-
Welcome to HITB Phuket
- Ilyas Sung
-
Welcome Address
- AVM Amorn Chomchoey
-
The Upside Of Falling Down: Embracing
Failure To Be A Better Hacker (and Human)
- Joe Grand
-
Exploiting The Lexmark PostScript Stack
- Aaron Adams
-
gVisor:
Modern Linux Sandboxing Technology
- Li Qiang
-
Bugs In Blocks
- Karsten Nohl
-
It Was Harder To Sniff Bluetooth
Through My Mask During The Pandemic
- Xeno Kovah
-
How To Design Your Own
Electronic Attack Device
- Shupeng Gao
-
Shining A Light On
Solar System Cyber Security
- Sick Codes
-
ALPChecker:
Detecting Spoofing And Blinding Attacks
- Anastasiia Kropova & Igor Korkin
-
FrankeNAND: Extracting Info From
Automotive Internet Units
- Alexey Kondikov & Yuriy Serdyuk
-
Lazarus Group’s Undercover Operations:
Large-Scale Infection Campaigns 2022–2023
- Lee Taewoo and Seulgi Lee & Dongwook Kim
-
Bring Your Own SOAR:
Automated Incident Response
- Valentine Mairet & Harjeet Sharma
-
Cracking The Shield: Analyzing And
Reverse Engineering Antivirus Signatures
- Dobin Rutishauser
-
Rogue CDB: Escaping From VMware
Workstation Through The Disk Controller
- Wenxu Yin
-
Hakuin:
Injecting Brains Into Blind SQL Injection
- Jakub Pruzinec & Quynh Anh Nguyen
-
How NTLM Relay
Ruins Your Exchange Servers
- Tianze Ding
-
Say What You Want:
Building A Full-Speed Anti-Censorship Router
- KaiJern @xwings Lau
-
Hardware Backdooring An EScooter
- Arun Mane
-
An Ode To Rabbit Holes: Writing A New
Decompiler Just For A Security Audit
- Dominic Couture
-
Timekiller: Leveraging Asynchronous Clock To Escape From QEMU/KVM
- Yongkang Jia,Xiao Lei,Yiming Tao and Gaoning Pan & Chunming Wu
-
Big Match: How I Learned To Stop
Reversing And Love The Strings
- Paolo Montesel
-
KeyBleed:
Attacking The OneKey Mini
- Eric Michaud
-
Breaking ML Services:
Finding 0-days In Azure Machine Learning
- Nitesh Surana
-
The Tragedy Of Bluetooth Low Energy
- Linfeng Xiao & Dalin Yang
-
B(l)utter – Reversing Flutter
Applications By Using Dart Runtime
- Worawit Wangwarunyoo
-
Locate Vulnerabilities Of Ethereum Smart
Contracts With Semi-Automated Analysis
- Boik Su
-
TSSHOCK:
Breaking MPC Wallets And Digital Custodians
- Huu Giap Nguyen & Anh Khoa Nguyen
-
A Practical Method Of Finding
Vulnerabilities In Internet Of Things
- IeckChae Euom
-
Hacking Into IOS’s VOLTE Implementation
- Rajanish Pathak & Hardik Mehta
-
GPTHound:
Your Active Directory Security Assistant
- John Jiang
-
Build Your Own Drone Attacking Device
Drone Attacking Device
- Kelvin Wong
-
Scarlet OT: OT Adversary
Emulation For Fun And Profit
- Sol Yang & Vic Huang
-
Take A Picture Of Your App Code:
Android MRI Interpreter
- SungHyoun Song
-
Hunting For Amazon Cognito
Security Misconfigurations
- Yassine Aboukir
-
NVMe: New Vulnerabilities Made Easy
- Tal Lossos
-
The Future Of Hacking: Unleashing The Power
Of OpenAI’s GPT-4 Code Interpreter
- Dexter Ng
-
Windows Kernel Security: A Deep Dive Into
Two Exploits Demonstrated At Pwn2Own
- Thomas Imbert
-
From Unknown Parameter To Root:
A Story Of Unexpected Intrusion Testing Results
- Yvan Genuer
-
Tracing The Intrusion: Unveiling The Covert
Trails Of Infostealer Malware Ecosystems
- Pavan Karthick M
-
Aerospace Cybersecurity:
Ask Me Anything
- Hugo Teso
-
Systems Alchemy:
The Transmutation Of Hacking
- The Grugq