BlackHat Asia 2022 作者: Hack Inn 时间: June 1, 2022 分类: 安全大会资料 访问: 17,739 次 ![logo](https://data.hackinn.com/ppt/BlackHatAsia2022/logo.png "logo") > 部分文档提供机翻版中文内容,由DeepL Pro翻译驱动支持 #### 1、[macOS Vulnerabilities Hiding in Plain Sight](https://data.hackinn.com/ppt/BlackHatAsia2022/en/macOS%20Vulnerabilities%20Hiding%20in%20Plain%20Sight.pdf) #### 2、[USMA:Share Kernel Code with Me](https://data.hackinn.com/ppt/BlackHatAsia2022/en/USMA:Share%20Kernel%20Code%20with%20Me.pdf) [[中文-ZH]](https://data.hackinn.com/ppt/BlackHatAsia2022/zh/USMA:Share%20Kernel%20Code%20with%20Me.pdf) #### 3、[The Little Seal Bug - Optical Sound Recovery from Lightweight Reflective Objects](https://data.hackinn.com/ppt/BlackHatAsia2022/en/The%20Little%20Seal%20Bug%20-%20Optical%20Sound%20Recovery%20from%20Lightweight%20Reflective%20Objects.pdf) [[中文-ZH]](https://data.hackinn.com/ppt/BlackHatAsia2022/zh/The%20Little%20Seal%20Bug%20-%20Optical%20Sound%20Recovery%20from%20Lightweight%20Reflective%20Objects.pdf) #### 4、[Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems](https://data.hackinn.com/ppt/BlackHatAsia2022/en/Non-Intrusive%20Vulnerability%20Localization%20and%20Hotpatching%20for%20Industrial%20Control%20Systems.pdf) [[中文-ZH]](https://data.hackinn.com/ppt/BlackHatAsia2022/zh/Non-Intrusive%20Vulnerability%20Localization%20and%20Hotpatching%20for%20Industrial%20Control%20Systems.pdf) #### 5、[The Next Generation of Windows Exploitation:Attacking the Common Log File System](https://data.hackinn.com/ppt/BlackHatAsia2022/en/The%20Next%20Generation%20of%20Windows%20Exploitation:Attacking%20the%20Common%20Log%20File%20System.pdf) [[中文-ZH]](https://data.hackinn.com/ppt/BlackHatAsia2022/zh/The%20Next%20Generation%20of%20Windows%20Exploitation:Attacking%20the%20Common%20Log%20File%20System.pdf) #### 6、[Dynamic Process Isolation](https://data.hackinn.com/ppt/BlackHatAsia2022/en/Dynamic%20Process%20Isolation.pdf) [[中文-ZH]](https://data.hackinn.com/ppt/BlackHatAsia2022/zh/Dynamic%20Process%20Isolation.pdf) #### 7、[Backdoor Investigation and Incident Response:From Zero to Profit](https://data.hackinn.com/ppt/BlackHatAsia2022/en/Backdoor%20Investigation%20and%20Incident%20Response:From%20Zero%20to%20Profit.pdf) [[中文-ZH]](https://data.hackinn.com/ppt/BlackHatAsia2022/zh/Backdoor%20Investigation%20and%20Incident%20Response:From%20Zero%20to%20Profit.pdf) #### 8、[Bypass CFG in Chrome](https://data.hackinn.com/ppt/BlackHatAsia2022/en/Bypass%20CFG%20in%20Chrome.pdf) [[中文-ZH]](https://data.hackinn.com/ppt/BlackHatAsia2022/zh/Bypass%20CFG%20in%20Chrome.pdf) #### 9、[ExplosION:The Hidden Mines in the Android ION Driver](https://data.hackinn.com/ppt/BlackHatAsia2022/en/ExplosION:The%20Hidden%20Mines%20in%20the%20Android%20ION%20Driver.pdf) [[中文-ZH]](https://data.hackinn.com/ppt/BlackHatAsia2022/zh/ExplosION:The%20Hidden%20Mines%20in%20the%20Android%20ION%20Driver.pdf) #### 10、[Start Arbitrary Activity App Components as the System User Vulnerability Affecting Samsung Android Devices](https://data.hackinn.com/ppt/BlackHatAsia2022/en/Start%20Arbitrary%20Activity%20App%20Components%20as%20the%20System%20User%20Vulnerability%20Affecting%20Samsung%20Android%20Devices.pdf) #### 11、[Taking Kernel Hardening to the Next Level](https://data.hackinn.com/ppt/BlackHatAsia2022/en/Taking%20Kernel%20Hardening%20to%20the%20Next%20Level.pdf) [[中文-ZH]](https://data.hackinn.com/ppt/BlackHatAsia2022/zh/Taking%20Kernel%20Hardening%20to%20the%20Next%20Level.pdf) #### 12、[The Hidden RCE Surfaces that Control the Droids](https://data.hackinn.com/ppt/BlackHatAsia2022/en/The%20Hidden%20RCE%20Surfaces%20that%20Control%20the%20Droids.pdf) [[中文-ZH]](https://data.hackinn.com/ppt/BlackHatAsia2022/zh/The%20Hidden%20RCE%20Surfaces%20that%20Control%20the%20Droids.pdf) #### 13、[The Virtual Battlefield in 2022:Russia-Ukraine War & Its Policy Implications](https://data.hackinn.com/ppt/BlackHatAsia2022/en/The%20Virtual%20Battlefield%20in%202022:Russia-Ukraine%20War%20&%20Its%20Policy%20Implications.pdf) #### 