// Training
Feb 24 - Feb 27, 2025
// Conference
Feb 28 & Mar 1, 2025
// Location
Caribe Royale, Orlando, FL
// Price
* Plus sales-tax
RE//verse is a premier reverse engineering, vulnerability research and malware analysis conference. We offer trainings and talks from industry-leading experts.
RE//verse is located in Orlando, Florida at the Caribe Royale, minutes away from Disney World.
The conference is hosted by Vector 35, creators of Binary Ninja (though this is NOT a Binary Ninja conference!) in conjunction with the same organizer from Infiltrate.
We're bringing a relaxed Florida vibe where you can connect and exchange ideas in a welcoming atmosphere.
Is your company interested in sponsoring? See our sponsor information packet for more information.
Trainer: Joe Fitzpatrick
This course, customized for RE//verse, covers the material in Applied Physical Attacks 1 & 2 classes, but with a strong emphasis on the reverse engineering aspects. Our goal is to fill in the blanks between getting a piece of hardware in your hands and getting some binary code to reverse engineer.
Trainers: Kyle Martin / Ian Palleiko
Program Analysis for Vulnerability Research teaches fundamental concepts of program analysis and how they can be used not only for vulnerability research but for solving a number of reverse engineering related problems.
Trainer: Jiska Classen
This training provides you with a comprehensive toolkit for analyzing apps, system daemons, the XNU kernel, firmware, and system logs on Apple's mobile devices. It caters to beginner, intermediate, and advanced reverse engineers.
Trainer: Tim Blazytko
Get to know state-of-the-art code obfuscation techniques, how they complicate reverse engineering, and how to use different deobfuscation techniques to break them in various hands-on sessions at RE//verse. Participants will deepen their knowledge of program analysis and learn when and how (not) to use different techniques.
Trainer: Yarden Shafir
Covering Windows 11 “23H2”, the upcoming “24H2”, and Server 2022 and 2025, you'll unravel the secrets of how GRU bootkits, PLA software supply chain implants, NSA backdoors, and other kernel and firmware malware work. You'll learn how they, and others, abuse various system functionality, obscure mechanisms, and data structures, in order to do their dirty work, and how you can defend against it!
Trainer: Pedro Ribeiro / Nitay Artenstein
In this course, students will learn our systematic approach to baseband security research: from setting up a fake base station using SDR and open-source BTS software, to obtaining and analysing mobile phone firmware and crash dumps, modifying BTS code to trigger bugs and deliver a payload, and finally reverse engineering radio protocols, hunting for vulnerabilities and exploiting them.
CFP is now open! Talk submissions welcome!
Partner, Cordyceps Systems
Distinguished Professor, Dartmouth College
Researcher, RET2 Systems
Open Source Developer, Security Researcher, Check Point Research
Founder, Vector 35
CEO and Founder of Binarly Inc
CTO, Kudu Dynamics
Founder, Vector 35