Rephonic
Artwork for Behind the Binary by Google Cloud Security

Behind the Binary by Google Cloud Security

Josh Stroschein
Reverse Engineering
Malware Analysis
Cybersecurity
X64dbg
Flare-On Challenge
Lazarus Group
YARA
AI In Cybersecurity
Debugging Tools
Windows
North Korea
Web3
Decentralized Finance
Open-Source Software
Obfuscation
Sony Pictures
Capture the Flag
Incident Response
Digital Forensics
Malware

Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human sid... more

PublishesTwice monthlyEpisodes19Foundeda year ago
Number of ListenersCategory
Technology

Listen to this Podcast

Artwork for Behind the Binary by Google Cloud Security

Latest Episodes

In this episode, we’re joined by Nino Isakovic, a long-time low-level security expert, for a thought-provoking conversation that spans the foundational and the cutting-edge. Nino discusses the art of deconstructing problems—sharing insights on how to... more

In this episode, we sit down with Nick Harbour, Blas Kojusner, Moritz Raabe, and Sam Kim — members of the FLARE Team and some of this year’s challenge authors — for a deep dive into the design and execution of FLARE-On 12. The team discusses the comp... more

In this episode, we're asking the question: "What Lurks Beneath?" We're joined by Mark Overholser, a Technical Marketing Engineer at Corelight who's part of the team running the Black Hat Network Operations Center (NOC). We discuss the incident durin... more

In this episode of Behind the Binary, we're joined by renowned security researcher Hahna Kane Latonick for a deep dive into the powerful world where reverse engineering meets data science. Hahna shares her expertise on how techniques like supervised ... more

In this episode, we're "Getting Ready for FLARE-On 12" with an inside look at the world-renowned reverse engineering competition. We’re joined by long-time FLARE-On host and challenge author Nick Harbour and regular challenge author Blas Kojusner for... more

Web3 promised a new era of decentralized finance, but it has also created a new frontier for crime, with thefts and hacks far surpassing those in the traditional financial sector. In this episode, we sit down with experts Blas Kojusner, Robert Wallac... more

In this episode of Behind the Binary, we sit down with Dr. Jared DeMott to pull back the curtain on the world of cybersecurity. Formerly with the Microsoft Security Response Center (MSRC), Jared shares invaluable wisdom on managing bug bounty program... more

Join us as we explore the world of reverse engineering with pioneer and CTO, Danny Quist. We'll examine the evolving landscape of binary analysis tools, the constant battle with malware obfuscation, and what it was like building one of the very first... more

Key Facts

Accepts Guests
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

Recent Guests

Hahna Kane Latonick
Director of Research and Development at Dark Wolf Solutions
Dark Wolf Solutions
Episode: EP16 The Machine Learning Revolution in Reverse Engineering with Hahna Kane Latonick
Blas Kojousner
A vulnerability engineer on the Flare team at Google focused on malware reverse engineering and security in Web3 environments.
Google
Episode: EP14 Web3's Dark Side: Unmasking the New Age of Financial Crime
Joseph Dobson
Principal analyst at Mandiant who leads efforts to track cryptocurrency use by threat actors.
Mandiant
Episode: EP14 Web3's Dark Side: Unmasking the New Age of Financial Crime
Robert Wallace
Consulting leader and senior director at Mandiant with extensive experience in digital forensics and cybercrime.
Mandiant
Episode: EP14 Web3's Dark Side: Unmasking the New Age of Financial Crime
Dr. Jared DeMott
Cybersecurity expert and entrepreneur with vast experience in bug bounty programs and vulnerability research.
Microsoft Security Response Center
Episode: EP13 Beyond the Bug: Scaling Bug Bounty Programs & Launching a Cyber Startup with Dr. Jared DeMott
Danny Quist
CTO of unit 129, expert in reverse engineering and malware analysis
Episode: EP12 Unpacking Malware & Minds: A Reverse Engineer's Journey with Danny Quist
Tim Blazytko
Chief scientist and head of engineering at Emproof, focusing on IP protection.
Emproof
Episode: EP10 Tim Blazytko - Protecting Intellectual Property: Obfuscation & Anti-Reverse Engineering in Software
Thomas Roccia
Senior Security Researcher at Microsoft
Microsoft
Episode: EP09 Thomas Roccia - AI, Data Visualization, and the Future of Security Research
Jordan Wiens
Developer of Binary Ninja and co-founder of Vector 35
Vector 35
Episode: EP07 Jordan Wiens - Inside the Mind of a Binary Ninja: CTFs, AI and the Future of Cyber Security

Host

Josh Stroschein
Host of the podcast, a reverse engineer with the FLARE team at Google, dedicated to sharing insights into the world of reverse engineering.

