// Training

Feb 24 - Feb 27, 2025

// Conference

Feb 28 & Mar 1, 2025

// Location

Caribe Royale, Orlando, FL

// Price

$1800* conference

$4800 training

* Plus sales-tax

RE//verse is a premier reverse engineering, vulnerability research and malware analysis conference. We offer trainings and talks from industry-leading experts.

RE//verse is located in Orlando, Florida at the Caribe Royale, minutes away from Disney World.

The conference is hosted by Vector 35, creators of Binary Ninja (though this is NOT a Binary Ninja conference!) in conjunction with the same organizer from Infiltrate.

We're bringing a relaxed Florida vibe where you can connect and exchange ideas in a welcoming atmosphere.

Important Dates

CFP Opens

September 2, 2024

CFP Closes

Early November, 2024

CFP Responses

November 25, 2024

Training Ticket Sales Begin

September 2, 2024

Training

February 24-27, 2025

Conference Ticket Sales Begin

September 23, 2024 at 12pm ET

Conference

February 28-March 1, 2025

Our Sponsors

Bronze Sponsor 5
Bronze Sponsor 6

Is your company interested in sponsoring? See our sponsor information packet for more information.

Trainings

Joe FitzPatrick
Hardware Hacking

Trainer: Joe Fitzpatrick

This course, customized for RE//verse, covers the material in Applied Physical Attacks 1 & 2 classes, but with a strong emphasis on the reverse engineering aspects. Our goal is to fill in the blanks between getting a piece of hardware in your hands and getting some binary code to reverse engineer.

Kyle Martin / Ian Palleiko
Program Analysis for Vulnerability Research

Trainers: Kyle Martin / Ian Palleiko

Program Analysis for Vulnerability Research teaches fundamental concepts of program analysis and how they can be used not only for vulnerability research but for solving a number of reverse engineering related problems.

Jiska Classen
Practical iOS App, User, and Kernel Reverse-Engineering

Trainer: Jiska Classen

This training provides you with a comprehensive toolkit for analyzing apps, system daemons, the XNU kernel, firmware, and system logs on Apple's mobile devices. It caters to beginner, intermediate, and advanced reverse engineers.

Tim Blazytko
Software Deobfuscation Techniques

Trainer: Tim Blazytko

Get to know state-of-the-art code obfuscation techniques, how they complicate reverse engineering, and how to use different deobfuscation techniques to break them in various hands-on sessions at RE//verse. Participants will deepen their knowledge of program analysis and learn when and how (not) to use different techniques.

Yarden Shafir
Windows Internals for Security Engineers

Trainer: Yarden Shafir

Covering Windows 11 “23H2”, the upcoming “24H2”, and Server 2022 and 2025, you'll unravel the secrets of how GRU bootkits, PLA software supply chain implants, NSA backdoors, and other kernel and firmware malware work. You'll learn how they, and others, abuse various system functionality, obscure mechanisms, and data structures, in order to do their dirty work, and how you can defend against it!

Pedro Ribeiro and Nitay Artenstein
Practical Baseband Exploitation

Trainer: Pedro Ribeiro / Nitay Artenstein

In this course, students will learn our systematic approach to baseband security research: from setting up a fake base station using SDR and open-source BTS software, to obtaining and analysing mobile phone firmware and crash dumps, modifying BTS code to trigger bugs and deliver a payload, and finally reverse engineering radio protocols, hunting for vulnerabilities and exploiting them.

Call For Papers Review Board

CFP is now open! Talk submissions welcome!

Dave Aitel
Dave Aitel

Partner, Cordyceps Systems

Member 1
Dr. Sergey Bratus

Distinguished Professor, Dartmouth College

Amy Burnett
Amy Burnett

Researcher, RET2 Systems

Aleksandra 'Hasherezade' Doniec
Aleksandra "Hasherezade" Doniec

Open Source Developer, Security Researcher, Check Point Research

Peter LaFosse
Peter LaFosse

Founder, Vector 35

Alex Matrosov
Alex Matrosov

CEO and Founder of Binarly Inc

Matt Monte
Matt Monte

CTO, Kudu Dynamics

Jordan Wiens
Jordan Wiens

Founder, Vector 35