HITB SecConf 2018 (Dubai) 作者: Hack Inn 时间: December 2, 2018 分类: 安全大会资料 访问: 1,560 次 ### Day 1 #### 1、[Virtualizing IoT With Code Coverage Guided Fuzzing](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/Virtualizing%20IoT%20With%20Code%20Coverage%20Guided%20Fuzzing.pdf) #### 2、[Hacking the 0day Market](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/Hacking%20the%200day%20Market.pdf) #### 3、[Creating Custom Browser Extensions to Hunt Low Hanging Fruits](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/Creating%20Custom%20Browser%20Extensions%20to%20Hunt%20Low%20Hanging%20Fruits.pdf) #### 4、[Cyber Security of the Future](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/Cyber%20Security%20of%20the%20Future.pdf) #### 5、[The Phantom Menace- Intel ME Manufacturing Mode](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/The%20Phantom%20Menace-%20Intel%20ME%20Manufacturing%20Mode.pdf) #### 6、[Cloudy With a Chance of Messages](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/Cloudy%20With%20a%20Chance%20of%20Messages.pdf) #### 7、[Crouching Tiger Sudden Keynote](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/Crouching%20Tiger%20Sudden%20Keynote.pdf) #### 8、[IPv666 – Address of the Beast](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/IPv666%20%E2%80%93%20Address%20of%20the%20Beast.pdf) #### 9、[AI Model Security - Reverse Engineering Machine Learning Models](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/AI Model Security - Reverse Engineering Machine Learning Models.pdf) #### 10、[Gold Digging - Discovering Hidden Gems in APKs](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/Gold Digging - Discovering Hidden Gems in APKs.pdf) #### 11、[Taking Over Telecom Networks](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/Taking Over Telecom Networks.pdf) #### 12、[Rooting Routers Using Symbolic Execution](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/Rooting Routers Using Symbolic Execution.pdf) #### 13、[Hunting for Backdoors in IoT Firmware at Unprecedented Scale](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/Hunting for Backdoors in IoT Firmware at Unprecedented Scale.pdf) #### 14、[A Multidimensional Hardware Attack and Defense Tool Set](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/A Multidimensional Hardware Attack and Defense Tool Set.pdf) #### 15、[Infecting Files On The Fly](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/Infecting Files On The Fly.pdf) #### 16、[Hacking into Broadband and Broadcast TV Systems](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/Hacking into Broadband and Broadcast TV Systems.pdf) #### 17、[Hacking Yachts Remotely - IoT Hacking at Sea](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/Hacking Yachts Remotely - IoT Hacking at Sea.pdf) #### 18、[Building Security Beyond The Genesis Block](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/Building Security Beyond The Genesis Block.pdf) #### 19、[IoT Woodpecker - Intrusion-Detection On The Hardware Bus](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/IoT Woodpecker - Intrusion-Detection On The Hardware Bus.pdf) #### 20、[Hacking Telephone Systems for Fun and Profit](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/Hacking Telephone Systems for Fun and Profit.pdf) #### 21、[System-level Threats - Dangerous Assumptions in Modern Product Security](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/System-level Threats - Dangerous Assumptions in Modern Product Security.pdf) #### 22、[Building Your Own Self Driving, Self Racing Car](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/Building Your Own Self Driving, Self Racing Car.pdf) #### 23、[Blockchain - The New Line of Defense](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/Blockchain - The New Line of Defense.pdf) #### 24、[Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding](https://data.hackinn.com/ppt/HITB2018DUBAI/day1/Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding.pdf) ### Day2 #### 1、[My Experience of Running CTF Competitions in 7 Arab Countries](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/My Experience of Running CTF Competitions in 7 Arab Countries.pdf) #### 2、[Evolution of Security Threats to Telecommunications Infrastructures](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/Evolution of Security Threats to Telecommunications Infrastructures.pdf) #### 3、[A Secured and Robust Wireless Communication System for Low-Latency Applications](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/A Secured and Robust Wireless Communication System for Low-Latency Applications.pdf) #### 4、[HWallet - The Simple Cryptocurrency Hardware Wallet](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/HWallet - The Simple Cryptocurrency Hardware Wallet.pdf) #### 5、[Hunting Threats in Your Enterprise](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/Hunting Threats in Your Enterprise.pdf) #### 6、[Capture This - Real Time Packet Processing with FPGAs](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/Capture This - Real Time Packet Processing with FPGAs.pdf) #### 7、[Using Machine-Learning to Investigate Web Campaigns at Large](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/Using Machine-Learning to Investigate Web Campaigns at Large.pdf) #### 8、[Offensive Memory Forensics](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/Offensive Memory Forensics.pdf) #### 9、[Women in Cybersecurity](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/Women in Cybersecurity.pdf) #### 10、[It WISN’t Me - Attacking Industrial Wireless Mesh Networks](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/It WISN’t Me - Attacking Industrial Wireless Mesh Networks.pdf) #### 11、[GLitch Chronicles - Turning WebGL Into A Hammer](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/GLitch Chronicles - Turning WebGL Into A Hammer.pdf) #### 12、[DHCP is Hard](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/DHCP is Hard.pdf) #### 13、[Growth Hacking Your Community](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/Growth Hacking Your Community.pdf) #### 14、[Horror On The Bus - Hacking COMBUS](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/Horror On The Bus - Hacking COMBUS.pdf) #### 15、[Back On The Chain Gang - Blockchain, Public Chain and Contract Security](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/Back On The Chain Gang - Blockchain, Public Chain and Contract Security.pdf) #### 16、[Vote of No Confidence - Second Factor Correctness](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/Vote of No Confidence - Second Factor Correctness.pdf) #### 17、[NTLM Relay Is Dead Long Live NTLM Relay](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/NTLM Relay Is Dead Long Live NTLM Relay.pdf) #### 18、[Hacking the International RFQ Process](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/Hacking the International RFQ Process.pdf) #### 19、[Improved Blockchain Infrastructure with IoT](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/Improved Blockchain Infrastructure with IoT.pdf) #### 20、[Cyber Arms Race](https://data.hackinn.com/ppt/HITB2018DUBAI/day2/Cyber Arms Race.pdf) > 大会传送门:[https://conference.hitb.org/hitbsecconf2018dxb](https://conference.hitb.org/hitbsecconf2018dxb "https://conference.hitb.org/hitbsecconf2018dxb") 若有版权问题请和我站联系 标签: none