2017 SyScan360 | SyScan360 Information Security Conference China ‧ Beijing

2017 SyScan360 | SyScan360 Information Security Conference

2017 SyScan360

Photo

Date: 2017.05.30 - 2017.05.31

Venue: Seattle·Four Seasons Hotel Seattle

Program

Photos

2017.05.30

2017.05.31

2016 SyScan360 Shanghai

Photo

Date: 24.11.2016 - 25.11.2016

Venue: Shanghai Marriott Hotel City Centre

Program

Photos

24.11.2016

Time Speaker/Topic/PDF Download
09:00 - 09:20
Xiangdong Qi / Thomas / Welcoming remarks 
09:20 - 10:20
Mathew Solnik / Demystifying the Secure Enclave Processor  PDF
10:20 - 11:10
Yuki Chen, MJ0011 / Escape Plans: A Year’s Journey with Microsoft Edge Security Mitigations 
11:10 - 11:25 Coffee Break (Preliminary Contest of Badge)
11:25 - 12:25
12:25 - 14:00 Lunch (Preliminary Contest of Badge)
14:00 - 14:40
Ashley Zhao / Application of Machine Learning in Threat Intelligence Data Mining  PDF
14:40 - 15:40
Patrick Wardle / Abusing the Mac Recovery OS and Local OS Update Process  PDF
15:40 - 15:55 Coffee Break (Preliminary Contest of Badge)
15:55 - 16:25
Jianhao Liu, Minrui Yan / A platform base on visualization for protecting CAN bus security  PDF
16:25 - 16:55
Zhang Qing, Bai Guangdong / Security Vulnerabilities on Online Payment: Summary and Detection  PDF
16:55 - 17:55
Saruhan Karademir / Windows Server Container - The New Panacea?  PDF

25.11.2016

Time Speaker/Topic/PDF Download
09:00 - 09:50
Jayson E. Street / Strategies on Securing you banks & enterprises. (From someone who robs banks & enterprises)  PDF
09:50 - 10:50
Adam Laurie / Old Skewl Hacking: DVB-T Black Button Pivot  PDF
10:50 - 11:05 Coffee Break
11:05 - 11:55
11:55 - 12:25
Francisco Alonso, Jaime Penalba / Browser Bug Hunting and Mobile  PDF
12:25 - 13:50 Lunch (Time-limited Badge Cracking)
13:50 - 14:40
Moritz Jodeit / Look Mom! I Don’t Use Shellcode: A Browser Exploitation Case Study for Internet Explorer 11  PDF
14:40 - 15:40
Edgar Barbosa / Running Code in the TrustZone Land  PDF
15:40 - 15:55 Coffee Break
15:55 - 16:55
Deng Yuan, Gong Guang / BadKernel —--- exploit V8 with a typo  PDF
16:55 - 17:25
Joxean Koret / “Cosa Nostra” an open-source malware clusterization toolkit  PDF

2016 SyScan360 Singapore

Photo

Date: 23.03.2016 - 24.03.2016

Venue: Singapore Swissotel The Stamford

Program

Photos

23.03.2016

Time Speaker/Topic/PDF Download
08:00 - 09:00 Registration and Breakfast
09:00 - 09:15
Thomas Lim / Opening and Welcome Address 
09:15 - 10:15
Georg Wicherski / Towards a Secure and Measured Travel Laptop  PDF
10:45 - 11:30
Vitaly Nikolenko / Practical SMEP Bypass Techniques  PDF
11:30 - 11:45 Break
11:45 - 12:30
Robert Miller / LoRa the Explorer - Attacking and Defending LoRa systems  PDF
12:30 - 14:00 Lunch
14:00 - 14:45
Paul Rascagneres / Windows systems & code signing protection  PDF
14:45 - 15:00 Bar Break
15:00 - 15:45
David Jorm / Remote code execution via Java native deserialization   PDF
15:45 - 16:15 Bar Break
16:15 - 17:15
Stefan Esser / OS X El Capitan - Sinking the S/h\IP  PDF
18:00 - 21:00 Networking Party

