Micellaneous slide decks, resources, and recordings of some of my conference presentations.
- BSidesCanberra 2023 Keynote: "When Exploits Aren't Binary"
- OffensiveCon 2023: "The Print Spooler Bug That Wasn't" with James Forshaw
- Zer0Con 2023: "A Year in Review of 0-days Exploited In-the-Wild in 2022"
- EKOPARTY 2022: "A Very Powerful Clipboard: Analysis of a Samsung in-the-wild exploit chain"
- FIRST 2022: "0-day In-the-Wild Exploitation in 2022...so far"
- OffensiveCon 2022: "Real World 0-days: 0-days Detected In-the-Wild in 2021"
- AusCERT Keynote 2021: "A World Where 0-day is Hard"
- Enigma 2021: "The State of 0-day In-the-Wild Exploitation: A Year in Review of 0-days Used In-The-Wild in 2020"
- BSidesPDX 2020 Keynote: "10 Life Lessons I Learned from Hacking"
- Appsec Village at Defcon 2020 Keynote: "Who's secure, who's not, and who makes that choice"
- Black Hat USA 2020: "Reversing the Root: Identifying the Exploited Vulnerability in 0-days Used In-The-Wild
- vOPCDE #4 2020:"TFW you-get-really-excited-you-patch-diffed-a-0day-used-in-the-wild-but-then-find-out-it-is-the-wrong-vuln"
- OffensiveCon 2020:"Bad Binder: Finding an Android In The Wild 0day"
- Bluehat IL 2020: "Where's Waldo...'s Brothers & Sisters: Variant Analysis on Recent 0-days"
- BSides Charlestone 2019 KEYNOTE: "Switching Sides: The Practical Benefits from Switching from Red to Blue to Purple"
- Jailbreak Security Summit 2019: "What's Up with WhatsApp?: A Detailed Walk Through of Reverse Engineering CVE-2019-3568"
- Black Hat 2019: "Securing the System: A Deep Dive into Reversing Android Pre-Installed Apps"
- REcon Montreal 2019: "The Path to the Payload: Android Edition"
- Kaspersky SAS 2019: "Chamois: Android's Most Impactful Botnet of 2018"
- Hackers2Hackers Conference 2018: "Getting Malicious in 2018: A Deep Dive into 2018s Most Impactful Malware in the Android Ecosystem" presented with Kylie McRoberts
- Virus Bulletin 2018: "Unpacking the Packed Unpacker: Reversing an Android Anti-Analysis Library"
- Paper
Maddie Stone, "Unpacking the Packed Unpacker", Sept 2018, Virus Bulletin. Copyright is held by Virus Bulletin Ltd, but is made available on this site for personal use free of charge by permission of Virus Bulletin. https://www.virusbulletin.com/ - Slides
- Recording of Talk: Coming Soon
- IDAPython Script & Resources
- Paper
- BlackHat USA 2018: "Unpacking the Packed Unpacker: Reversing an Android Anti-Analysis Library"
- OffensiveCon 2018: "The Smarts Behind Hacking Dumb Devices"
- DerbyCon 2017: "IDAPython: The Wonder Woman of Embedded Device Reversing"
- Recording of Talk
- Slides and Demo Videos: IDAPythonEmbeddedToolkit presentations folder
- RECON Montreal 2017: "The Life-Changing Magic of IDAPython: Embedded Device Edition"
- Recording of Talk
- Slides and Demo Videos: IDAPythonEmbeddedToolkit presentations folder
- Women in Cybersecurity Conference 2018: "Introduction to Reverse Engineering Workshop"
- No slides available