Philippe Laulheret
Philippe Laulheret is a Senior Vulnerability Researcher at Cisco Talos. With a focus on Reverse Engineering and Vulnerability Research, Philippe uses his background in Embedded Security and Software Engineering to poke at complex systems and get them to behave in interesting ways. Philippe presented multiple projects covering hardware hacking, reverse engineering and exploitation at DEF CON, Hardwear.io, Eko Party, Hexacon, and more. In his spare time, Philippe enjoys playing CTFs, immersing himself in the beauty of the Pacific Northwest, and exploring the realm of Creative Coding. Philippe holds a MSc in Computer Science from Georgia Tech and a MSc in Electrical and Computer Engineering from Supélec (France).
Session
Have you ever spent countless hours working on a project and persevered only through grit just to prove a point? This talk is about one of such projects; in order to marginally improve the working of proof of concept, we had to reverse engineer an obfuscated Warbird VM meant to protect the inner working of a cryptographic algorithm. Juggling with basic blocks and transforming them like there's no tomorrow, to finally grasp how the algorithm works. At the end of the tunnel no new exploit or incredible riches, just the self-actualization of the non-sequitur sentence "assuming an attacker has enough time and resources, they could forge a valid file"