24.03.2016

Time Speaker/Topic/PDF Download
08:00 - 09:30 Breakfast
09:20 - 10:15
Tang Qing Hao / Virtualization System Vulnerability Discovery Technology  PDF
10:15 - 11:00
Felix Wilhelm / Xenpwn: Breaking Paravirtualized Devices  PDF
11:00 - 11:30 Break
11:30 - 12:15
Sebastian Apelt / Pwning Adobe Reader - Abusing the reader’s embedded XFA engine for reliable Exploitation  PDF
12:15 - 13:00
Shan Haoqi / Attack and defense toolkits in High/Low frequency  PDF
13:00 - 14:00 Lunch
14:00 - 14:30
Ivan Novikov / Key-value injections here!  PDF
14:30 - 15:00 Bar Break
15:00 - 16:00
Pedro Vilaça / Memory Corruption is for Wussies! 
16:00 - 16:30 Bar Break
16:30 - 17:00 WhiskyCon
17:00 - 17:30 Closing Ceremony

2015 SyScan360

Photo

Date: 21.10.2015 - 22.10.2015

Venue: Beijing Marriott Hotel Northeast

Program

Photos

21.10.2015

Time Speaker/Topic/PDF Download
09:00 - 09:30 Registration and Start of Badge Cracking
09:30 - 09:50
Qi Xiangdong/Thomas Lim / Welcome Speech 
09:50 - 10:40
Ben Nagy / The Art of Fuzzing Without Fuzzing 
Speaker

Ben Nagy

The Art of Fuzzing Without Fuzzing

Ben used to do some network security, reverse engineering and crypto, but then he fell into the field of fuzzing scalability. The author shared his thoughts and research on Fuzzing.

10:40 - 10:50 Coffee Break
10:50 - 11:40
Pedro Vilaça / Is There An EFI Monster Inside Your Apple?  PDF
Speaker

Pedro Vilaça

Is There An EFI Monster Inside Your Apple?

Pedro Lately very interested in improving OS X security and malware research. A few months ago he publicly disclosed an Apple EFI firmware zero day. This talk discussed about EFI monsters. PDF

11:40 - 13:30 Lunch
13:30 - 14:20
Yuki Chen / Unicorn: next generation CPU emulator framework 
Speaker

Yuki Chen

Unicorn: next generation CPU emulator framework

Yuki Chen is the core member of 360Vulcan Team from 360 Safeguard offensive and defensive research group. He disclosed the details of the 2 vulnerabilities their team used to take down 64-bit IE in Pwn2Own 2015.

14:20 - 15:10
Charlie Miller & Chris Valasek / Remote Exploitation of an Unaltered Passenger Vehicle  PDF
Speaker

Charlie Miller & Chris Valasek

Remote Exploitation of an Unaltered Passenger Vehicle

Charlie Miller is a security engineer at Uber, while Chris Valasek is Security Lead at Uber Advanced Technology Centre. They showed how to pivot through different pieces of the vehicle's hardware in order to be able to send messages on the CAN bus to critical electronic control units. PDF

15:10 - 15:20 Coffee Break
15:20 - 16:10
Nguyen Anh Quynh / Unicorn: next generation CPU emulator framework  PDF
Speaker

Nguyen Anh Quynh

Unicorn: next generation CPU emulator framework

Nguyen Anh Quynh is the founder of two open source security frameworks "Capstone" and "Unicorn". This talk introduced Unicorn CPU emulator framework. PDF

16:10 - 17:00
Jason Shirk / Microsoft Bounty Program: Making it to the MSRC Top 100  PDF
Speaker

Jason Shirk

Microsoft Bounty Program: Making it to the MSRC Top 100

Jason Shirk is a Principal Security Strategist at Microsoft and runs their Bug Bounty Program. He explained the details about this program. PDF

22.10.2015

Time Speaker/Topic/PDF Download
09:30 - 10:20
Zhenhua 'Eric' Liu & Yannick Formaggio / Attacking VxWorks: From Stone Age to Interstellar  PDF
Speaker

Zhenhua 'Eric' Liu & Yannick Formaggio

Attacking VxWorks: From Stone Age to Interstellar

Zhenhua 'Eric' Liu is the Principal Security Researcher at Istuary Security Research Team, and Yannick Formaggio is a French passionate IT security researcher at the same team. They presented the tool they developed for VxWorks assessment and one of the vulnerabilities they found which nicely bypass some mitigations. PDF

10:20 - 10:30 Coffee Break
10:30 - 11:20
Jianhao Liu, Jason Yan / Car Hacking: Witness Theory to Scary and Recover From Scare  PDF
Speaker

Jianhao Liu, Jason Yan

Car Hacking: Witness Theory to Scary and Recover From Scare

Jianhao Liu is the main contributor who discovered the vulnerability of Tesla and BYD in 2014 and 2015, and Jason has more than 10 years experience in operation. They shared the research works of vehicle attacking vectors. PDF

