Reverse Engineering a Classic Arcade Game: Super Street Fighter 2X
Details
NOTE: This event is at 6:30PM (BST)
NOTE: Please only RSVP if you will be attending in person. This helps us get an accurate count for ordering food/drinks.
Join us for our very first London Duo Tech Talk! We welcome you to come listen to Pau Oliva from IOActive’s the Madrid Lab team. Pau will be presenting “Reverse Engineering a Classic Arcade Game: Super Street Fighter 2X", given by Pau Oliva, provides an overview of how to reverse engineer a classic Capcom arcade game: Super Street Fighter 2 Turbo. Pau will show how to use a debugger to understand the logic behind the game's engine, how to hook the game's functions and use a cheat engine to write a training mode hack which will refill the player's energy bar after being hit, have infinite time and control the opponent's moves. Pau will also give some practical examples to decrypt, patch and re-encrypt CPS2 game ROMs using radare2.
Pau Oliva Fora (@pof) is a security consultant with IOActive and enjoys a diverse and challenging role performing penetration testing, reverse engineering and vulnerability discovery. Pau has a strong passion for Android security, and has worked as Mobile Security Engineer doing projects for major OEMs, government, law enforcement, health and finance sectors. He has been actively researching security aspects of the Android operating system since its debut on 2008 and is co-author of Wiley's Android Hacker's Handbook. Pau has spoken at a variety of security conferences, including DefCon, RSA, Android Security Symposium, OWASP, NoConName, RootedCon, Radare2Con and LaCon. When he's not poking around mobile devices, he enjoys playing Super Street Fighter 2 Turbo and listening to Chiptune music.
