11:00 ~ 11:50
The Big Bang of Cybersecurity Emergencies - Costin Raiu13:00 ~ 13:40
What the hell is Windows's CLIP Service - Reversing and exploiting the obfuscated code at its core. - Philippe Laulheret14:00 ~ 14:40
Proxying to Kernel : Manipulate Flow to Make Windows Kernel Great Again - angelboy15:10 ~ 15:50
Post AI - Vitaly16:10 ~ 16:50
Performing enterprise-wide DFIR and Threat Hunting with Yamato Security OSS tools - Akira Nishikawa, Fukusuke Takahashi, Zach Mathis13:00 ~ 13:40
Phishing-as-a-Service: The Underground Card Shop’s Arsenal against 3DSecure - Strawberry Donut14:00 ~ 14:40
A phish and a detection engineer walk into a bar… - Manabu Niseki, Wah Dekai15:10 ~ 15:50
Lessons Learned from a 4-Year Journey on Developing a Generic Fuzzing Framework - Akira Moroo, Ren Kimura16:10 ~ 16:50
全境擴散:從 Windows 11 到 libarchive 的深層威脅與全面影響 - NiNi13:00 ~ 13:40
Open RAN Vulnerabilities: Near-RT RIC and E2 Interface - Richard Lin14:00 ~ 14:40
使用語言模型與知識圖技術建構高可性度情報鏈:以分析資料外洩事件為例 - 陳勝舢, 洪幸里15:10 ~ 15:50
Exploiting overlooked vulnerability in Published work - An analysis of Realtek SoC SDK exploitation - Bronson11316:10 ~ 16:50
Sailing the Seven SEAs: Deep Dive into Polaris' Arsenal and Intelligence Insights - Still Hsu11:00 ~ 12:20
手把手教你重現 DeFi Exploit 與偵測攻擊事件 - Seal Cao13:00 ~ 15:00
cheeto_lock.jpg. Look how I use your lock to enter your house - Pwning AD with AD CS. - Jimmy Su10:10 ~ 11:00
25 YEARS OF ATTACKS AND DEFENSE - Saumil Shah11:20 ~ 12:00
Evasive attacks against AI-powered antivirus software - Yu Arai13:00 ~ 13:40
Background of those glitches in Zelda BoTW & ToTK - Yuda14:00 ~ 14:40
Pirates of The Nang Hai: Follow the Artifacts of Tropic Trooper, No One Knows - Yusuke Niwa, Suguru Ishimaru15:10 ~ 15:50
Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server! - Orange Tsai16:10 ~ 16:40
Lightning Talk11:20 ~ 12:00
你的雲端攝影機安全嗎? - 王凱慶, Weber Tsai13:00 ~ 13:40
Reverse engineering and hacking Ecovacs robots - the bad and the really bad - Dennis Giese, Braelynn14:00 ~ 14:40
From Surveillance to Espionage: Unraveling the Latest Strategies of the Kimsuky Group - Seongsu Park15:10 ~ 15:50
從零開始的資安防護:公民團體與 Helix 服務的合作之路 - Toomore Chiang11:20 ~ 12:00
穿梭於秘密通道:揭秘那些深藏在 VPN 的漏洞 - Zeze13:00 ~ 13:40
Breaking LLM Applications – Advances in Prompt Injection Exploitation - Johann Rehberger14:00 ~ 14:40
Clash, Burn, and Exploit: Manipulate Filters to Pwn kernelCTF - HexRabbit15:10 ~ 15:50
Breaking network crypto in almost every popular Chinese keyboard app - Jeffrey Knockel, Mona