Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Reverse Engineering [clear filter]
Friday, May 5


FTFY: The Addictive Game of Mending Malware Misbehavior with flare-qdb and Vivisect
flare-qdb is a Python CLI and library for observing and manipulating native software execution. It is also the gateway drug that led me down the path to excessive and highly pleasurable abuse of the Vivisect library. I'll discuss and demonstrate using flare-qdb and Vivisect to solve CTF challenges, turn a backdoor into a docile CLI string decoder, and unpack the PowerDuke backdoor that APT29 used against the DNC. To get a preview, check out tinyurl.com/flare-qdb-intro.

avatar for Michael Bailey

Michael Bailey

Senior Reverse Engineer @ FLARE, FireEye
Come see my Python-based DBI talk, "FTFY: The Addictive Game of Mending Malware Misbehavior with flare-qdb". @mykill on twitter. Also check out http://baileysoriginalirishtech.blogspot.com/ Bio: Michael Bailey is a reverse engineer for FLARE who lives in Huntsville, Alabama. He... Read More →

Friday May 5, 2017 11:00am - 12:00pm
Preservation Pub 28 Market Square, Knoxville, TN 37902


Saving My Car By Hacking It: A Tale of Joy and Woe
One fine summer day, my 1997 Chevrolet Cavalier decided to die. Desperate to save my beloved car, I embarked on a journey to save it.
After some troubleshooting, the problem was narrowed down to the car’s anti-theft system. Even after replacing every component, including the car’s computer, the anti-theft system would still shut off the engine a few seconds after starting it. Rather than give up, I decided to attack the component responsible for making this decision -- the computer.
This talk will discuss my descent into madness as I strove to hack the car’s PCM to disable its anti-theft feature. Everything from physically extracting and dumping the Flash chip holding the PCM’s firmware, to reverse engineering the code, to actually writing a simulator and debugger for a completely unknown device, to finally patching the PCM’s firmware will be described for your entertainment and edification.

avatar for Brandon Wilson

Brandon Wilson

Brandon Wilson is an East Tennessee State University graduate, software developer, application security consultant, and hacker of random things like game consoles and TI graphing calculators. An avid tinkerer of anything USB-related, he has spoken at DerbyCon about BadUSB and appeared... Read More →

Friday May 5, 2017 4:00pm - 5:00pm
Scruffy City Hall 32 Market Square, Knoxville, TN 37902


You can run, but you can't hide. Reverse engineering using X-Ray
Most of us have knowledge of PCB construction. In the past reversing someone's design was an easy task most of the time. Now with BGA's and manufacturers using several plane layers cover the entire PCB design while obscuring the details within the PCB from view. Thru the use of X-Ray, we are able to reverse engineer virtually anything. Slides will be shown of several PCB designs and how easy it was to reverse engineer the PCB. New to the presentation this year will be videos of Dynamic zoom; this will demonstrate the true power of the X-Ray and its ability to see sub-micron features within the PCB structure and devices while presenting a live view.


George Tarnovsky

Working with Cisco for several years, coming from 16 years in the conditional access world reverse engineering devices used for signal theft. Focus on FPGA design.

Friday May 5, 2017 5:00pm - 6:00pm
KEC 17 Market Square #101, Knoxville, TN 37902