Presentations
Frida Presentations
Conference talks and workshops about Frida from 2015 to 2018.
OSDC 2015 — Putting the open back into closed software
- Slides: PDF
- Recording: https://youtu.be/tmpjftTHzH8
- Abstract: Demonstrates Frida as a scriptable dynamic binary instrumentation toolkit for Windows, Mac, Linux, iOS, Android, and QNX. Shows how to write JavaScript snippets and inject them into running processes to hook functions, spy on crypto APIs, or trace private application code.
OSDC 2015 — The engineering behind the reverse engineering
- Slides: PDF
- Recording: https://youtu.be/uc1mbN9EJKQ
- Abstract: Covers OS process fundamentals, native APIs for probing process state (memory, registers, threads), code injection, and Frida’s dynamic binary rewriting technique.
NLUUG 2015 — Frida: Putting the open back into closed software
- Slides: https://slides.com/oleavr/nluug-2015-frida-putting-the-open-back-into-closed-software
- Demos: https://github.com/frida/frida-presentations/tree/master/NLUUG2015
- Recording: https://youtu.be/3lo1Y2oKkE4
- Abstract: Same core content as OSDC 2015 talk. Covers Frida on Windows, Mac, Linux, iOS, Android, QNX with JavaScript-based instrumentation.
ZeroNights 2015 — Cross-platform reversing with Frida
- Slides: PDF
- Demos: https://github.com/frida/frida-presentations/tree/master/ZeroNights2015
- Format: Workshop (2–3 hours)
- Requirements: Laptop running Windows, Mac, or Linux; optionally a jailbroken/rooted iOS or Android device
- Abstract: Hands-on intro to Frida’s APIs and CLI tools; attendees build a reversing tool from scratch. Targets those who want to get up to speed on dynamic instrumentation on desktop and mobile.
No cON Name 2015 — Cross-platform reversing with Frida
- Slides: PDF
- Demos: https://github.com/frida/frida-presentations/tree/master/NcN2015
- Format: Workshop (2 hours)
- Requirements: Laptop running Windows, Mac, or Linux; optionally a jailbroken/rooted iOS or Android device
- Abstract: Intro to Frida APIs and CLI tools; attendees build a reversing tool from scratch.
FOSDEM 2016 — Testing interoperability with closed-source software through scriptable diplomacy
- Slides: PDF
- Event track: Testing and Automation — https://fosdem.org/2016/schedule/track/testing_and_automation/
- Abstract: Uses Frida to expose internal functions and data structures from binary-only software. Demonstrates converting large integration tests into isolated test fixtures by hooking into closed-source processes via JavaScript or Python.
BSides Knoxville 2016 — Peeking under the hood with Frida
- Recording: https://youtu.be/RINNW4xOWL8
- Abstract: Intro to Frida as a binary instrumentation framework for hooking and tracing arbitrary functions using JavaScript (“like Greasemonkey for binary applications”). Covers Windows, Linux, macOS, iOS, Android, and QNX. Includes QNX porting notes.
Ekoparty 2016 — Getting fun with Frida
- URL: https://www.coresecurity.com/publication/getting-fun-frida
- Abstract: Turbo talk covering Frida’s basic components, use cases for daily reverse engineering tasks, advantages and disadvantages over similar frameworks, with demos and code snippets.
RMLL 2017 — Unlocking secrets of proprietary software using Frida
- Slides: http://slides.com/oleavr/frida-rmll-2017
- Recording: https://rmll.ubicast.tv/videos/frida_03038/
- Abstract: Introduction to Frida for binary application analysis; demo-heavy. Shows how to understand application internals and trace crypto function arguments.
GPN 2018 — Frida - (Game)Hacking mit JavaScript
- Recording: https://www.youtube.com/watch?v=6QpRD3tkw48
- Language: German
- Abstract: Presents the Frida framework for injecting JavaScript into processes. Covers the V8 JavaScript interpreter injection, memory manipulation, hooks, and detours. Demonstrated through game hacking examples.