Browsing Archives of Author »Stephen Ridley«

BreakPoint 2012 (Melbourne, Australia). A long overdue post…

October 21, 2012

0

We spoke at Breakpoint 2012 in Melbourne, Australia. Whatta cool con. A researcher’s conference. It was small and highly relevant with great content. It was also a really great choice of venue (The Intercontinental). For the last decade or so I’ve used the term “rux” like people use the term “0wn”. I’ve also used the […]

A day trip to Source Seattle 2012

September 13, 2012

0

About a month ago we gave a high-level talk about the threats to mobile devices at Source Seattle 2012. We talked (in the “Business Track”) about our experience developing the Practical ARM Exploitation course and also spoke anecdotally about our experiences reverse engineering and exploiting software on mobile devices and embedded systems. The talk was […]

BlackHat Las Vegas 2012

August 11, 2012

2

“The sky above Las Vegas was the color of television, tuned to a dead channel…“ Ok it wasn’t. In fact it was bright, beautiful, sunny and hot as sh*t. Neal Stephenson did the keynote at BlackHat this year, so we felt we should sling the obligatory cyberpunk reference into this post….and because I (Ridley) am writing […]

Teaming Up With Trail of Bits

August 8, 2012

0

Following our Blackhat 2012 training and talk we received a bunch of emails, tweets, and IMs  asking one thing: “When are you going to offer this to the public again? I couldn’t make it to the BlackHat course.” With the exception of CanSecWest and BlackHat we’ve mostly been giving this (and customized versions of similar […]

Beans on NPR

July 28, 2012

0

Following our talk at Blackhat 2012 entitled “Practical ARM Exploitation”, we were honored to be asked to participate in a BlackHat press conference. After getting briefed by the Media Coordinator and Vincenzo Iozzo  we summarized our talk and training in the simplest of terms to a room of reporters and journalists. After the press conference […]

SecuInside 2012 (Seoul Korea)

July 9, 2012

1

Uhm….so apparently CTFs have REALLY blown up! As a founding member of Kenshoto, I remember how we pushed the envelope for CTFs (building automatic scoring systems, *actual* challenges, etc.) I was also the VJ for our first two years running, lugging my 500 DVDs with me to play my favorite little esoteric cyberpunk clips from […]

Bustication Everywhere: A CanSecWest 2012 Retrospective

March 11, 2012

4

Another conference has come and gone. Sometimes it seems that the annual conference schedule is the metronome to which the Infosec world paces itself. The coming and going of conferences is the only consistency in this idiosyncratic industry full of neurosis and theatrics. This year’s CanSecWest held true to form and was the stage for […]

A Lackluster ‘Hack Cluster’: ARM Exploitation Lab Preview

March 1, 2012

2

As we have announced in other blogposts we’ve been researching mobile platforms quite a bit (specifically those that use the ARM microprocessor). We compiled all of our notes on ARM reverse engineering and ARM exploitation and built a course called “Practical ARM Exploitation” that we will be publicly debuting this coming week at CanSecWest.  The […]

Practical ARM Exploitation: A New Training

January 12, 2012

12

So….we heard Dino & Alex and Aaron & Zef were doing some blingin new trainings. So we felt we had to keep up with the rest of the New York Krew and do one….Ok, not really. We (the two Stephens) have spent a bunch of head-down time recently doing embedded research (as we mentioned in the […]

Recon 2011 (a late retrospective)

November 28, 2011

0

In July 2011, Beans gave a talk at ReCon in Montreal, CA entitled “Hardware Hacking for Software People“. This year ReCon broke away from its more humble conference venue roots, took corporate sponsorship, and upgraded the venue to a MUCH nicer hotel. (After last year’s debacles, I think Hugo and Dave decided it was just […]