2018京东HITB安全峰会 作者: Hack Inn 时间: November 13, 2018 分类: 安全大会资料 访问: 1,805 次  #### 1、[Apple iOS UI Access Permission Vulnerabilities](https://data.hackinn.com/ppt/2018%E4%BA%AC%E4%B8%9CHITB%E5%AE%89%E5%85%A8%E5%B3%B0%E4%BC%9A/D1T2%20-%20Apple%20iOS%20UI%20Access%20Permission%20Vulnerabilities%20-%20Benjamin%20Kunz%20Mejri.pdf) #### 2、[Social Media Mining for Threat Intelligence](https://data.hackinn.com/ppt/2018%E4%BA%AC%E4%B8%9CHITB%E5%AE%89%E5%85%A8%E5%B3%B0%E4%BC%9A/D2T1%20-%20Social%20Media%20Mining%20for%20Threat%20Intelligence%20-%20Fyodor%20Yarochkin.pdf) #### 3、[Dissecting a Cloud-Connected E-Scooter](https://data.hackinn.com/ppt/2018%E4%BA%AC%E4%B8%9CHITB%E5%AE%89%E5%85%A8%E5%B3%B0%E4%BC%9A/D2T1%20-%20Dissecting%20a%20Cloud-Connected%20E-Scooter%20-%20Nikias%20Bassen.pdf) #### 4、[Offensive Memory Forensics](https://data.hackinn.com/ppt/2018%E4%BA%AC%E4%B8%9CHITB%E5%AE%89%E5%85%A8%E5%B3%B0%E4%BC%9A/D1T1%20-%20Offensive%20Memory%20Forensics%20-%20Hugo%20Teso.pdf) #### 5、[Make ARM Shellcode Great Again](https://data.hackinn.com/ppt/2018%E4%BA%AC%E4%B8%9CHITB%E5%AE%89%E5%85%A8%E5%B3%B0%E4%BC%9A/D2T1%20-%20Make%20ARM%20Shellcode%20Great%20Again%20-%20Saumil%20Shah.pdf) #### 6、[Applications of Open Source Hardware in Security Research](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D1 COMMSEC - Applications of Open Source Hardware in Security Research - Ma Liang.pdf) #### 7、[Hacking The 0day Market](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D2 COMMSEC - Hacking The 0day Market - Andrea Zapparoli Manzoni.pdf) #### 8、[Travel Hacking - Hotel Edition](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D1T2 - Travel Hacking - Hotel Edition - Hendrik Scholz.pdf) #### 9、[DTaint Driven Crash Analysis](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D2T2 - Taint Driven Crash Analysis - Richard Johnson.pdf) #### 10、[Multi ARCH Firmware Emulation](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D2T1 - Multi ARCH Firmware Emulation - Kaijern Lau.pdf) #### 11、[The Threats and Opportunities for Cyber Leaders](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D1T1 - Security 2020 - The Threats and Opportunities for Cyber Leaders - Eddie Schwartz.pdf) #### 12、[USB Armory - Past Present and Future](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D2T2 - USB Armory - Past Present and Future - Andrea Barisani.pdf) #### 13、[Some Experiments with Code Similarity](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D1T2 - Some Experiments with Code Similarity - Halvar Flake.pdf) #### 14、[Monitoring Massive Network Traffic using Bayesian Inference](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D2T2 - Monitoring Massive Network Traffic using Bayesian Inference - David Rodriguez.pdf) #### 15、[Using Machine Learning to Investigate Web Campaigns at Large](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D2T1 - Using Machine Learning to Investigate Web Campaigns at Large - Dr Marco Balduzzi.pdf) #### 16、[Finding 0days in Embedded Systems with Code Coverage Guided Fuzzing](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D2T1 - Finding 0days in Embedded Systems with Code Coverage Guided Fuzzing - Dr Quynh and Kai Jern Lau.pdf) #### 17、[Smart Nation Meets Privacy-Preserving Analytics](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D1 COMMSEC - Smart Nation Meets Privacy-Preserving Analytics - Sanjeev Solanki.pdf) #### 18、[How Your Smartphone Tracks Your Entire Life](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D2T2 - How Your Smartphone Tracks Your Entire Life - Vladimir Katalov.pdf) #### 19、[Telecoms - Generational Evolution of Attack