Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from REcon Conference. Dive deep into the latest insights, research, and trends from the world's leading experts.
Exploring remote protocols in Baseband, reverse engineering methodologies, and bug discovery in mobile communication systems.
Exploring security flaws in VR games leading to remote code execution, highlighting privacy concerns and the need for developers to prevent abuse in online AR/VR communities.
Explore attacker dynamics and signatures in cyber conflicts, leveraging insights for proactive defense and enhanced situational awareness in the cybersecurity landscape.
Explore critical vulnerabilities in pre-installed software on Dell and Lenovo PCs, examining the security risks posed by bloatware and the balance between convenience and user safety.
Explore Trusted Execution Environment vulnerabilities in Qualcomm's TEE, reverse engineering techniques, and fuzzing methods for TrustZone apps in mobile device security research.
Electromagnetic fault injection attack on Trezor Bitcoin wallet reveals recovery seed without physical tampering. Explores vulnerability, demonstrates attack method, and discusses countermeasures for hardware wallets.
Explore the ongoing battle between cheat developers and anti-cheat technologies in gaming. Learn about bypassing techniques and tools for testing anti-cheat software effectiveness.
Detailed exploration of Windows kernel security, focusing on KASLR defeats, heap vulnerabilities, and recent changes in RS4. Insights into potential exploits and current Windows KASLR state.
Explore Qualcomm's Hexagon ADSP security, architecture, and exploitation techniques. Learn reverse engineering methodologies for proprietary systems and mitigations bypass on Android devices.
Insights into reverse engineering Broadcom Bluetooth firmware, including InternalBlue framework, patching techniques, and discovered vulnerabilities CVE-2018-19860 and CVE-2019-6994.
Explore automated dynamic analysis techniques for C++ reverse engineering, focusing on structure usage, function argument types, and inheritance relationships through DLL injection.
Explore the creation of application-specific implants using ELF files. Learn about executable containers, software build lifecycle, and advanced techniques for backdoor development in this in-depth technical presentation.
Explore techniques to automatically de-obfuscate APT10's ANEL malware, focusing on opaque predicates and control flow flattening. Learn to modify IDA Pro plugins for effective malware analysis.
Uncover sophisticated Android malware techniques: obfuscation, anti-analysis, encrypted configs, and fake commands. Learn to reverse-engineer and reveal hidden payloads in this advanced security deep-dive.
Explore vectorized emulation's potential in fuzzing, leveraging AVX-512 for parallel VM execution, enhanced code coverage, and hardware-accelerated taint tracking for improved vulnerability detection.
Get personalized course recommendations, track subjects and courses with reminders, and more.