OwlTail

Cover image of Chris Domas

Chris Domas

5 Podcast Episodes

Latest 2 May 2021 | Updated Daily

Weekly hand curated podcast episodes for learning

Episode artwork

Paul's Security Weekly #447 - Interview with Chris Domas

Paul's Security Weekly (Podcast-Only)

This week we interview Chris Domas. Chris is a researcher interested in reverse engineering and exploitation. He joins us to talk about visualizing binaries, accessing ring -2 and making reversers sad.

1hr 29mins

2 Jun 2016

Episode artwork

Security Weekly #447 - Interview with Chris Domas

Paul's Security Weekly (Video-Only)

This week we interview Chris Domas. Chris is a researcher interested in reverse engineering and exploitation. He joins us to talk about visualizing binaries, accessing ring -2 and making reversers sad.

29mins

2 Jun 2016

Similar People

Episode artwork

Security Weekly #447 - Interview with Chris Domas

Paul's Security Weekly

This week on Security Weekly with Carlos, Jack, Michael, Joff, Paul and Larry talk about Windows updates, Sean Penn, WordPress XSS, Windows compatibility issues, TrendMicro's node.js password manager (now featuring arbitrary command execution), and a whole lot more! We also interview Chris Domas. Chris is a researcher interested in reverse engineering and exploitation. He joins us to talk about visualizing binaries, accessing ring -2 and making reversers sad.

1hr 29mins

28 Jan 2016

Episode artwork

Security Weekly #447 - Interview with Chris Domas

Paul's Security Weekly TV

This week we interview Chris Domas. Chris is a researcher interested in reverse engineering and exploitation. He joins us to talk about visualizing binaries, accessing ring -2 and making reversers sad.

29mins

22 Jan 2016

Most Popular

Episode artwork

Chris Domas - REpsych: Psychological Warfare in Reverse Engineering

DEF CON 23 [Audio] Speeches from the Hacker Convention

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Chris-Domas-REpsych.pdf REpsych: Psychological Warfare in Reverse Engineering Chris Domas Security Researcher Your precious 0-day? That meticulously crafted exploit? The perfect foothold? At some point, they'll be captured, dissected, and put on display. Reverse engineers. When they begin snooping through your hard work, it pays to have planned out your defense ahead of time. You can take the traditional defensive route - encryption, obfuscation, anti-debugging - or you can go on the offense, and attack the heart and soul of anyone who dare look at your perfect code. With some carefully crafted assembly, we'll show how to break down a reverse engineer by sending them misleading, intimidating, and demoralizing messages through the control flow graphs of their favorite RE tools - turning their beloved IDA (Hopper, BinNavi, Radare, etc) into unwitting weapons for devastating psychological warfare in reverse engineering. Chris is an embedded systems engineer and cyber security researcher, focused on innovative approaches to low level hardware and software RE and exploitation. Twitter: @xoreaxeaxeax

9 Oct 2015