Hi! I’m a reverse engineering and binary analysis specialist. My work spans independent consulting and hands-on trainings across reverse engineering, program analysis, and software protection. I also contribute to the reversing community through international conference talks, blog articles, research papers, and open-source tools. I hold a PhD and serve as part-time Chief Scientist at Emproof.
For trainings, consulting, invited talks, and general inquiries: tim@blazytko.to.
I offer reverse engineering and program analysis trainings, from introductory to advanced courses. Public trainings run several times per year. Private trainings and custom formats are available on request.
| Training: | Software Deobfuscation Techniques | |
| Dates: | June 15-18, 2026 | |
| Location: | REcon Montreal, Canada | |
| Price: | $5,500 CAD (before May 1) / $6,000 CAD (after May 1) | |
| Register: | REcon 2026 |
Need hands-on reverse engineering or binary analysis support? I help with deobfuscation, malware investigations, vulnerability research, and security assessments. I also assist with tooling, automation, and reverse engineering workflows. For inquiries, feel free to reach out via email.
See all posts on the blog page and subscribe via RSS.
I publish open-source tools to support reverse engineering and deobfuscation workflows.
See all tools on the Tools page.
Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications
REcon 2025, Montreal
slides ·
recording ·
code
The Future of Reverse Engineering with Large Language Models
REcon 2024, Montreal
slides ·
code ·
recording
The Next Generation of Virtualization-based Obfuscators
HITBSecConf2023, Amsterdam
slides ·
recording
Let's break modern binary code obfuscation
34th Chaos Communication Congress (
slides ·
recording
See the full list on the Talks page.
Loki: Hardening Code Obfuscation Against Automated Attacks
USENIX Security Symposium 2022 (USENIX
Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, Ali Abbasi.
paper ·
slides ·
recording
Aurora: Statistical Crash Analysis for Automated Root Cause Explanation
USENIX Security Symposium 2019 (USENIX
Tim Blazytko, Moritz Schloegel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Woerner, Thorsten Holz.
paper ·
slides ·
recording ·
code
Grimoire: Synthesizing Structure while Fuzzing
USENIX Security Symposium 2019 (USENIX
Tim Blazytko, Cornelius Aschermann, Moritz Schloegel, Ali Abbasi, Sergej Schumilo, Simon Woerner, Thorsten Holz.
paper ·
slides ·
recording ·
code
Syntia: Synthesizing the Semantics of Obfuscated Code
USENIX Security Symposium 2017 (USENIX
Tim Blazytko, Moritz Contag, Cornelius Aschermann, Thorsten Holz.
paper ·
slides ·
recording ·
code
See all publications on the Publications page.
I serve on program committees and provide peer review for conferences, workshops, and journals. Selected service roles are listed on the Publications page.