Reverse engineering (RE) skills are handy in a number of situations. Determining the behavior of malware, discovery of software vulnerabilities and showing off to your friends are just a few of the benefits that immediately come to mind. Unfortunately reverse engineers are mostly self trained, work in solitude and do not openly work together when developing tools and techniques. This goal of this session is to present some of our ideas and tools (past, present and future) to foster an open discussion on RE tools as well as field suggesstions for the continued development of these tools.
Pedram Amini currently leads the Product Security Assessment team at TippingPoint, a division of 3Com. Previous to TippingPoint, he was the assistant director of iDEFENSE Labs and remains the reigning foosball champion after an intense final battle with understudy Adam Greene. Despite the fancy titles he spends much of his time developing automation tools, plug-ins and scripts for software like IDA Pro and OllyDbg. In conjunction with his passion for the field, Pedram launched OpenRCE.org, a community website dedicated to the art of reverse engineering. Chris Eagle is the Associate Chairman of the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, CA. A computer engineer/scientist for 19 years, his research interests include computer network operations, computer forensics and reverse/anti-reverse engineering.