owned this note
owned this note
Published
Linked with GitHub
# HITCON 2020 共筆文件 Collaborative Notes
- [歡迎來到 HITCON 2020](/@HITCON/Skz0WY7ED)
- [HITCON 官方網站](https://hitcon.org/2020/) [target=_blank]
# Day 1
## 國際會議廳
- 10:00 ~ 10:50 [Industrial Cybersecurity Landscape in 2020: Trends, Challenges, and Opportunities - 劉榮太](/@HITCON/rylDRO74w)
- 11:00 ~ 11:50 [[ HITCON 論壇 ]
金融業如何迎擊數位戰場的第一道烽火 - 翁浩正, 蔡福隆 處長, 郭建中 董事長, 蘇清偉 資安長, 劉培文 執行副總經理](/@HITCON/SJmDAO74v)
- 13:00 ~ 13:50 [[ HITCON 論壇 ]
主動式資安防禦策略,解決 OT 資安相依性風險 - 毛敬豪 所長, 劉榮太 執行長, 鄭嘉信 執行長, 楊瑞祥 技術長](/@HITCON/B1sD0d7Nv)
- 14:00 ~ 14:50 [[ HITCON 論壇 ]
如何兼顧疫情控制與隱私保護 - 李柏峰 OCF, 簡宏偉 處長, 龐一鳴 處長, 劉宇倫 醫師, Sherry Chung MyData Taiwan](/@HITCON/r1yO0OQNP)
- 15:30 ~ 16:20 [[ HITCON 論壇 ]
疫情後資安人才培育的挑戰與契機 - Alan Lee, Tzong-Chen Wu, Seungjoo Kim, Kana Shinoda, Yan Shoshitaishvili](/@HITCON/r18_CuXEw)
- 16:30 ~ 17:20 [[ HITCON 論壇 ]
人工智慧能否為人類指引網路攻防的基石? - 陳仲寬, 邱銘彰, 陳品諭 博士](/@HITCON/B10u0d7VP)
## 第一會議廳
- 11:00 ~ 11:50 [通訊網路安全研究,從 GSM 到 5G NR - 劉作仁, 楊承穎](/@HITCON/rkBwR_QVv)
- 13:00 ~ 13:50 [APT Chimera - Operation targets Semiconductor Vendors - 陳仲寬, Inndy Lin, JohnThunder](/@HITCON/SyavAu7Ev)
- 14:00 ~ 14:50 [Discover vulnerabilities with CodeQL - Boik Su](/@HITCON/rkWuAuXNw)
- 15:30 ~ 16:20 [Reversing In Wonderland: Neural Network Based Malware Detection Techniques - Sheng-Hao Ma, Shin-Ming Cheng](/@HITCON/S1OORO7VP)
## 第二會議廳
- 11:00 ~ 11:50 [TBA - 陳立中](/@HITCON/rkvPROQVD)
- 14:00 ~ 14:50 [網軍內網滲透之奇技淫巧 (Operation: I am Tom) - zha0, Tom, Aragorn](/@HITCON/SJEu0dQ4w)
- 15:30 ~ 16:20 [Tropic Trooper’s Back: USBferry Attack Targets Air-gapped Environments - Joey Chen](/@HITCON/Hk5ORuQ4v)
## 遠距會議室
- 11:00 ~ 11:50 [A Million Boluses: Discovery and Disclosure of Vulnerabilities in an Insulin Pump - Julian Suleder](/@HITCON/S1Kv0dmED)
- 15:30 ~ 16:20 [Last orders at the House of Force - Kevin Backhouse](/@HITCON/HJ3OCOQNP)
- 16:30 ~ 17:20 [A CTF-Style Escape Journey on VMware Workstation - Yanyu Zhang](/@HITCON/rJlKCu74v)
# Day 2
## 國際會議廳
- 09:20 ~ 10:10 [Breaking Samsung's Root of Trust: Exploiting Samsung S10 Secure Boot - Cheng-Yu Chao](/@HITCON/H1SYCOX4P)
- 10:20 ~ 11:10 [From LNK to RCE: Finding bugs in Windows Shell Link Parser - Lays](/@HITCON/HyTY0umVw)
- 13:50 ~ 14:40 [Development of Signaling Spoofing Attacks Using Function Containerization of Rogue Base Stations - Shin-Ming Cheng, Bing-Kai Hong](/@HITCON/ryh5A_7VD)
- 14:50 ~ 15:40 [How I Hacked Facebook Again! - Orange Tsai](/@HITCON/HkGi0dQVP)
- 16:20 ~ 17:10 [Post-Quantum Cryptography - Daniel J. Bernstein, Tanja Lange](/@HITCON/SJKjAd7NP)
- 17:10 ~ 18:10 [Lightning Talk / 閉幕 / 花絮與展望 HITCON 2021 ](/@HITCON/SJsi0dmNv)
## 第一會議廳
- 09:20 ~ 10:10 [從近期 DDoS 巨量攻擊解析 IoT/DVR 侵駭手法與因應之道 - 邱品仁, 蔡振華, 李樸](/@HITCON/ByPFCuXVw)
- 10:20 ~ 11:10 [Head First CVE - Ken Lee](/@HITCON/By1q0OQ4P)
- 11:20 ~ 12:10 [你的資安策略夠明確嗎?透過框架優先緩解真實威脅 - 翁浩正, 鍾澤華](/@HITCON/rJI90uQVv)
- 13:50 ~ 14:40 [My journey on SMBGhost - Angelboy](/@HITCON/HkC9Adm4v)
## 第二會議廳
- 09:20 ~ 10:10 [晶片卡 Agent 逆向工程與重製:以健保卡為例 - Inndy Lin](/@HITCON/H1FFRdXNP)
- 10:20 ~ 11:10 [Potential Security and Privacy Issues in Novel Taiwanese National eID system - 何明洋 ](/@HITCON/HJWc0uQVv)
- 11:20 ~ 12:10 [LEAYA: Last Exploitation 絢 - An Embedded System Detection and Response - cp, zet, freetsubasa](/@HITCON/BkO9RuXEw)
- 14:50 ~ 15:40 [Bug Bounty X Router X IP Cam X 電子支付](/@HITCON/Hy4jCOmVw)
## 遠距會議室
- 09:20 ~ 10:10 [Bug hunting from zero to 0(day) to ($)0 - Anthony Lai, Byron Wai, Ken Wong](/@HITCON/SJoKR_XNw)
- 10:20 ~ 11:10 [First step in the quest for manufacturing cyber-resilient IoT devices - Jun Sato, 張智翔](/@HITCON/BkXc0_X4P)
- 11:20 ~ 12:10 [Exploit (Almost) All Xiaomi Routers Using Logical Bugs - Aobo Wang, Jihong Zheng](/@HITCON/HJ95ROXND)
- 13:50 ~ 14:40 [Guarding the Factory Floor: Catching Insecure Industrial Robot Programs - Federico Maggi, Davide Quarta, Marcello Pogliani, Stefano Zanero, Marco Balduzzi](/@HITCON/SyliCuQND)
- 14:50 ~ 15:40 [The Great Hotel Hack: Adventures in attacking hospitality industry - Etizaz Mohsin](/@HITCON/BkwsAum4P)
###### tags: `HITCON2020`,`HITCON`