11:00 ~ 11:50
Your Teammate Isn't Human: Mixing Decompilation and AI for Modern Reverse Engineering - Zion Basque13:00 ~ 13:40
新魔法時代 - CmdGPT - Birdman14:00 ~ 14:40
Firewall is on fire: Hacking the Juniper Firewall - 林宇翔15:10 ~ 15:50
Playing with Fire: Exploring the Exploitable Side of ZyXEL VPN Firewall - atdog, Lays16:10 ~ 16:50
入無人之徑:於 MikroTik 蟄伏九載的 Pre-Auth RCE - NiNi13:00 ~ 13:40
Reaching Beyond Boundaries: Out-of-Bounds Exploration in Out-of-Band Management - 王建元 (kevingwn)14:00 ~ 14:40
AI 搭把手,推倒 PHP 加密源碼的高牆 - 李樸, 官澔15:10 ~ 15:50
Prompt Injections in the Wild - Exploiting Vulnerabilities in LLM Agents - Johann Rehberger16:10 ~ 16:50
Pennywise - Invisible privacy risk in the new AI era - Vic Huang, 何念修13:00 ~ 13:40
Why Panda Loves USB?: Observing Targeted Attacks by Chinese APTs - Yuta Sawabe, Kazuya Nomura14:00 ~ 14:40
GroundPeony: Crawling with Malice - Rintaro Koike, Shota Nakajima15:10 ~ 15:50
Unmasking CamoFei: An In-depth Analysis of an Emerging APT Group Focused on Healthcare Sectors in East Asia - Still Hsu, DuckLL16:10 ~ 16:50
Static Analysis on Malware Packed by AutoIt and NSIS - Zong-Yu Wu12:40 ~ 14:40
ARM-ing for Android: Unraveling the Mysteries of Native Library Reverse Engineering - Ravi Rajput14:50 ~ 16:50
SOC200 - Log Monitorin - Ian Wilson10:10 ~ 11:00
Advancements in JavaScript Engine Fuzzing - Carl Smith11:20 ~ 12:00
A 3-Year Tale of Hacking a Pwn2Own Target: The Attacks, Vendor Evolution, and Lesson Learned - Orange Tsai13:00 ~ 13:40
Ghosts of the Past: Classic PHP RCE Bugs in Trend Micro Enterprise Offerings. - Poh Jia Hao14:00 ~ 14:40
Endpoint Security or End of Security? Exploiting Trend Micro Apex One - Lays, Lynn15:10 ~ 15:50
現代內核漏洞戰爭 - 越過所有核心防線的系統/晶片虛實混合戰法 - 馬聖豪11:20 ~ 12:00
How to hijack a VoLTE network - Pavel Novikov13:00 ~ 13:40
從硬體攻擊手段來解開機殼下的美麗祕密:網路通訊設備安全分析 - Ta-Lun Yen14:00 ~ 14:40
ELECTRONizing macOS privacy - a new weapon in your red teaming armory - Wojciech Reguła15:10 ~ 15:35
What You See IS NOT What You Get: Pwning Electron-based Markdown Note-taking Apps - Li Jiantao11:20 ~ 12:00
打造公平的遊戲轉蛋:在不洩漏原始碼的前提下驗證虛擬轉蛋的機率 - Jing Jie Wang, 李安傑13:00 ~ 13:40
直搗核心:探索 AMD 驅動程式中的資安漏洞 - Zeze14:00 ~ 14:40
搭配模糊測試對Linux核心遠端檔案系統進行漏洞挖掘 - Pumpkin14:00 ~ 16:00
麋鹿在芝麻街 - ELK x BERT 資安分析實戰 - Sheng-Shan Chen, Yuki Hung