09:10 ~ 09:55
ProMutator: 透過變異區塊鏈交易以檢測去中心化金融中的價格預言機漏洞 - Jonah, shw10:10 ~ 10:55
Post-Quantum Cryptography: Detours, delays, and disasters - Daniel J. Bernstein, Tanja Lange11:10 ~ 11:55
Introduction to decentralized online identities and how to implement it wrong - Pellaeon13:00 ~ 13:45
基於圖特徵惡意軟件檢測器的結構型對抗式樣本 - 鄭欣明, 楊季昕14:00 ~ 14:45
後量子密碼標準及其原理 - 陳君明15:45 ~ 16:35
Lightning Talk - 沒有人09:10 ~ 09:55
How we use Dirty Pipe to get reverse root shell on Android Emulator and Pixel 6 - YingMuo, LiN10:10 ~ 10:55
藍隊新曙光 - 以語意感知之的啟發式符號引擎挫敗在野勒索軟體 - ShengHao Ma, Hank Chen, Mars Cheng11:10 ~ 11:55
Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS - Orange Tsai13:00 ~ 13:45
Settlers of Netlink: Exploiting a limited kernel UAF on Ubuntu 22.04 to achieve LPE - Aaron Adams14:00 ~ 14:45
從 Binary Researcher 到 Bounty Hunter 的致富之路 - Lays09:10 ~ 09:55
Malware Behavior Analysis Acceleration based on Graph Neural Networks - 林思辰, 陳憶賢, 黃思淳 , 黃俊穎10:10 ~ 10:55
Hack The Real Box: an analysis of multiple campaigns by APT41's subgroup Earth Longzhi - Hiroaki Hara, Ted Lee11:10 ~ 11:55
Earth Lusca: Revealing a Worldwide Cyberespionage Operation - Joseph Chen13:00 ~ 13:45
Operation Cache Panda:深度解析針對臺灣金融業的組織型供應鏈攻擊 - 陳仲寬14:00 ~ 14:45
Your NAS is not my BOT - Charles Li, Still Hsu09:10 ~ 09:55
當健保卡元件成為駭客的任意門 - 林宇翔10:10 ~ 10:55
Ring0 Rootkit-在 Windows Kernel 與病毒共存 - Zeze14:00 ~ 14:45
🐈⬛ Pain Pickle:系統化地繞過 Restricted Unpickler 🐈 - splitline09:10 ~ 10:10
帶槍投靠的你,彈殼掉在地上忘記收(下篇) - Two210:10 ~ 11:10
Timing Attack 從入門到發現沒時間了 - Allen Chou11:10 ~ 12:10
逆向 C 語言前傳 - Melissa13:00 ~ 14:00
由 Ethernaut 入門 Solidity 語法漏洞 - 黃悅庭10:10 ~ 11:00
Insight and trend: Worldwide threat landscape from Microsoft Threat Intelligence Center - Mark Parsons, Justin Warner11:15 ~ 12:05
Taming the Chaos of Supply Chain Security Risks with MITRE's System of Trust™ - Robert A. Martin13:00 ~ 13:45
Your Printer is not your Printer ! - Hacking Printers at Pwn2Own - angelboy14:00 ~ 14:45
如何幫你(不)發射飛彈 - Ta-Lun Yen15:25 ~ 16:10
Adventures in Cyber Space: An introduction to satellite cybersecurity - James Pavur16:25 ~ 17:10
A new secret stash for fileless malware - Denis Legezo13:00 ~ 13:45
Understanding the Chinese underground card shop ecosystem and becoming a phishing master - Strawberry Donut14:00 ~ 14:45
Cybersecurity operation and management bird's-eye view from Japanese financial industry experience. - Keisuke Kamata15:25 ~ 17:10
圓桌會議 (Round Table) 桌長分享 - 翁浩正, 劉榮太, 蔡福隆13:00 ~ 13:45
Actually, your blue team is red. Stealing your red move from the blue side - Charles Yang, Evan Huang14:00 ~ 14:45
隔離網路,隔離了什麼? - 簡宏偉15:25 ~ 16:10
關鍵報告 - 網域 AD 的風險量化與防禦策略 - Dexter Chen, Mars Cheng16:25 ~ 17:10
Active Directory 安全:有時候真實比小說更加荒誕 - 姜尚德, 蘇學翔13:00 ~ 13:45
Every authorization has its black: tackling privilege escalation in macOS - 黃智威14:00 ~ 14:45
CRAX++: Modular Exploit Generator using Dynamic Symbolic Execution - Marco Wang15:25 ~ 17:10
ISIP 校友活動 - 李漢銘, 吳宗成, 陳廷宇, 廖子慶, 黃禹程13:00 ~ 14:00
Injection 101 - 徐牧遠14:00 ~ 15:00
欸!原來這個網站有洞:手把手帶你認識網站常見漏洞 - 飛飛15:25 ~ 16:25
帶槍投靠的你,彈殼掉在地上忘記收(上篇) - Two2HITCONPEACE2022
,HITCON