11:20 - 13:00 Lunch
13:00 - 13:50
Yuan Jian / GPS spoofing of UAV / Badge hacking competition  PDF
Speaker

Yuan Jian

GPS spoofing of UAV / Badge hacking competition

Yuan Jian is a researcher in 360UnicornTeam, mainly engaged in security research of GPS and IoT. He showed how to hijack an UAV in civilian market. PDF

13:50 - 14:40
Guang Gong / Fuzzing Android System Service by Binder Call to Escalate Privilege  PDF
Speaker

Guang Gong

Fuzzing Android System Service by Binder Call to Escalate Privilege

Guang Gong is a security researcher at Qihoo 360. The author introduced Android System Service attack surface and demonstrated the first fuzzing tools to find this kind of vulnerabilities. PDF

14:40 - 14:50 Coffee Break
14:50 - 15:40
Edgar Barbosa / Program Analysis Tools  PDF
Speaker

Edgar Barbosa

Program Analysis Tools

Edgar Barbosa is a senior security researcher with more than 10 years of experience, specialized in reverse engineering, kernel programming, rootkits, virtualization and program analysis. This presentation focused on tools for program analysis. PDF

15:40 - 16:30
Li Jun / Security Assessment of ZigBee Protocol  PDF
Speaker

Li Jun

Security Assessment of ZigBee Protocol

Li Jun is a security researcher at Unicorn Team, Qihoo360. He demonstrated how to hack ZigBee enabled devices. PDF

  • 2015SyScan360 Registration
  • 2015SyScan360 is open
  • 2015SyScan360 speakers are discussing
  • 2015 SyScan Opening speech delivered by Qi xiangdong
  • 2015SyScan360 speakers
  • Ben Nagy is introducing Fuzzing
  • Pedro is talking about EFI monsters
  • 2015 SyScan360 conference
  • Yuki Chen shared how to attack 64-bit IE on Windows 8.1
  • Nguyen Anh Quynh brought next generation CPU emulator framework Unicorn
  • Charlie Miller和Chris Valasek is demonstrating how to control a car
  • Jason Shirk is introducing Microsoft Bounty Program
  • Zhenhua 'Eric' Liu and Yannick Formaggio is talking about attacking VxWorks
  • Liu Jianhao and Jason Yan is discussing about car hacking
  • Attendees are participating badge hacking competition
  • 2015 SyScan360 E-badge
  • Gong Guang is talking about fuzzing Android System Service
  • 2015 SyScan360badge hacking competition winner
  • Yuanjian is demonstrating how to attack an UAV
  • Edgar Barbosa is talking about program analysis tools
  • Li Jun is talking about security assessment of ZigBee protocol
  • 2015 SyScan360 hostess
  • Group photo of 2015 SyScan360 Speakers

2014 SyScan360

Photo

Date: 16.07.2014 - 17.07.2014

Venue: Beijing Marriott Hotel Northeast

Program

Photos

16.07.2014

Time Speaker/Topic/PDF Download
08:00 - 09:00 Registration and Start of Badge Cracking
09:00 - 09:20
Xiangdong Qi/Thomas Lim / Welcome Speech 
09:20 - 10:10
Rob Ragan & Oscar Salazar / CloudBots: Harvesting Crypto Coins like a Botnet Farmer  PDF
Speaker

Rob Ragan & Oscar Salazar

CloudBots: Harvesting Crypto Coins like a Botnet Farmer

Rob Ragan and Oscar Salazar are Senior Security Associates at Bishop Fox (formerly Stach & Liu). In this presentation they explored how to (ab)use free trials to get access to vast amounts of computing power, storage, and premade hacking environments. PDF

10:10 - 11:00
Pk001 & Wayne Yan / Hack Your Car and I’ll Drive You Crazy: the Design of Hack-proof CAN-based Automotive System  PDF
Speaker

Pk001 & Wayne Yan

Hack Your Car and I’ll Drive You Crazy: the Design of Hack-proof CAN-based Automotive System

Pk001 has years of experiences of reverse engineering in embedded automotive networks and systems. Dr. Yan works as the CEO role of VisualThreat, a leading mobile security vendor. In this talk, Pk001 and Dr. Yan showed how to build up a testing platform either from a real car or a simulator, how data transmitted on CAN bus among ECUs are monitored, and how to defend against each type of attack etc. PDF

11:00 - 11:10 Coffee Break
11:10 - 12:00
Edgar Barbosa / Program Analysis and Constraint Solvers  PDF
Speaker

