HITCON 2020 作者: Hack Inn 时间: September 20, 2020 分类: 安全大会资料 访问: 4,363 次 ![logo](https://data.hackinn.com/ppt/HITCON2020/logo.png "logo") ### Day 1 #### 1、[Last orders at the House of Force](https://data.hackinn.com/ppt/HITCON2020/Day1/Last%20orders%20at%20the%20House%20of%20Force.pdf) #### 2、[A CTF-Stype Escape Journey on VMware Workstation](https://data.hackinn.com/ppt/HITCON2020/Day1/A%20CTF-Stype%20Escape%20Journey%20on%20VMware%20Workstation.pdf) #### 3、[A Million Boluses Discovery and Disclosure of Vulnerabilities in an Insulin Pump](https://data.hackinn.com/ppt/HITCON2020/Day1/A%20Million%20Boluses%20Discovery%20and%20Disclosure%20of%20Vulnerabilities%20in%20an%20Insulin%20Pump.pdf) #### 4、[Reversing In Wonderland:Neural Network Based Malware Detection Techniques](https://data.hackinn.com/ppt/HITCON2020/Day1/Reversing%20In%20Wonderland:Neural%20Network%20Based%20Malware%20Detection%20Techniques.pdf) #### 5、[APT Chimera - Operation targets Semiconductor Vendors](https://data.hackinn.com/ppt/HITCON2020/Day1/APT%20Chimera%20-%20Operation%20targets%20Semiconductor%20Vendors.pdf) #### 6、[Discover vulnerabilities with CodeQL](https://data.hackinn.com/ppt/HITCON2020/Day1/Discover%20vulnerabilities%20with%20CodeQL.pdf) ### Day 2 ### 1、[Head First CVE](https://data.hackinn.com/ppt/HITCON2020/Day2/Head%20First%20CVE.pdf) #### 2、[Breaking Samsung's Root of Trust:Exploiting Samsung S10 Secure Boot](https://data.hackinn.com/ppt/HITCON2020/Day2/Breaking%20Samsung's%20Root%20of%20Trust:Exploiting%20Samsung%20S10%20Secure%20Boot.pdf) #### 3、[How I Hacked Facebook Again!](https://data.hackinn.com/ppt/HITCON2020/Day2/How%20I%20Hacked%20Facebook%20Again!.pdf) #### 4、[The Great Hotel Hack:Adventures in attacking hospitality industry ](https://data.hackinn.com/ppt/HITCON2020/Day2/The%20Great%20Hotel%20Hack:Adventures%20in%20attacking%20hospitality%20industry%20.pdf) #### 5、[My journey on SMBGhost](https://data.hackinn.com/ppt/HITCON2020/Day2/My%20journey%20on%20SMBGhost.pdf) #### 6、[Exploit(Almost)All Xiaomi Routers Using Logical Bugs](https://data.hackinn.com/ppt/HITCON2020/Day2/Exploit(Almost)All%20Xiaomi%20Routers%20Using%20Logical%20Bugs.pdf) #### 7、[你的資安策略夠明確嗎?透過框架優先緩解真實威脅](https://data.hackinn.com/ppt/HITCON2020/Day2/你的資安策略夠明確嗎?透過框架優先緩解真實威脅.pdf) #### 8、[First step in the quest for manufacturing cyber-resilient IoT devices](https://data.hackinn.com/ppt/HITCON2020/Day2/First%20step%20in%20the%20quest%20for%20manufacturing%20cyber-resilient%20IoT%20devices.pdf) #### 9、[LEAYA:Last Exploitation 絢 - An Embedded System Detection and Response ×](https://data.hackinn.com/ppt/HITCON2020/Day2/LEAYA:Last%20Exploitation%20絢%20-%20An%20Embedded%20System%20Detection%20and%20Response%20×.pdf) #### 10、[From LNK to RCE:Finding bugs in Windows Shell Link Parser](https://data.hackinn.com/ppt/HITCON2020/Day2/From%20LNK%20to%20RCE:Finding%20bugs%20in%20Windows%20Shell%20Link%20Parser.pdf) ## 嘿嘿嘿 #### Last orders at the House of Force #### A CTF-Stype Escape Journey on VMware Workstation #### APT Chimera - Operation targets Semiconductor Vendors #### Breaking Samsung's Root of Trust:Exploiting Samsung S10 Secure Boot #### LEAYA:Last Exploitation 絢 - An Embedded System Detection and Response × > 大会传送门:https://hitcon.org/2020/ 本网站只收集整理公开资料,对文章内容概不负责,浏览时请遵守您所在地区的法律法规,若有任何问题请立即联系我们或者在下方留言!! 标签: none