We like to give back to the community that has given us so much. Accordingly, we publish a lot of research. Here is a taxonomy of the research done by Rolf Rolles and Möbius Strip Reverse Engineering, sliced and diced in various ways. (Note that there is some redundancy in the lists below, as several research topics fall under multiple designations.)
The Best of the Below
Program Analysis
Much of the following is summarized in two of Rolf Rolles' speeches, "Program Synthesis in Reverse Engineering" (the NoSuchCon 2014 keynote speech), and "The Case for Semantics-Based Methods in Reverse Engineering" (the RECON 2012 Keynote Speech with accompanying video). See also: Program Analysis Training.
Deobfuscation
Control Flow Deobfuscation via Abstract Interpretation (with Ghidra implementation)
Transparent Deobfuscation with IDA Processor Module Extensions
The Art of Disassembly
Thorough reverse engineering workproducts, demonstrating how reverse engineering ought to be done. See also: Reverse Engineering Training.
FinSpy (analysis of devirtualized dropper program)
Tool Development
We have developed a program analysis framework, Pandemic, against which numerous tools have been developed (all of the entries under the Program Analysis heading above). Rolf Rolles was, for a time, the lead and sole developer on Zynamics (née SABRE Security) BinDiff and VxClass. Additionally, we have published several small, helpful scripts, tools, and publications on reverse engineering tool development:
Control Flow Deobfuscation via Abstract Interpretation (with Ghidra implementation)
Removing an annoying compiler optimization with a Hex-Rays plugin
Compare, Port, Navigate (BlackHat Europe 2005 presentation)
Graph-Based Comparisons of Executable Objects (SSTIC 2005 paper)
Details on IDA processor module construction in the article on HyperUnpackMe2
Academic Papers and Book Contributions
Graph-Based Comparisons of Executable Objects (SSTIC 2005)
Unpacking Virtualization Obfuscators (WOOT 2009)
SMT Solvers for Software Security (WOOT 2012)
Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices (USENIX HealthSec 2011)
Contributor to Practical Reverse Engineering, Chapter 5, Obfuscation (credited in the preface)
General Reverse Engineering Publications
Hex-Rays CTREE API Scripting: Automated Contextual Function Renaming
Removing an annoying compiler optimization with a Hex-Rays plugin
A Compiler Optimization involving Speculative Execution of Function Pointers
Malware Analysis
Stuxnet (research done in collaboration with Bruce Dang of Microsoft)
CRYPTANALYSIS
Community Participation
Rolf Rolles is the creator and moderator of the Reverse Engineering Reddit
We participate the Reverse Engineering StackExchange (examples: #1 #2 #3)
We formerly contributed to OpenRCE during its heyday