Edgar Barbosa

Program Analysis and Constraint Solvers

Edgar Barbosa works as a senior security researcher at COSEINC, and he is an expert in kernel development, rootkit research, reverse engineering, hardware virtualization and program analysis. The objective of the presentation showed how to use constraint solvers, including SMT solvers for program analysis applications like reverse engineering and bug finding, and explained details about the translation of x86 assembly code to Intermediate languages and to SMT formulas. PDF

12:00 - 13:30 Lunch
13:30 - 14:20
windknown & dm557 / How Pangu Jailbreak Untethered on Your iOS Devices 
Speaker

windknown & dm557

How Pangu Jailbreak Untethered on Your iOS Devices

Both windknown and dm557 are from Pangu Team. windknown is currently working on security research and APP development of OSX/iOS. dm557 is a security researcher focusing on advanced vulnerability exploitation research. In this topic they mainly talked about the vulnerabilities they found and used in Pangu jailbreak for untether.

14:20 - 15:10
Chen Zhangqi & Shen Di / Advanced Bootkit Techniques on Android  PDF
Speaker

Chen Zhangqi & Shen Di

Advanced Bootkit Techniques on Android

Chen Zhangqi and Shen Di are security researchers in Qihoo360. In their talk, they examined the nature of such malware and aim to better understand and defend against them. PDF

15:10 - 15:20 Coffee Break
15:20 - 16:10
Jon Erickson / Using and Abusing Microsoft’s Fix It Patches  PDF
Speaker

Jon Erickson

Using and Abusing Microsoft’s Fix It Patches

Jon Erickson is an engineer within the research lab at iSIGHT Partners. This research first focuses on analyzing these in-memory patches. By extracting information from them researchers are able to better understand the vulnerabilities that Microsoft intended to patch. The research then focuses on reverse engineering the patches and using this information to provide the ability to create patches which can be used to maintain persistence on a system. PDF

16:10 - 17:00
Nguyen Anh Quynh / Capstone Disassembly Engine  PDF
Speaker

Nguyen Anh Quynh

Capstone Disassembly Engine

Nguyen Anh Quynh is the main designer of Capstone disassembly engine. This talk presented the internals and design theory of Capstone, which allows Capstone to have full support for 8 hardware architectures in a record time. He also explained why these wise decisions guarantee that Capstone will get bugs fixed frequently, quickly and always updated in the future. PDF

17.07.2014

Time Speaker/Topic/PDF Download
09:00 - 09:50
Rosario Valotta / Browser fuzzing in 2014 - David vs Goliath (a.k.a. learn where to throw your stones)  PDF
Speaker

Rosario Valotta

Browser fuzzing in 2014 - David vs Goliath (a.k.a. learn where to throw your stones)

Rosario Valotta is an IT security professional with over 13 years experience. He has been actively finding vulnerabilities and exploits .In this talk he gave an overview of common memory corruption bugs, current browser fuzzing techniques and limitations, finally he introduced a novel fuzzing algorithm targeting some specific browsers aspects, explained the rationales behind them and discussed a bunch of exploitable memory corruption bugs uncovered using this approach. PDF

09:50 - 10:40
Łukasz Pilorz & Paweł Wyleciał / Mobile Browsers Security: iOS  PDF
Speaker

Łukasz Pilorz & Paweł Wyleciał

Mobile Browsers Security: iOS

Łukasz Pilorz devoted to web security analysis. Paweł is a penetration tester and a bug hunter. They discussed how iOS third-party web browsers are built. PDF

10:40 - 10:50 Coffee Break
10:50 - 11:40
The Grugq / Click and Dagger: Denial and Deception on Android Smartphones  PDF
Speaker

The Grugq

Click and Dagger: Denial and Deception on Android Smartphones

The Grugq is a pioneering information security researcher with over a decade of professional experience. He has worked extensively with digital forensic analysis, binary reverse engineering, rootkits, Voice over IP, telecommunications and financial security. His presentation covered techniques used to secure the phone against forensic analysis when the adversary has physical possession of the device. PDF

11:40 - 13:00 Lunch
13:00 - 14:00 Badge Cracking Final
14:00 - 14:50
pLL / Be cautious, there is an attack window in your android app 
Speaker

pLL

Be cautious, there is an attack window in your android app

As a PhD student at Shanghai Jiao Tong University, pLL focuses on program analysis theory and algorithm. In this talk, he analyzed the principle of this vulnerability and attack model, and showed a static data flow analysis tool aDFAer, a dynamic message interceptor and an elaborately designed re-player to prove findings.

