- Conference: June 27-29, 2014
- Training: June 23-26, 2014
REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It is held annually in Montreal, Canada.
The conference offers a single track of presentations over the span of three days along with technical training sessions held before the presentation dates. Technical training varies in length between two and four days.
The registration fee includes an access pass to the conference as well as lunch, and coffee breaks for all three days of the conference. Provincial and federal sales taxes will be applied to all registration fees. All registration fees are payable in Canadian dollars (CAD).
A total of 300 tickets will be sold for this year’s conference.
List of training sessions for Recon 2014:
- - Reversing telecom platforms for security: applied hacking on legacy monolithic MSC and HLR to modular ATCA’s reversing by Philippe Langlois (2 days: 25-26 June)
- - Introduction to USB Emulation with the Facedancer by Travis Goodspeed and Sergey Bratus (2 days: 25-26 June)
- - The Exploit Laboratory: Red Team by Saumil Shah(2 days: 23-24 June)
- - The Exploit Laboratory: Master by Saumil Shah(2 days: 25-26 June)
- - iOS 7 Kernel Exploitation Training by Stefan Esser (4 days: 23-26 June)
- - Reverse Engineering Malware by Nicolas Brulez (4 days: 23-26 June)
- - Keep It Synple Stupid – Utilizing Programmable Logic for Hardware Reverse-Engineering by Dmitry Nedospasov and Thorsten Schroeder (4 days: 23-26 June) – SOLD OUT
- - Windows Internals for Reverse Engineers by Alex Ionescu (4 days: 23-26 June) – SOLD OUT
- - Botnet Takeover Attacks for Reverse Engineers by Brett Stone-Gross and Tillmann Werner (4 days: 23-26 June) – SOLD OUT