Categories

OISF 2013 video: reverse engineering demystified

Posted on Monday, July 15th, 2013 in reversed, software, Videos by the machinegeek


Chris Eagle is a Senior Lecturer of Computer Science at the Naval Postgraduate School (NPS) in Monterey, CA and worked as a computer engineer/scientist for 28 years. In this video he gives a step by step introduction to the process of software reversing and vulnerability discovery.

Chris is a co-author of Gray Hat Hacking and has spoken at numerous security conferences, including Blackhat, Defcon, Toorcon, and Shmoocon.

This talk was presented at the Ohio Information Security Forum (OISF) held on July 13, 2013 at Miami Valley Research Park – Sinclair Learning Center, Dayton, OH.

This entry was posted on Monday, July 15th, 2013 at 2:00 pm and is filed under reversed, software, Videos. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

2 Responses to “OISF 2013 video: reverse engineering demystified”

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • Pekka Akselin: This is ridiculous!? :-) We are back at 256(!) byte EPROMs that needed multiple, a handful, of voltages to run! :-(
  • KH: Let's try a back-of-envelope calc balancing energies. From MCP1700 datasheet, there are graphs for a 200mA load step. Estimate the energy shortfall as 12uJ. Say...
  • Daniel: It's been a week and my comment is still awaiting moderation. Apparently the CIA doesn't want their involvement known?
  • KH: Agree, so okay, I guess he must have learned from somewhere. 100nF and 1000uF is so far apart, that was jarring; it's more magic incantation...
  • Max: I have a suspicion the hefty electrolytic cap might be some sort of cargo cult carry-over from other RF-based projects - for instance, I've seen...