14:50 - 15:40
Joxean Koret / Breaking Antivirus Software  PDF
Speaker

Joxean Koret

Breaking Antivirus Software

Joxean Koret is an expert in malware analysis and anti-malware software development. In this talk,he explained how to find vulnerabilities in AV products, and showed typical problems in AV products. PDF

15:40 - 15:50 Coffee Break
15:50 - 16:40
Pedro Vilaça / F**k you Hacking Team! From Portugal, with Love  PDF
Speaker

Pedro Vilaça

F**k you Hacking Team! From Portugal, with Love

Pedro Vilaça is a Professional troublemaker in the OS X scene. He showed how to reverse HackingTeam’s OS X commercial spyware software known as Crisis. PDF

16:40 - 17:10 Tesla Cracking Award Ceremony
  • The Grugq is sharing Denial and Deception on Android Smartphones
  • Speakers and audience of SyScan360
  • Rosario Valotta is reporting Browser fuzzing in 2014
  • Chen Zhangqi & Shen Di are sharing their experience on Advanced Bootkit Techniques on Android
  • windknown is talking about How Pangu Jailbreak Untethered on Your iOS Devices
  • 2014 SyScan360 Tesla cracking award ceremony
  • Nguyen Anh Quynh is introducing Capstone Disassembly Engine
  • The journalists are having an interview with Qi Xiangdong
  • Guests are participating in 2014 SyScan360 badge cracking with enthusiasm
  • 2014 SyScan360 Tesla cracking site
  • Challengers are trying to crack Tesla
  • Łukasz Pilorz and Paweł Wyleciał are discussing about Mobile Browsers Security: iOS with Audience
  • 2014 SyScan360 Opening Speech delivered by Thomas Lim
  • The Registration of 2014 SyScan360 Information Security conference
  • Rosario Valotta is discussing with guests under the topic of Browser fuzzing
  • Wayne Yan and Pk001 are analyzing the Design of Hack-proof CAN-based Automotive System
  • Rob Ragan and Oscar Salazar are having speech about CloudBots: Harvesting Crypto Coins like a Botnet Farmer
  • Group photo of 2014 SyScan360 Speakers
  • 2014 SyScan Opening speech delivered by Qi xiangdong
  • Joxean Koret is talking about how to Breaking Antivirus Software
  • pLL is having a speech under the topic Be cautious, there is an attack window in your android app
  • Pedro Vilaça is having a speech under the topic of F**k you Hacking Team! From Portugal, with Love.
  • 2014 SyScan360 badge cracking award ceremony

2013 SyScan360

Photo

Date: 24.09.2013 - 25.09.2013

Venue: China National Convention Center

Program

Photos

24.09.2013

Time Speaker/Topic/PDF Download
08:30 - 09:30 Registration(Get tips to make a badge colorful)
09:30 - 09:40
Xiangdong Qi/Thomas Lim / Opening and Welcome Address 
09:40 - 10:30
Jason Shirk / Social Networking, Mobile Phones, The Cloud and Privacy – The New Reality of Digital, Physical and Social Persona  PDF
Speaker

Jason Shirk

Social Networking, Mobile Phones, The Cloud and Privacy – The New Reality of Digital, Physical and Social Persona

Jason Shirk is currently the Security Lead for Microsoft’s Online Services Division. The new services are real-time, location specific and can/will have tremendous value. He talked about several tools including some vocabulary. PDF

10:30 - 11:20
Stefan Esser / Tales from iOS 6 Exploitation and iOS 7 Security Changes  PDF
Speaker

Stefan Esser

Tales from iOS 6 Exploitation and iOS 7 Security Changes

Stefan Esseris best known in the security community as the PHP security guy. In 2010 he did his own ASLR implementation for Apple's iOS and shifted his focus to the security of the iOS kernel and iPhones in general. One of the disclosed kernel information leak vulnerabilities and its exploitation was outlined and security relevant changes in iOS 7 was discussed. PDF

11:20 - 11:30 Coffee Break
11:30 - 12:20
Wayne Yan / Mr. Big-dumb or Mr. Big-data: How smart is your mobile security intelligent system  PDF
Speaker

Wayne Yan

Mr. Big-dumb or Mr. Big-data: How smart is your mobile security intelligent system

Independent researcher Dr.Yan showed how to build the big-data security intelligent system where mobile malware content are cross-indexed on the family base. PDF

12:20 - 13:50 Lunch
13:50 - 14:40
Instruder / UAC security issues in depth  PDF
Speaker

