POC 2019 (Korea) 作者: Hack Inn 时间: December 8, 2019 分类: 安全大会资料 访问: 2,313 次 #### 1、[Checking Defects in Deep Learning AI Models](https://data.hackinn.com/ppt/POC2019/Checking%20Defects%20in%20Deep%20Learning%20AI%20Models.pdf) #### 2、[Bug Hunting in Synology NAS](https://data.hackinn.com/ppt/POC2019/Bug%20Hunting%20in%20Synology%20NAS.pdf) #### 3、[Chrome Exploitation](https://data.hackinn.com/ppt/POC2019/Chrome%20Exploitation.pdf) #### 4、[The One Weird Trick SecureROM Hates](https://data.hackinn.com/ppt/POC2019/The%20One%20Weird%20Trick%20SecureROM%20Hates.pdf) #### 5、[Revery:from POC to EXP](https://data.hackinn.com/ppt/POC2019/Revery:from%20POC%20to%20EXP.pdf) #### 6、[Inside Hidden Cobra Cyber Offensive Programs](https://data.hackinn.com/ppt/POC2019/Inside%20Hidden%20Cobra%20Cyber%20Offensive%20Programs.pdf) #### 7、[Reimplementing Local RPC in .NET](https://data.hackinn.com/ppt/POC2019/Reimplementing%20Local%20RPC%20in%20.NET.pdf) #### 8、[Exploiting IOSurface 0](https://data.hackinn.com/ppt/POC2019/Exploiting%20IOSurface%200.pdf) #### 9、[Using Fault Injection for Turning Data Transfers into Arbitrary Execution](https://data.hackinn.com/ppt/POC2019/Using%20Fault%20Injection%20for%20Turning%20Data%20Transfers%20into%20Arbitrary%20Execution.pdf) #### 10、[Machine learning implementation security in the wild](https://data.hackinn.com/ppt/POC2019/Machine%20learning%20implementation%20security%20in%20the%20wild.pdf) #### 11、[Attacking Hyper-V](https://data.hackinn.com/ppt/POC2019/Attacking%20Hyper-V.pdf) #### 12、[Threat From The Satellite](https://data.hackinn.com/ppt/POC2019/Threat%20From%20The%20Satellite.pdf) #### 13、[Safari Adventure:A Dive into Apple Browser Internals](https://data.hackinn.com/ppt/POC2019/Safari%20Adventure:A%20Dive%20into%20Apple%20Browser%20Internals.pdf) #### 14、[KNOX Kernel Mitigation Bypasses (New Reliable Android Kernel Root Exploitation Part #2)](https://data.hackinn.com/ppt/POC2019/KNOX%20Kernel%20Mitigation%20Bypasses%20%28New%20Reliable%20Android%20Kernel%20Root%20Exploitation%20Part%20%232%29.pdf) #### 15、[How CVE-2018-8611 can be exploited to achieve privilege escalation on Windows 10 1809 and earlier](https://data.hackinn.com/ppt/POC2019/How%20CVE-2018-8611%20can%20be%20exploited%20to%20achieve%20privilege%20escalation%20on%20Windows%2010%201809%20and%20earlier.pdf) ## 干脆在中国开好了 #### How CVE-2018-8611 can be exploited to achieve privilege escalation on Windows 10 1809 and earlier #### Reimplementing Local RPC in .NET #### Exploiting IOSurface 0 #### Attacking Hyper-V #### Threat From The Satellite #### KNOX Kernel Mitigation Bypasses (New Reliable Android Kernel Root Exploitation Part #2) `会议地址:http://powerofcommunity.net/,若有版权问题请在下方留言或者给我发送邮件` 标签: none