Following our talk at Blackhat 2012 entitled “Practical ARM Exploitation”, we were honored to be asked to participate in a BlackHat press conference. After getting briefed by the Media Coordinator and Vincenzo Iozzo we summarized our talk and training in the simplest of terms to a room of reporters and journalists. After the press conference […]
Uhm….so apparently CTFs have REALLY blown up! As a founding member of Kenshoto, I remember how we pushed the envelope for CTFs (building automatic scoring systems, *actual* challenges, etc.) I was also the VJ for our first two years running, lugging my 500 DVDs with me to play my favorite little esoteric cyberpunk clips from […]
Another conference has come and gone. Sometimes it seems that the annual conference schedule is the metronome to which the Infosec world paces itself. The coming and going of conferences is the only consistency in this idiosyncratic industry full of neurosis and theatrics. This year’s CanSecWest held true to form and was the stage for […]
As we have announced in other blogposts we’ve been researching mobile platforms quite a bit (specifically those that use the ARM microprocessor). We compiled all of our notes on ARM reverse engineering and ARM exploitation and built a course called “Practical ARM Exploitation” that we will be publicly debuting this coming week at CanSecWest. The […]
So….we heard Dino & Alex and Aaron & Zef were doing some blingin new trainings. So we felt we had to keep up with the rest of the New York Krew and do one….Ok, not really. We (the two Stephens) have spent a bunch of head-down time recently doing embedded research (as we mentioned in the […]
In July 2011, Beans gave a talk at ReCon in Montreal, CA entitled “Hardware Hacking for Software People“. This year ReCon broke away from its more humble conference venue roots, took corporate sponsorship, and upgraded the venue to a MUCH nicer hotel. (After last year’s debacles, I think Hugo and Dave decided it was just […]
July 28, 2012 by s7ephen
0