Top Technology Podcasts

Shell Game
Shell GameKaleidoscope
Acquired
AcquiredBen Gilbert and David Rosenthal
Hard Fork
Hard ForkThe New York Times
Tomorrow, Today
Tomorrow, TodayShekhar Natarajan
Darknet Diaries
Darknet DiariesJack Rhysider

Talking Points

Recent interactions between the hosts and their guests.

EP19 The Art of Deconstructing Problems: Tools, Tactics, and the ScatterBrain Obfuscator with Nino Isakovic
Q: What is ScatterBrain?
It is an obfuscating compiler related to LLVM that transforms code into obfuscated binaries, complicating analysis.
EP19 The Art of Deconstructing Problems: Tools, Tactics, and the ScatterBrain Obfuscator with Nino Isakovic
Q: When did you get drawn to software that was intentionally obfuscated, malware or exploits or something that's just trying to protect its intellectual property?
It stemmed from my interest in programming and compilers, realizing that scripting languages protect intellectual property similarly, leading to my focus on obfuscation.
EP16 The Machine Learning Revolution in Reverse Engineering with Hahna Kane Latonick
Q: What are some of the challenges of using machine learning in cybersecurity?
AI models do not always get it right and can produce inaccurate or misleading outputs. Hence, human expertise is necessary to verify and interpret the results.
EP16 The Machine Learning Revolution in Reverse Engineering with Hahna Kane Latonick
Q: Can you walk us through how you use AI to identify malware samples?
We can use both unsupervised and supervised machine learning to predict and cluster malware samples based on similarities and differences. For instance, utilizing unsupervised learning, we analyze a large dataset of malware samples to group them into clusters, allowing us to identify new samples efficiently.
EP10 Tim Blazytko - Protecting Intellectual Property: Obfuscation & Anti-Reverse Engineering in Software
Q: What metrics can companies use to gauge the effectiveness of their protections?
There is no definitive metric for IP protection; assessing an attacker's capabilities helps define the level of protection needed.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About This Podcast

What is This Podcast about and what kind of topics does it cover?

Engaging discussions center around the captivating field of reverse engineering, focusing on the people, technologies, and challenges within the industry. Topics like machine learning applications in cybersecurity, techniques to combat malware, and the implications of AI on security practices are frequently explored. Additionally, episodes often delve into community-driven competitions, such as Capture the Flag (CTF) events, and insights from industry experts in cybersecurity, software protection, and digital forensics. The unique human stories behind the technical work add depth, making it appealing to both professionals and those curious about the intricacies of technology and security.

Where can I find podcast stats for this podcast?

Rephonic provides a wide range of podcast stats for this podcast. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to this podcast and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does this podcast get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for this podcast, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for this podcast?

Rephonic provides comprehensive predictive audience data for this podcast, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does this podcast have?

To see how many followers or subscribers this podcast has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to this podcast?

These podcasts share a similar audience with this podcast:

1. Oxide and Friends
2. The Defender's Advantage Podcast
3. Darknet Diaries
4. Risky Business
5. SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

How many episodes of this podcast are there?

this podcast launched a year ago and published 19 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact this podcast?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for this podcast?

Rephonic pulls ratings and reviews for this podcast from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for this podcast?

Rephonic provides full transcripts for episodes of this podcast. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on this podcast?

Recent guests on this podcast include:

1. Hahna Kane Latonick
2. Blas Kojousner
3. Joseph Dobson
4. Robert Wallace
5. Dr. Jared DeMott
6. Danny Quist
7. Tim Blazytko
8. Thomas Roccia

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days