Instruder

UAC security issues in depth

The author works in Nanjing Hanhaiyuan as a security researcher. He introduced security model of Windows 7 including User Account Protection, Mandatory Integrity Control and UI Privilege Isolation as well as some technologies that can be used to bypass UAC, and also discussed about security vulnerabilities caused by UAC which involve Microsoft and third party company like Google. PDF

14:40 - 15:30
Nguyen Anh Quynh / OptiROP: hunting for ROP in style  PDF
Speaker

Nguyen Anh Quynh

OptiROP: hunting for ROP in style

Security researcher Nguyen Anh Quynh introduced a tool named OptiROP that lets exploitation writers search for ROP gadgets with semantic queries. PDF

15:30 - 15:40 Coffee Break
15:40 - 16:30
Yuki Chen / Exploit Your Java Native Vulnerabilities on Win7/JRE7 in One Minute  PDF
Speaker

Yuki Chen

Exploit Your Java Native Vulnerabilities on Win7/JRE7 in One Minute

Yuki Chen has 5+ years experience in information security. he introduced a easy-and-reliable way to exploit java native vulnerability. With this method one can easily turn a java native vulnerability POC into a working exploit on Windows 7 with JRE 7 in one minute. PDF

16:30 - 17:20
Peter Hlavaty / How safe is your link ?  PDF
Speaker

Peter Hlavaty

How safe is your link ?

Peter Hlavaty has recently reached his fourth year at ESET where he works as a software engineer. He examined how much additional safety these changes like SafeLink checks and block header encoding and decoding really provided, and also presented new exploitation technique. PDF

25.09.2013

Time Speaker/Topic/PDF Download
08:30 - 09:40 Registration(Get tips to make a badge colorful)
09:40 - 10:30
Paul Craig / Cultural and Localized Issues Impacting Security  PDF
Speaker

Paul Craig

Cultural and Localized Issues Impacting Security

Paul Craig leads the Security-Assessment.com penetration testing team in Singapore. He demonstrated how large organisations within Asia are failing at security, despite their best attempts to be secure. From Hong Kong to Taiwan, Korea, Mainland China and Singapore, regulations, culture and business style are decreasing the security bar and lowering the security standard of the east. PDF

10:30 - 11:20
Wang Yu / The Story from NtVdm Subsystem  PDF
Speaker

Wang Yu

The Story from NtVdm Subsystem

Wang Yu currently works in Qihoo 360 as security researcher. the author analyzed the implementation of NtVdm user mode and kernel mode, described the working principle of the DOS virtual machine engine, explained the causes of those vulnerabilities, and discussed the lessons we can learn from it. PDF

11:20 - 11:30 Coffee Break
11:30 - 12:20
Jonathan Brossard / An introduction to the Katsuni Theorem and its application to sandboxing and software emulation  PDF
Speaker

Jonathan Brossard

An introduction to the Katsuni Theorem and its application to sandboxing and software emulation

Jonathan is a freelance security researcher performing binary audits for fortune 500 companies.This presentation highlighted some of the limits of sandboxing technologies by exploring how those can not merely be bypassed, but really subverted to turn client side exploits and hostile binaries into network-wide compromise. PDF

12:20 - 13:50 Lunch
13:50 - 14:40
pLL / windknown / Detecting Advanced Android Malware by Data Flow Analysis Engine  PDF
Speaker

pLL / windknown

Detecting Advanced Android Malware by Data Flow Analysis Engine

pLL is a PhD student at Shanghai Jiao Tong University in the department of Computer. windknown is currently working on security research and development of OSX/iOS applications. They showed how to reveal the real purpose of a reflection invoking based on aDFAer engine. PDF

14:40 - 15:30
Pedro Vilaça / OS X Rootkits, Part II  PDF
Speaker

Pedro Vilaça

OS X Rootkits, Part II

Pedro is an economist who loves to hack and reverse all kinds of things.This presentation discussed techniques already presented this year and some other tips and tricks to solve some questions left open. PDF

15:30 - 15:40 Coffee Break
15:40 - 16:30
Bradley Schatz / Android Forensic Analysis Deep Dive  PDF
Speaker

Bradley Schatz

Android Forensic Analysis Deep Dive

Dr Bradley Schatz divides his time between research and practice in the area of digital forensics. This lecture provided a detailed introduction to forensic acquisition and analysis of Android devices, with a focus primarily on interpretation of the YAFFS2 filesystem. PDF

