BlueHat IL 2019 作者: Hack Inn 时间: March 6, 2019 分类: 安全大会资料 访问: 1,626 次  > 这是一个有别于BlackHat、WhiteHat等的~~帽子~~会议:“BlueHat”,主办方为“Microsoft”。 #### 1、[Hardening Secure Boot on Embedded Devices for Hostile Environments](https://data.hackinn.com/ppt/BlueHatIL2019/Hardening%20Secure%20Boot%20on%20Embedded%20Devices%20for%20Hostile%20Environments.pdf) #### 2、[Trends, Challenges, and Strategic Shifts in the Software Vulnerability Mitigation Landscape](https://data.hackinn.com/ppt/BlueHatIL2019/Trends,%20Challenges,%20and%20Strategic%20Shifts%20in%20the%20Software%20Vulnerability%20Mitigation%20Landscape.pdf) #### 3、[PE-sieve:An Open-Source Process Scanner for Hunting and Unpacking Malware](https://data.hackinn.com/ppt/BlueHatIL2019/PE-sieve:An%20Open-Source%20Process%20Scanner%20for%20Hunting%20and%20Unpacking%20Malware.pdf) #### 4、[Bridging Emulation and the Real World with the Nintendo Game Boy](https://data.hackinn.com/ppt/BlueHatIL2019/Bridging%20Emulation%20and%20the%20Real%20World%20with%20the%20Nintendo%20Game%20Boy.pdf) #### 5、[Make Static Instrumentation Great Again:High Performance Fuzzing for Windows System](https://data.hackinn.com/ppt/BlueHatIL2019/Make%20Static%20Instrumentation%20Great%20Again:High%20Performance%20Fuzzing%20for%20Windows%20System.pdf) #### 6、[Transmogrifying Other People's Marketing into Threat Hunting Treasures Using Machine Learning Magic](https://data.hackinn.com/ppt/BlueHatIL2019/Transmogrifying%20Other%20People's%20Marketing%20into%20Threat%20Hunting%20Treasures%20Using%20Machine%20Learning%20Magic.pdf) #### 7、[Supply Chain Security:"If I were a Nation State..."](https://data.hackinn.com/ppt/BlueHatIL2019/Supply%20Chain%20Security:"If%20I%20were%20a%20Nation%20State...".pdf) #### 8、[No Code No Crime:UPnP as an Off-the-Shelf Attacker's Toolkit](https://data.hackinn.com/ppt/BlueHatIL2019/No%20Code%20No%20Crime:UPnP%20as%20an%20Off-the-Shelf%20Attacker's%20Toolkit.pdf) #### 9、[You (dis)liked mimikatz Wait for kekeo](https://data.hackinn.com/ppt/BlueHatIL2019/You%20%28dis%29liked%20mimikatz%20Wait%20for%20kekeo.pdf) #### 10、[Practical Uses for Hardware-assisted Memory Visualization](https://data.hackinn.com/ppt/BlueHatIL2019/Practical%20Uses%20for%20Hardware-assisted%20Memory%20Visualization.pdf) #### 11、[The AMDFlaws Story Technical Deep Dive](https://data.hackinn.com/ppt/BlueHatIL2019/The%20AMDFlaws%20Story%20Technical%20Deep%20Dive.pdf) #### 12、[Attacking Edge Through the JavaScript Just-In-Time Compiler](https://data.hackinn.com/ppt/BlueHatIL2019/Attacking%20Edge%20Through%20the%20JavaScript%20Just-In-Time%20Compiler.pdf) #### 13、[Who is Watching the Watchdog Uncovering a Privilege Escalation Vulnerability in OEM Driver](https://data.hackinn.com/ppt/BlueHatIL2019/Who%20is%20Watching%20the%20Watchdog%20Uncovering%20a%20Privilege%20Escalation%20Vulnerability%20in%20OEM%20Driver.pdf) ## 噔噔噔噔 (XP ~~_cmdshell~~) #### Trends, Challenges, and Strategic Shifts in the Software Vulnerability Mitigation Landscape #### PE-sieve:An Open-Source Process Scanner for Hunting and Unpacking Malware #### Bridging Emulation and the Real World with the Nintendo Game Boy #### Make Static Instrumentation Great Again:High Performance Fuzzing for Windows System #### Transmogrifying Other People's Marketing into Threat Hunting Treasures Using Machine Learning Magic #### No Code No Crime:UPnP as an Off-the-Shelf Attacker's Toolkit #### Practical Uses for Hardware-assisted Memory Visualization #### Attacking Edge Through the JavaScript Just-In-Time Compiler #### You (dis)liked mimikatz Wait for kekeo #### Who is Watching the Watchdog Uncovering a Privilege Escalation Vulnerability in OEM Driver `版权归Microsoft和演讲者所有,若有问题请联系:admin&&hackinn.com` > `于2019.4.29第一次补充更新` `于2019.6.28第二次补充更新` 标签: none