BlueHat Shanghai 2019 作者: Hack Inn 时间: July 14, 2019 分类: 安全大会资料 访问: 2,654 次 ![logo](https://data.hackinn.com/ppt/BlueHatShanghai2019/logo.png "logo") > 在过去的十五年间,微软安全应急响应中心(MSRC)在微软北美总部和以色列举办了多届 BlueHat 安全大会。这次我们选择将 BlueHat 安全大会带到新的一站,希望可以为中国的安全专家和白帽子带来最精彩和最前沿的技术干货以及创造一个有趣的技术交流环境。 ## 中文版本 ### Day 1 #### 1、[欢迎参加 BlueHat Shanghai](https://data.hackinn.com/ppt/BlueHatShanghai2019/CN/Day1/欢迎参加%20BlueHat%20Shanghai.pdf) #### 2、[微软威胁防护的机器学习进展](https://data.hackinn.com/ppt/BlueHatShanghai2019/CN/Day1/微软威胁防护的机器学习进展.pdf) #### 3、[我的容器安全吗?有关容器漏洞的研究](https://data.hackinn.com/ppt/BlueHatShanghai2019/CN/Day1/我的容器安全吗?有关容器漏洞的研究.pdf) #### 4、[数据挖掘赋能安全感知:阿里云大数据入侵检测实践](https://data.hackinn.com/ppt/BlueHatShanghai2019/CN/Day1/数据挖掘赋能安全感知:阿里云大数据入侵检测实践.pdf) #### 5、[信誉危机:广受认可的硬件和软件遭遇信任危机](https://data.hackinn.com/ppt/BlueHatShanghai2019/CN/Day1/信誉危机:广受认可的硬件和软件遭遇信任危机.pdf) #### 6、[MesaTEE SGX:借助 Intel SGX 重新定义人工智能和大数据分析](https://data.hackinn.com/ppt/BlueHatShanghai2019/CN/Day1/MesaTEE%20SGX:借助%20Intel%20SGX%20重新定义人工智能和大数据分析.pdf) #### 7、[Liar Game:The Secret of Mitigation Bypass Techniques](https://data.hackinn.com/ppt/BlueHatShanghai2019/CN/Day1/Liar%20Game:The%20Secret%20of%20Mitigation%20Bypass%20Techniques.pdf) #### 8、[From Dvr to See Exploit of IoT Device](https://data.hackinn.com/ppt/BlueHatShanghai2019/CN/Day1/From%20Dvr%20to%20See%20Exploit%20of%20IoT%20Device.pdf) #### 9、[Kubernetes集群渗透:攻击者视角中的Kubernetes](https://data.hackinn.com/ppt/BlueHatShanghai2019/CN/Day1/Kubernetes集群渗透:攻击者视角中的Kubernetes.pdf) ### Day 2 #### 1、[Exploring The Maze Of Memory Layouts Towards Exploits](https://data.hackinn.com/ppt/BlueHatShanghai2019/CN/Day2/Exploring%20The%20Maze%20Of%20Memory%20Layouts%20Towards%20Exploits.pdf) #### 2、[使用数据流敏感模糊测试发现漏洞](https://data.hackinn.com/ppt/BlueHatShanghai2019/CN/Day2/使用数据流敏感模糊测试发现漏洞.pdf) #### 3、[不断增强的 Windows 安全性](https://data.hackinn.com/ppt/BlueHatShanghai2019/CN/Day2/不断增强的%20Windows%20安全性.pdf) #### 4、[如何在3个月发现12个内核信息泄露漏洞](https://data.hackinn.com/ppt/BlueHatShanghai2019/CN/Day2/如何在3个月发现12个内核信息泄露漏洞.pdf) #### 5、[基于历史行为的异常检测:O365怎样反击内部恶意攻击](https://data.hackinn.com/ppt/BlueHatShanghai2019/CN/Day2/基于历史行为的异常检测:O365怎样反击内部恶意攻击.pdf) #### 6、[大海捞针:使用沙箱捕获多个零日漏洞](https://data.hackinn.com/ppt/BlueHatShanghai2019/CN/Day2/大海捞针:使用沙箱捕获多个零日漏洞.pdf) #### 7、[Momigari:最新的Windows操作系统内核在野漏洞概述](https://data.hackinn.com/ppt/BlueHatShanghai2019/CN/Day2/Momigari:最新的Windows操作系统内核在野漏洞概述.pdf) #### 8、[2018年浏览器脚本引擎零日漏洞](https://data.hackinn.com/ppt/BlueHatShanghai2019/CN/Day2/2018年浏览器脚本引擎零日漏洞.pdf) #### 9、[针对智能设备漏洞挖掘的一些新方法](https://data.hackinn.com/ppt/BlueHatShanghai2019/CN/Day2/针对智能设备漏洞挖掘的一些新方法.pdf) ## English Version ### Day 1 #### 1、[Welcome to BlueHat Shanghai](https://data.hackinn.com/ppt/BlueHatShanghai2019/EN/Day1/Welcome%20to%20BlueHat%20Shanghai.pdf) #### 2、[Liar Game:The Secret of Mitigation Bypass Techniques](https://data.hackinn.com/ppt/BlueHatShanghai2019/EN/Day1/Liar%20Game:The%20Secret%20of%20Mitigation%20Bypass%20Techniques.pdf) #### 3、[Enhance Security Awareness with Data Mining:Data-driven Intrusion Detection Solutions in Alibaba Cloud](https://data.hackinn.com/ppt/BlueHatShanghai2019/EN/Day1/Enhance%20Security%20Awareness%20with%20Data%20Mining:Data-driven%20Intrusion%20Detection%20Solutions%20in%20Alibaba%20Cloud.pdf) #### 