From the description:
Reverse engineering is a core skill in the information security space, but it doesn’t necessarily get the wide spread exposure that other skills do even though it can help you with your security challenges. We will talk about getting you quickly up and running with a reverse engineering starter pack and explore some interesting x86 assembly code patterns you may encounter in the wild. These patterns are essentially common malware evasion techniques that include packing, analysis evasion, shellcode execution, and crypto usages. It is not always easy recognizing when a technique is used. This talk will begin by defining the each technique as a pattern and then the approaches for reading or bypassing the evasion.
Technical keynote at Shellcon 2017 by Amanda Rousseau (@malwareunicorn).
Even if you’re not interested in reverse engineering, watch the video to see a true master describing their craft.
The “patterns” she speaks of are what I would call “subject identity” in a topic maps context.