  • Peter Hlavaty is analyzing how to break Microsoft Win8 SafeLink security mechanisms
  • Paul Craig is analyzing Cultural and Localized Issues Impacting Security
  • Wayne Yan is discussing about Mr. Big-dumb or Mr. Big-data: How smart is your mobile security intelligent system
  • Speakers are discussing some topics
  • Wang yu is analyzing NtVdm Subsystem
  • Jonathan Brossard is introducing the Katsuni Theorem and its application to sandboxing and software emulation
  • pLL and windknown are talking about Detecting Advanced Android Malware by Data Flow Analysis Engine
  • Group photo of 2013 SyScan360 speakers
  • Bradley Schatz is analyzing Android Forensic Analysis Deep Dive
  • SyScan360 speakers
  • Pedro Vilaça is discussing OS X Rootkits, Part II with us
  • Stefan Esser is talking about iOS 6 Exploitation and iOS 7 Security Changes
  • Jason Shirk is talking about Social Networking, Mobile Phones, The Cloud and Privacy Ƀ The New Reality of Digital, Physical and Social Persona
  • Yuki Chen is analyzing how to works out Win7+JRE7 in 1 minutes with native Java layer loopholes
  • Instruder is sharing the issues in depth of UAC security
  • Nguyen Anh Quynh is introducing OptiROP: hunting for ROP in style
  • Group photo of 2013 SyScan360 speakers
  • 2013 SyScan360 Information Security Conference site
  • 2013 SyScan360 badge cracking competition
  • Badge is shining after being cracked
  • 2013 SyScan360 badge cracking competition
  • Customized Coca Cola for SyScan360 speakers
  • Speakers are discussing about some topics
  • Peter Hlavaty is listening to speech carefully
  • Speaker Stefan Esser

2012 SyScan360

Photo

Date: 13.12.2012 - 14.12.2012

Venue: Beijing Marriott Hotel Northeast

Program

Photos

13.12.2012

Time Speaker/Topic/PDF Download
08:00 - 09:00 Registration
09:00 - 09:10
Xiangdong Qi/Thomas Lim / Opening and Welcome Address 
09:10 - 10:10
Tom Gallagher / Security Engineering And Product Improvements In The New Office  PDF
Speaker

Tom Gallagher

Security Engineering And Product Improvements In The New Office

Tom Gallagher is currently the lead of the Microsoft Office Security Test team. This presentation introduced those improvements Office Security Team made behind the scene, including increasing the speed of Fuzz and reliability as well as how to deeply cover features of Office to defend against attacks. PDF

10:10 - 11:20
Moti Joseph / Memory Corruption Exploitation In Internet Explorer  PDF
Speaker

Moti Joseph

Memory Corruption Exploitation In Internet Explorer

Moti Joseph had been involved in computer security. In the last few years he had been working on reverse engineering exploit code and developing security products. This presentation introduced tools and scripts that one can use to do memory corruption analysis in Microsoft internet explorer. Aka going from crash to exploit via use after free memory corruption. PDF

11:20 - 11:30 Coffee Break
11:30 - 12:30
Kevin Stadmeyer / Google Vulnerability Reward Program  PDF
Speaker

Kevin Stadmeyer

Google Vulnerability Reward Program

Kevin Stadmeyer is a technical program manager in google where he helps run the vulnerability reward program. Checking process of the reward program was contained in the presentation but the main focus was on the types and amounts of awards and those funny stories happened. PDF

12:30 - 13:30 Lunch
13:30 - 14:30 Panel Discussion
14:30 - 15:40
Ben Nagy / Windows Kernel Fuzzing For Beginners  PDF
Speaker

Ben Nagy

Windows Kernel Fuzzing For Beginners

Ben Nagy is a security researcher with COSEINC. He had been working on the guts of the Word 2007 Binary Format and integrating the results into Metafuzz, his ruby-based fuzzing framework. His speech covered how to maximize performance of Fuzzing and apply it to defect mining of Windows Kernel. What can we fuzz? How do we deploy? How do we deliver the tests? How do we assess the effect of Fuzz? PDF

15:40 - 15:50 Coffee Break
15:50 - 16:50
Neyolov Evgeny / Reverse Engineering Of Fraudster Brain  PDF
Speaker

Neyolov Evgeny

Reverse Engineering Of Fraudster Brain

Neyolov Evgeny who is a security analyst in ERPScan & DSecRG team researches in the field of enterprise business application security, computer forensics and online-gambling & e-payment fraud activity investigation. He is also the organizer of the ZeroNights hacking conference and Russian Defcon Group. This research is deep analysis of professional fraudster activity which has been done in online casino, poker, betting and different e-payment systems. PDF

