09:55 ~ 10:40
Asia-Pacific Cybersecurity Community Collaboration and Joint Defense - Thomas R. Millar10:55 ~ 11:40
台灣資安的未來10年-以國安面向思考 - 李漢銘11:40 ~ 12:40 Launch
12:40 ~ 13:25
To promote collaborative activities for cybersecurity among stakeholders - Toshikazu OKUYA13:40 ~ 14:25
你的 NAS 不是你的 NAS ! - angelboy14:25 - 14:55 Tea Time
14:55 ~ 15:40
Fast verified post-quantum software - Daniel J. Bernstein15:55 ~ 16:40
Foundry for Cyber Physical Mobility Fusion - 李維斌16:55 ~ 17:40
The Proxy Era of Microsoft Exchange Server - Orange Tsai10:55 ~ 11:40
資安新創高峰論壇-資安新創如何創造未來 - 蔡宜兼, 劉榮太, Edward Lee, 郭大經, 歐仕邁11:40 ~ 12:40 Launch
12:40 ~ 13:25
No Time To Die - Ransomware Will Return - Yi-Hsien Chen13:40 ~ 14:25
我對台灣金融領域資安的思考 - 蔡福隆14:25 - 14:55 Tea Time
14:55 ~ 15:40
The Great Escapes : A Case Study Of VM Escape & EoP Vulnerabilities - 鄭炳忠 (Billy), Ramdhan15:55 ~ 16:40
The Curious Case of Weird Phone Calls in the Middle of the Night - Sharon Brizinov10:55 ~ 11:40
How has covid-19 impacted the overall security landscape compared to other threats? - Takahiro Takeda, Takehiko Kogen11:40 ~ 12:40 Launch
12:40 ~ 13:25
Learn from the big mistakes of cashless payment service in Japan - AIDO & Manaka13:40 ~ 14:25
An Azure Sphere Security Breakdown, part 2/??? - Lilith Wyatt14:25 - 14:55 Tea Time
14:55 ~ 15:40
高峰論壇-Facing the dark side of future mobility - 李維斌, 魏國章, 洪進福, 叢培侃, 林志達, 林家樑15:55 ~ 16:40
Anatomy of COBRA - The Lazarus Group's Recent Activities and TTPs - - Kota Kino, Shusei Tomonaga, Hayato Sasaki09:00 ~ 09:10
Opening09:25 ~ 10:10
Why is it getting harder to train the cybersecurity workforce? - Seungjoo (Gabriel) Kim10:25 ~ 11:10
Skrull Like A King:從重兵看守的天眼防線殺出重圍 - 馬聖豪11:25 ~ 12:10
Taking Apart and Taking Over ICS & SCADA Ecosystems: A Case Study of Mitsubishi Electric - Mars Cheng, Selmon Yang12:10 ~ 13:10 Launch
13:10 ~ 13:55
Analysis of Invisible Data Poisoning Backdoor Attacks against Malware Classifiers - 鄭欣明, 曾明慧14:10 ~ 14:55
國家層級的資安威脅與應處 - 簡宏偉14:55 - 15:25 Tea Time
15:25 ~ 16:10
Enabling dynamic analysis of Legacy Embedded Systems in full emulated environment - Ta-Lun Yen16:25 ~ 17:15
10 Years' Key challenges in LINE's Cyber Security and Privacy - Naohisa Ichihara (市原 尚久)17:15 ~ 17:30
閉幕 / 花絮與展望 HITCON 202209:25 ~ 10:10
Security in the new normal: security issues related to the pandemic - Josh Hopkins, Manabu Niseki10:25 ~ 11:10
慟!!實聯制?!我們交出去的個資跑到哪裡去了no? - Vic Huang, Joy Ho11:25 ~ 12:10
數位身分識別證的安全分析經驗分享與建議 - 查士朝13:10 ~ 13:55
Winnti is Coming - Evolution after Prosecution - Aragorn Tseng, Charles Li, Peter Syu, Tom Lai14:10 ~ 14:55
APT10 HUNTER RISE ver3.0: Repel new malware LODEINFO, DOWNJPIT and LilimRAT - Suguru14:55 - 15:25 Tea Time
15:25 ~ 16:10
空降危機:雲端攻防二三事 - Boik Su, 林殿智09:25 ~ 10:10
An Unauthorized Exchange - From Targeted Espionage to a Global Cyber Pandemic - Steven Adair10:25 ~ 11:10
遊戲化資安教育:CDM 桌遊開發經驗談 - 高偉家11:25 ~ 12:10
協會時間 & Lightning Talk - Allen Own14:10 ~ 14:55
人才培育高峰論壇-從資安人才培育到企業就業 - 鄭欣明, 林盈達, Hsu-Chun Hsiao, 黃俊穎, 李育杰14:55 - 15:25 Tea Time
15:25 ~ 16:10
Debacle of The Maginot Line:Going Deeper into Schneider Modicon PAC Security - Gao Jian