Time:
-

Description: This hands-on workshop introduces participants to the fundamentals of reverse engineering using C++ and x86 assembly—no programming experience required. Attendees will learn how to examine simple C++ programs, generate the corresponding assembly code, and analyze how software behaves at the machine level. The session covers essential concepts like disassembly, control flow, and memory inspection using real tools and practical examples. Designed for curious minds new to reverse engineering, this session provides a solid foundation for exploring malware analysis, vulnerability research, and binary exploitation. Just bring your interest in how software works beneath the surface—no coding background needed.

Type of session

Reverse engineering is the very definition of disruption—challenging assumptions, deconstructing systems, and revealing the hidden logic beneath the surface of compiled code. This workshop embodies the “Dare to Disrupt” theme by empowering attendees to question how software works, explore what developers never intended to be seen, and break down barriers between user and machine. Whether analyzing binaries, uncovering vulnerabilities, or understanding malware, reverse engineering equips participants with the skills to disrupt the status quo—not destructively, but with insight, curiosity, and ethical intent. To reverse engineer is to dare to learn from the inside out—and that’s exactly what this session delivers.