Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from REcon Conference. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore techniques for uncovering vulnerabilities in encrypted messaging apps, with insights on tooling, approaches, and lessons learned from analyzing popular platforms.
Explore ROM encryption vulnerabilities and decryption techniques using visual analysis and software tools, with insights applicable to various chip families.
Explore North Korea's SiliVaccine, a secretive national antivirus solution. Uncover its architecture, origins, and peculiarities through reverse engineering, revealing insights into DPRK's closed digital landscape.
Explore static analysis techniques for detecting hooking capabilities in Windows executables, including Detours, import, and syscall hooking, with insights from scanning millions of files.
Deep dive into Windows Defender's binary emulator, exploring its internals, virtual environment, and integration with antivirus features. Gain insights on reverse engineering techniques for advanced malware analysis.
Explore Amiibo technology, reverse engineering, and NFC protocol vulnerabilities in Nintendo consoles using software-defined radio and a custom simulator for security research.
Discover how researchers created the first SMS-controlled malware for car infotainment systems, exploring vulnerabilities and potential threats in modern vehicle technology.
Exploring vulnerabilities in Intel PIN's dynamic binary instrumentation framework, challenging assumptions of isolation and stealthiness, and demonstrating potential security risks in instrumented programs.
Cloning a calculator watch with added radio capabilities for Morse code transmission, frequency detection, and remote control signal replication. Includes practical insights and open-source code.
Explore Struct Stalker, an LLDB script for tracing struct/object accesses in C/C++ apps. Learn about LLDB scripting and innovative memory access tracking techniques.
Static instrumentation techniques for executable files without modifying code or system environment. Enables architecture-independent injection and hooking without privileged access, suitable for integrity checking and non-rooted environments.
Reverse-engineering of iOS privileged server providing sensitive data to Apple's debugging tools. Explores techniques used to uncover and analyze this critical system component.
Exploiting iOS11 vulnerabilities to remotely install rogue apps, bypassing security enhancements and code signing requirements without kernel exploits. Techniques for sandbox escape and persistent installation demonstrated.
Explore RetDec, an open-source machine-code decompiler for analyzing binary applications. Learn about its components, applications in reverse engineering, and real-world examples demonstrated by Avast developers.
Explore malware analysis automation using Binary Ninja platform. Learn to adapt quickly to evolving threats, perform basic analysis, and utilize API for configuration data extraction from real-world samples.
Get personalized course recommendations, track subjects and courses with reminders, and more.