1、How to Make Hugging Face to Hug Worms:Discovering and Exploiting Unsafe Pickle.loadsover Pre-Trained Large Model HubsPeng Zhou()Shanghai University1Peng Zhou(zpbrent)Associate Professor at Shanghai U。
2、#BHASIA BlackHatEventsOne Flip is All It Takes:Identifying Syscall-Guard Variables for Data-Only Attacks Speaker:Hengkai YeThe Pennsylvania State UniversityOther Contributors:Hong Hu,Song Liu,Zhechan。
3、The Fault in Our MetricsRethinking How We Measure Detection&ResponseBoD meeting is coming up.Gonna need updated program metrics.Lets chat tomorrowyou got it bossBossmanTeam ChatBoD metrics.what h。
4、Unveiling the Cracks in Virtualization,Mastering the Host SystemVMware Workstation EscapeSpeaker:VictorV#BHASIA BlackHatEventsVMware Workstation Escape TianfuCup2018/2021/2023Zer0Con 2022HITB 2020Hyp。
5、#BHASIA BlackHatEventsVoice Phishing Syndicates Unmasked:An In-Depth Investigation and ExposureSojun Ryu(S2W Inc.),Yeongjae Shin(Ex-S2W Inc.)#BHASIA BlackHatEvents1.Background2.Overview3.Attack infra。
6、#BHASIA BlackHatEventsTHE FINAL*CHAPTERUNLIMITED WAYS TO BYPASS YOUR MACOS PRIVACY MECHANISMSCSABA FITZL&WOJCIECH REGUA#BHASIA BlackHatEventsNSFullUserName()Wojciech Regua Head of Mobile Security。
7、#BHASIA BlackHatEventsWhat the TrustZone-M Doesnt See,theMCU Does Grieve OverLessons Learned from Assessing a Microcontroller TEECristiano Rodrigues|Sandro Pinto,PhD(Centro ALGORITMI/LASI,Universidad。
8、#BHASIA BlackHatEventsCertifiedDCOMThePrivilegeEscalationJourneytoDomainAdminwithDCOMTianze Ding(D1iv3)Tencent Security Xuanwu Lab#BHASIA BlackHatEventsWhoamiTianze Ding(D1iv3)Senior Security Researc。
9、BlackHat Asia 2024/rockygnu.orgBlackHat Asia 2024/rockygnu.org-uncompyle6 and decompyle3:How to Read and Write a High-Level Bytecode Decompiler and:How to Read and Writea High-Level Bytecode Decompil。
10、#BHASIA BlackHatEventsBad Randomness:Protecting Against Cryptographys Perfect CrimeTal Beery,CTO&Co-Founder ZengoCo-Founder,CTO ZenGo20+years cyber security9th time BH Speaker1st time BHASIA spea。
11、#BHASIA BlackHatEventsLLM4Shell:Discovering and Exploiting RCE Vulnerabilities in Real-World LLM-Integrated Frameworks and AppsSpeakers:Tong Liu,Yuekang LiContributors:Zizhuang Deng,Guozhu Meng,Kai C。
12、Confused Learning:Supply Chain Attacks through Machine Learning ModelsThreat IntelligenceDropboxHello!Mary WalkerAdrian Wood Red Team DropboxThrelfallwhitehacksecMairebearmairebearIntroduction01Targe。
13、#BHASIA BlackHatEventsThe Key to Remote Vehicle Control:Autonomous Driving Domain ControllerShupeng Gao,Yingtao Zeng,Yimi Hu,Jie Gao From Baidu Security Lab#BHASIA BlackHatEventsTraditional Cars#BHAS。
14、Security Research Team Lead at SafeBreach6+years in security researchLinux,embedded and some Android research3 years Windows researchCreator of Aikido Wiper,DoubleDriveOr YairAgendaWindows Known Issu。
15、#BHASIA BlackHatEventsOperation PoisonedApple:Tracing Credit Card Information Theft to Payment FraudGyuyeon Kim&Hyunho Cho Financial Security Institute#BHASIA BlackHatEventsWho are we?Senior rese。
16、#BHASIA BlackHatEventsChinas Military Cyber OperationsHas the Strategic Support Force Come of Age?Pukhraj SinghDisclaimerThe views expressed in this presentation are strictly personal,and not of my e。
17、#BHASIA BlackHatEventsChinese APT:A Master of Exploiting Edge DevicesCharles LiGreg Chen#BHASIA BlackHatEventsAgendanExploit Target ChangednCase Study of Weaponized Edge Device nMalware implanted in 。
18、#BHASIA BlackHatEventsThe Hole in Sandbox:The Hole in Sandbox:EscapeEscape Modern WebModern Web-Based App Sandbox From Based App Sandbox From SiteSite-Isolation PerspectiveIsolation PerspectiveBohan 。
19、#BHASIA BlackHatEventsBypassing Bypassing EntraEntra ID Conditional Access Like APTID Conditional Access Like APTA Deep Dive Into Device Authentication Mechanisms for Building Your Own PRT Cookie Spe。
20、EDR=Erase Data RemotelyTomer BarShmuel CohenThis talk is SafeBreachs 15th talk at Black Hat20 years experience in security researchMain focus in APT and vulnerability researchPresented at many global。
21、#BHASIA BlackHatEventsPrivacy DetectivePrivacy DetectiveSniffing Out Your Data Leaks for AndroidAbbie&MeggieAbbie&Meggie#BHASIA BlackHatEventsAbout usAbout usMeggie He,A security researcher a。
22、#BHASIA BlackHatEventsS SystemUIystemUI As As EvilPiPEvilPiPWeiMin Cheng()The Hijacking Attacks on Modern Mobile Device#BHASIA BlackHatEventsWhoAreWeWhoAreWeWeiMin ChengQI-ANXINGithub:MG1937Twitter:M。
23、#BHASIA BlackHatEventsA Glimpse Into The ProtocolFuzz Windows RDP Client For Fun And ProfitYingqi Shi(Mas0nShi),Mingjia Liu(cyberestro),Quan Jin(jq0904)DBAPPSecurity#BHASIA BlackHatEventsAbout UsYing。
24、#BHASIA BlackHatEventsYou Shall not PASSAnalysing a NSO iOS Spyware SampleMatthias Frielingsdorf#BHASIA BlackHatEventsMatthias FrielingsdorfVP of Research at iVerifyiOS Malware&Mobile Device Secu。
25、ASIA 2024Cloud Console CartographerTapping Into Mapping Slogging Thru LoggingIntroductionCloud Logs for DefendersPROBLEM:Noisy Console LogsSOLUTION:Mapping for ClarityTool Demo+ReleaseANDI AHMETIASSO。