Surfaces](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D1T2 - Telecoms - Generational Evolution of Attack Surfaces - Emmanuel Gadaix.pdf) #### 20、[Stop Laughing - Cyber Security Is Cool Now](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D1T1 - Stop Laughing - Cyber Security Is Cool Now - Adam Laurie.pdf) #### 21、[Expediting Exploitability Assessment Through an Exploitation Facilitation Framework](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D1 COMMSEC - Expediting Exploitability Assessment Through an Exploitation Facilitation Framework - Dr Xinyu Xing.pdf) #### 22、[Challenges and Practices of Local Differential Privacy in Real-World](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D1 COMMSEC - Challenges and Practices of Local Differential Privacy in Real-World - Pingchuan Ma.pdf) #### 23、[Gentlemen Start Your AIs - Self-Racing Cars](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D2 COMMSEC - Gentlemen Start Your AIs - Self-Racing Cars - Dhillon L33tdawg Kannabhiran.pdf) #### 24、[Solving The Last Mile Problem Between Machine Learning and Security Operations](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D2 COMMSEC - Solving The Last Mile Problem Between Machine Learning and Security Operations - Xiangyu Liu and Xinyue Shen.pdf) #### 25、[Hacking Robots](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D2T2 - Hacking Robots - Stefano Zanero.pdf) #### 26、[Bye Bye IMSI Catchers - Security Enhancements in 5g](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D2T2 - Bye Bye IMSI Catchers - Security Enhancements in 5g - Lin Huang.pdf) #### 27、[AI Powered Security and Securing AI](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D1 COMMSEC - AI Powered Security and Securing AI - Jimmy Su.pdf) #### 28、[Vulnerability Research - What It Takes to Keep Going and Going and Going](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D1T2 - Vulnerability Research - What It Takes to Keep Going and Going and Going - Fred Raynal.pdf) #### 29、[Application and Practice of Machine Learning in Anti-Malware](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D1 COMMSEC - Application and Practice of Machine Learning in Anti-Malware - Chao Ye.pdf) #### 30、[Modern Car Security](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D2T1 - Modern Car Security - Jun Li.pdf) #### 31、[Unconventional Vulnerabilities in Google Cloud Platform](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D1 COMMSEC - Unconventional Vulnerabilities in Google Cloud Platform - Venkatesh Sivakumar.pdf) #### 32、[Our Quantum Future](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D1T2 - Our Quantum Future - Jaya Baloo.pdf) #### 33、[Who Hijacked My Smart Home](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D1 COMMSEC - Who Hijacked My Smart Home - Han Zi Dong.pdf) #### 34、[Finding Vulnerabilities in a Closed Source Video Decoder Driver](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D1T1 - Finding Vulnerabilities in a Closed Source Video Decoder Driver - Adam Donenfeld.pdf) #### 35、[The Inner Workings of the Windows Runtime](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D1T2 - The Inner Workings of the Windows Runtime - James Forshaw.pdf) #### 36、[Attack Trees - Methodology and Application in Red Teaming Operations](https://data.hackinn.com/ppt/2018京东HITB安全峰会/D1T1 - Attack Trees - Methodology and Application in Red Teaming Operations - Matteo Beccaro.pdf) ➜ 考虑到~~没钱~~服务器网速承载原因,根据预览规则,此次资料不开放在线预览功能。 > 会议应该是有三天的,但是我没有找到相关的资料,所以将所有PPT放在了一起。 `版权归京东及演讲者所有,如有问题请联系admin「at」hackinn.com JD传送门:https://conference.hitb.org/hitbsecconf2018pek/zh/` 标签: none