10:00 ~ 10:50
Industrial Cybersecurity Landscape in 2020: Trends, Challenges, and Opportunities - 劉榮太11:00 ~ 11:50
[ HITCON 論壇 ]13:00 ~ 13:50
[ HITCON 論壇 ]14:00 ~ 14:50
[ HITCON 論壇 ]15:30 ~ 16:20
[ HITCON 論壇 ]16:30 ~ 17:20
[ HITCON 論壇 ]11:00 ~ 11:50
通訊網路安全研究,從 GSM 到 5G NR - 劉作仁, 楊承穎13:00 ~ 13:50
APT Chimera - Operation targets Semiconductor Vendors - 陳仲寬, Inndy Lin, JohnThunder14:00 ~ 14:50
Discover vulnerabilities with CodeQL - Boik Su15:30 ~ 16:20
Reversing In Wonderland: Neural Network Based Malware Detection Techniques - Sheng-Hao Ma, Shin-Ming Cheng11:00 ~ 11:50
TBA - 陳立中14:00 ~ 14:50
網軍內網滲透之奇技淫巧 (Operation: I am Tom) - zha0, Tom, Aragorn15:30 ~ 16:20
Tropic Trooper’s Back: USBferry Attack Targets Air-gapped Environments - Joey Chen11:00 ~ 11:50
A Million Boluses: Discovery and Disclosure of Vulnerabilities in an Insulin Pump - Julian Suleder15:30 ~ 16:20
Last orders at the House of Force - Kevin Backhouse16:30 ~ 17:20
A CTF-Style Escape Journey on VMware Workstation - Yanyu Zhang09:20 ~ 10:10
Breaking Samsung's Root of Trust: Exploiting Samsung S10 Secure Boot - Cheng-Yu Chao10:20 ~ 11:10
From LNK to RCE: Finding bugs in Windows Shell Link Parser - Lays13:50 ~ 14:40
Development of Signaling Spoofing Attacks Using Function Containerization of Rogue Base Stations - Shin-Ming Cheng, Bing-Kai Hong14:50 ~ 15:40
How I Hacked Facebook Again! - Orange Tsai16:20 ~ 17:10
Post-Quantum Cryptography - Daniel J. Bernstein, Tanja Lange17:10 ~ 18:10
Lightning Talk / 閉幕 / 花絮與展望 HITCON 202109:20 ~ 10:10
從近期 DDoS 巨量攻擊解析 IoT/DVR 侵駭手法與因應之道 - 邱品仁, 蔡振華, 李樸10:20 ~ 11:10
Head First CVE - Ken Lee11:20 ~ 12:10
你的資安策略夠明確嗎?透過框架優先緩解真實威脅 - 翁浩正, 鍾澤華13:50 ~ 14:40
My journey on SMBGhost - Angelboy09:20 ~ 10:10
晶片卡 Agent 逆向工程與重製:以健保卡為例 - Inndy Lin10:20 ~ 11:10
Potential Security and Privacy Issues in Novel Taiwanese National eID system - 何明洋11:20 ~ 12:10
LEAYA: Last Exploitation 絢 - An Embedded System Detection and Response - cp, zet, freetsubasa14:50 ~ 15:40
Bug Bounty X Router X IP Cam X 電子支付09:20 ~ 10:10
Bug hunting from zero to 0(day) to ($)0 - Anthony Lai, Byron Wai, Ken Wong10:20 ~ 11:10
First step in the quest for manufacturing cyber-resilient IoT devices - Jun Sato, 張智翔11:20 ~ 12:10
Exploit (Almost) All Xiaomi Routers Using Logical Bugs - Aobo Wang, Jihong Zheng13:50 ~ 14:40
Guarding the Factory Floor: Catching Insecure Industrial Robot Programs - Federico Maggi, Davide Quarta, Marcello Pogliani, Stefano Zanero, Marco Balduzzi14:50 ~ 15:40
The Great Hotel Hack: Adventures in attacking hospitality industry - Etizaz MohsinHITCON2020
,HITCON