14、[SMS PVA Services Fueled by Compromised Supply-Chain Mobile Botnets](https://data.hackinn.com/ppt/BlackHatAsia2022/en/SMS%20PVA%20Services%20Fueled%20by%20Compromised%20Supply-Chain%20Mobile%20Botnets.pdf) #### 15、[To loot or Not to Loot? That Is Not a Question When State-Nexus APT Targets Online Entertainment Industry](https://data.hackinn.com/ppt/BlackHatAsia2022/en/To%20loot%20or%20Not%20to%20Loot%3F%20That%20Is%20Not%20a%20Question%20When%20State-Nexus%20APT%20Targets%20Online%20Entertainment%20Industry.pdf) #### 16、[AutoSpear:Towards Automatically Bypassing and Inspecting Web Application Firewalls](https://data.hackinn.com/ppt/BlackHatAsia2022/en/AutoSpear:Towards%20Automatically%20Bypassing%20and%20Inspecting%20Web%20Application%20Firewalls.pdf) [[中文-ZH]](https://data.hackinn.com/ppt/BlackHatAsia2022/zh/AutoSpear:Towards%20Automatically%20Bypassing%20and%20Inspecting%20Web%20Application%20Firewalls.pdf) #### 17、[A set of critical vulnerabilities in Smart-UPS devices](https://data.hackinn.com/ppt/BlackHatAsia2022/en/A%20set%20of%20critical%20vulnerabilities%20in%20Smart-UPS%20devices.pdf) #### 18、[SIDEWINDER UNCOILS TO STRIKE](https://data.hackinn.com/ppt/BlackHatAsia2022/en/SIDEWINDER%20UNCOILS%20TO%20STRIKE.pdf) [[中文-ZH]](https://data.hackinn.com/ppt/BlackHatAsia2022/zh/SIDEWINDER%20UNCOILS%20TO%20STRIKE.pdf) #### 19、[AMSI Unchained - Review of Known AMSI Bypass Techniques and Introducing a New One](https://data.hackinn.com/ppt/BlackHatAsia2022/en/AMSI%20Unchained%20-%20Review%20of%20Known%20AMSI%20Bypass%20Techniques%20and%20Introducing%20a%20New%20One.pdf) [[中文-ZH]](https://data.hackinn.com/ppt/BlackHatAsia2022/zh/AMSI%20Unchained%20-%20Review%20of%20Known%20AMSI%20Bypass%20Techniques%20and%20Introducing%20a%20New%20One.pdf) #### 20、[Codema Attack:Controlling Your Smart Home Through Dangling Management Channels](https://data.hackinn.com/ppt/BlackHatAsia2022/en/Codema%20Attack:Controlling%20Your%20Smart%20Home%20Through%20Dangling%20Management%20Channels.pdf) [[中文-ZH]](https://data.hackinn.com/ppt/BlackHatAsia2022/zh/Codema%20Attack:Controlling%20Your%20Smart%20Home%20Through%20Dangling%20Management%20Channels.pdf) #### 21、[Backdooring of Real Time Automotive OS Devices](https://data.hackinn.com/ppt/BlackHatAsia2022/en/Backdooring%20of%20Real%20Time%20Automotive%20OS%20Devices.pdf) [[中文-ZH]](https://data.hackinn.com/ppt/BlackHatAsia2022/zh/Backdooring%20of%20Real%20Time%20Automotive%20OS%20Devices.pdf) #### 22、[Cooper Knows the Shortest Stave:Finding 134 bugs in the Binding Code of Scripting Languages with Cooperative Mutation](https://data.hackinn.com/ppt/BlackHatAsia2022/en/Cooper%20Knows%20the%20Shortest%20Stave:Finding%20134%20bugs%20in%20the%20Binding%20Code%20of%20Scripting%20Languages%20with%20Cooperative%20Mutation.pdf) [[中文-ZH]](https://data.hackinn.com/ppt/BlackHatAsia2022/zh/Cooper%20Knows%20the%20Shortest%20Stave:Finding%20134%20bugs%20in%20the%20Binding%20Code%20of%20Scripting%20Languages%20with%20Cooperative%20Mutation.pdf) #### 23、[Unix Domain Socket:A Hidden Door Leading to Privilege Escalation in The Android Ecosystem](https://data.hackinn.com/ppt/BlackHatAsia2022/en/Unix%20Domain%20Socket:A%20Hidden%20Door%20Leading%20to%20Privilege%20Escalation%20in%20The%20Android%20Ecosystem.pdf) #### 24、[Hunting and Exploiting Recursive MMIO Flaws in QEMU:KVM](https://data.hackinn.com/ppt/BlackHatAsia2022/en/Hunting%20and%20Exploiting%20Recursive%20MMIO%20Flaws%20in%20QEMU:KVM.pdf) [[中文-ZH]](https://data.hackinn.com/ppt/BlackHatAsia2022/zh/Hunting%20and%20Exploiting%20Recursive%20MMIO%20Flaws%20in%20QEMU:KVM.pdf) #### 25、[Remote Memory-Deduplication Attacks](https://data.hackinn.com/ppt/BlackHatAsia2022/en/Remote%20Memory-Deduplication%20Attacks.pdf) [[中文-ZH]](https://data.hackinn.com/ppt/BlackHatAsia2022/zh/Remote%20Memory-Deduplication%20Attacks.pdf) > 版权归主办方BlackHat及演讲者所有,若有任何问题请及时联系我们或者在下方留言, 邮箱:admin“@”hackinn.com 标签: none