dmitry Nedospasov, uncovering potential security risks and attack vectors.
Explore advanced Windows tracing techniques using WPP and TraceLogging for enhanced dynamic and static analysis in cybersecurity investigations.
Explore advanced X-ray reverse engineering techniques with expert George Tarnovsky, uncovering hidden hardware secrets and enhancing your security analysis skills.
Get personalized course recommendations, track subjects and courses with reminders, and more.