4、[From Dvr to See Exploit of IoT Device](https://data.hackinn.com/ppt/BlueHatShanghai2019/EN/Day1/From%20Dvr%20to%20See%20Exploit%20of%20IoT%20Device.pdf) #### 5、[Is my Container Secure?Study of Vulnerability in Container World](https://data.hackinn.com/ppt/BlueHatShanghai2019/EN/Day1/Is%20my%20Container%20Secure?Study%20of%20Vulnerability%20in%20Container%20World.pdf) #### 6、[MesaTEE SGX:Redefining AI and Big Data Analysis with Intel SGX](https://data.hackinn.com/ppt/BlueHatShanghai2019/EN/Day1/MesaTEE%20SGX:Redefining%20AI%20and%20Big%20Data%20Analysis%20with%20Intel%20SGX.pdf) #### 7、[Infiltrate Your Kubernetes Cluster:Kubernetes in Attacker View](https://data.hackinn.com/ppt/BlueHatShanghai2019/EN/Day1/Infiltrate%20Your%20Kubernetes%20Cluster:Kubernetes%20in%20Attacker%20View.pdf) #### 8、[Betrayal of Reputation:Trusting the Untrustable Hardware and Software with Reputation](https://data.hackinn.com/ppt/BlueHatShanghai2019/EN/Day1/Betrayal%20of%20Reputation:Trusting%20the%20Untrustable%20Hardware%20and%20Software%20with%20Reputation.pdf) #### 9、[Advances in Machine Learning at Microsoft Threat Protection](https://data.hackinn.com/ppt/BlueHatShanghai2019/EN/Day1/Advances%20in%20Machine%20Learning%20at%20Microsoft%20Threat%20Protection.pdf) ### Day 2 #### 1、[Exploring The Maze Of Memory Layouts Towards Exploits](https://data.hackinn.com/ppt/BlueHatShanghai2019/EN/Day2/Exploring%20The%20Maze%20Of%20Memory%20Layouts%20Towards%20Exploits.pdf) #### 2、[Advancing Windows Security](https://data.hackinn.com/ppt/BlueHatShanghai2019/EN/Day2/Advancing%20Windows%20Security.pdf) #### 3、[Needle in A Haystack:Catch Multiple Zero-days Using Sandbox](https://data.hackinn.com/ppt/BlueHatShanghai2019/EN/Day2/Needle%20in%20A%20Haystack:Catch%20Multiple%20Zero-days%20Using%20Sandbox.pdf) #### 4、[Discovering Vulnerabilities with Data Flow Sensitive Fuzzing](https://data.hackinn.com/ppt/BlueHatShanghai2019/EN/Day2/Discovering%20Vulnerabilities%20with%20Data%20Flow%20Sensitive%20Fuzzing.pdf) #### 5、[New Techniques for Discovering Smart Device Vulnerabilities](https://data.hackinn.com/ppt/BlueHatShanghai2019/EN/Day2/New%20Techniques%20for%20Discovering%20Smart%20Device%20Vulnerabilities.pdf) #### 6、[Browser Script Engine Zero Days in 2018](https://data.hackinn.com/ppt/BlueHatShanghai2019/EN/Day2/Browser%20Script%20Engine%20Zero%20Days%20in%202018.pdf) #### 7、[Momigari:Overview of the latest Windows OS kernel exploits found in the wild](https://data.hackinn.com/ppt/BlueHatShanghai2019/EN/Day2/Momigari:Overview%20of%20the%20latest%20Windows%20OS%20kernel%20exploits%20found%20in%20the%20wild.pdf) #### 8、[User Profile Based Anomaly Detection:Fighting Malicious Insider Threat at Office365](https://data.hackinn.com/ppt/BlueHatShanghai2019/EN/Day2/User%20Profile%20Based%20Anomaly%20Detection:Fighting%20Malicious%20Insider%20Threat%20at%20Office365.pdf) #### 9、[How to Find 12 Kernel Information Disclosure Vulnerabilities in 3 Months](https://data.hackinn.com/ppt/BlueHatShanghai2019/EN/Day2/How%20to%20Find%2012%20Kernel%20Information%20Disclosure%20Vulnerabilities%20in%203%20Months.pdf) `大会官网:https://www.microsoft.com/china/bluehatshanghai/2019/ 若有任何问题请联系我们,谢谢` 标签: none