14.12.2012

Time Speaker/Topic/PDF Download
09:10 - 10:10
Dark Luo & Sung-ting Tsai / Smashing iOS Apps For Fun And Profit  PDF
Speaker

Dark Luo & Sung-ting Tsai

Smashing iOS Apps For Fun And Profit

CHROOT security research group member Dark Luo and Trend Micro advanced threat research team manager Sung-ting Tsai introduced how to reverse the iOS apps and become a super game player with the tricks. They also introduced several ways to bypass IAP (in-app purchase). PDF

10:10 - 11:20
Ren Huan / The Evolution Of Chrome Security Architecture  PDF
Speaker

Ren Huan

The Evolution Of Chrome Security Architecture

Huan Ren worked on the design and development of Chrome browser since 2006, and led the development effort in multiple modules in Windows and Android version of Chrome. He is technical director at Qihoo 360 and responsible for the development of 360 browsers. He shared the design principle, evolution of security mechanism of Chrome, and evaluated their effectiveness. PDF

11:20 - 11:30 Coffee Break
11:30 - 12:30
Wayne Yan / DroidRide: A Lightweight And In-line Android Malware Detection Engine  PDF
Speaker

Wayne Yan

DroidRide: A Lightweight And In-line Android Malware Detection Engine

Dr. Yan was employed as Security Architect at top leading security companies with more than 12 years in security research field.Dr. Yan talked about DroidRide, an engine for large-scale and cross-family android malware analysis. Their testing showed that the engine can detect malware samples efficiently with malware correlation signatures at inline speed. PDF

12:30 - 13:30 Lunch
13:30 - 14:30
Wang Yu / Understanding Windows Kernel Font Scaler Engine Vulnerability  PDF
Speaker

Wang Yu

Understanding Windows Kernel Font Scaler Engine Vulnerability

Wang Yu who is engaged in cloud security solution research, Rootkit / Anti-Rootkit and vulnerability discovery currently works in Qihoo 360 as a security researcher. He mainly introduced the design of the Font Scaler engine, and the security impact of implementing the engine in Windows kernel mode. PDF

14:30 - 14:40 Coffee Break
14:40 - 15:40
windknown & dm557 / Find Your Own iOS Kernel Bug  PDF
Speaker

windknown & dm557

Find Your Own iOS Kernel Bug

dm557 from McAfee Labs and independent researcher windknown introduced basic knowledge of iOS kernel and summary of known bugs used in Jailbreaks, showed how to write a fuzzer based on hook technique and the process of analyzing a real kernel bug. PDF

15:40 - 15:50 Coffee Break
15:50 - 16:50
Haifei Li / The Past, Present, and Future of Flash Security  PDF
Speaker

Haifei Li

The Past, Present, and Future of Flash Security

Haifei Li makes great efforts to resolve two problems: how to find vulnerabilities and how to exploit them. He previously worked for Fortinet and Microsoft. This presentation aimed to share his personal experience and discuss the evolution of security of Flash Player as well as future opportunities. PDF

  • 2012 SyScan360 Information Security Conference Opening speech delivered by Qi xiangdong
  • Tom Gallagher is talking about Security engineering and product improvements in the new Office
  • 2012 SyScan360 Information Security Conference site
  • 2012 SyScan360 Information Security Conference site
  • Kevin Stadmeyer is sharing his expercence on Google Vulnerability
  • Ben Nagy is talking about Windows Kernel Fuzzing
  • Moti Joseph is sharing his expercence on exploit and use memory in IE broswer
  • windknown and dm557 are discussing how to discover iOS kernel flaw manually with us
  • 2012 SyScan360 Information Security Conference podium
  • Haifei Li is sharing his research on leak
  • 2012 SyScan360 Information Security Conference Panel Discussion
  • Topic of Panel Discussion is security problems of mobile application development
  • Dark Luo and Sung-ting Tsai are explain Smashing iOS Apps For Fun And Profit
  • Ren Huan is analyzing The evolution of Chrome security architecture
  • Wayne Yan is introducing a lightweight and in-line android malware detection engine
  • Wang Yu is talking about Understanding Windows Kernel Font Scaler Engine Vulnerability
  • windknown & dm557 are analyzing cases of IOS leak
  • The topic of The past, present, and future about Flash security
  • Reception desk of 2012 SyScan360 Information Security Conference
  • 2012 SyScan360 Information Security Conference brochure
  • Group photo of 2012 SyScan360 Information Security Conference