
Cybersecurity is a field where innovation is advancing rapidly. New attack techniques, new analysis methods, new tools: practices are constantly evolving and knowledge must be continuously updated.
In this context, technical conferences play an important role in the ecosystem. They provide an opportunity to share work, discover new approaches and, above all, maintain dialogue between the various communities that are advancing IT security.
It is in this spirit that MOABI will participate this year in Insomni’hack, which will be held in Switzerland.
We warmly thank EPFL for its invitation and for allowing us to have a stand at the event.
Technical conferences: an essential monitoring tool
In a field as technical as cybersecurity, monitoring cannot rely solely on online articles or publications.
Conferences provide direct access to the work of researchers, engineers and practitioners who share their discoveries and experiments. They often reveal:
- new techniques for analysing software and systems
- work on reverse engineering
- research on discovering and exploiting vulnerabilities
- original approaches to malware analysis
These presentations often provide an overview of the technical trends that will influence the tools and practices of the coming years.
A meeting place for the security community
Beyond the conferences themselves, these events are above all places for exchange.
They bring together a very diverse community: academic researchers, security engineers, tool developers, students, consultants and members of technical communities.
Informal discussions often play just as important a role as official presentations. They provide an opportunity to exchange ideas, share feedback and sometimes spark new collaborations.
In a field where many innovations arise from experimentation and technical curiosity, these meetings contribute greatly to the vitality of the ecosystem.
At the frontier between research and industrial applications
At MOABI, we attach great importance to this exchange between cybersecurity research and practical applications.
Our work focuses in particular on analysing software from its binaries, using automated reverse engineering techniques. These approaches enable us to examine software, firmware and third-party components, even when access to the source code is not possible.
In a context where organisations are increasingly dependent on software developed by third parties or integrated into complex systems, these methods are becoming essential for a better understanding of the risks associated with software and the software supply chain.
Come and meet us at Insomni’hack
We will have a stand at the event and will also be offering a number of technical demonstrations on reverse engineering and software analysis.
If you work on topics such as reverse engineering, binary analysis or software security, we would be delighted to talk to you.
We look forward to seeing you at Insomni’hack.
More information: insomnihack.ch







