DEVELOP AND NURTURE TALENTS OF THE WORLD
QUANTIFY AND ENHANCE VALUE OF THE INDUSTRY.
DEVELOP AND NURTURE
TALENTS OF THE WORLD
QUANTIFY AND ENHANCE
VALUE OF THE INDUSTRY.
OCBC Arena @ Singapore Sports Hub
SEE YOU THERE
John Doe
Can Airport X-ray Detection Machine Be Trusted?
Boris Larin
Operation Triangulation: Do Not Attack iPhones of Researchers!
Lianji Li
Changing Faces with AI Disguise Glasses
Yanze Zhang
Role Play Attack for Web3 DeFi Applications
Kira Chen
Surviving MiraclePtr: Navigating of Webp and Beyond
AVSS
Adversarial Vulnerability Scoring System
Official Announcement
Wish Wu
If Autonomous Driving Is Prone to Blinding...
Hao Ke
John Wu
Azhara Assanova
Hardening Android: Insights and Systemic Protections from Google's Front Lines
Contributors: Achim Thesmann, Nan Wu
Connie Lam
Friend or Foe: A Bridge Vulnerability About "Public and Friend"
YizheZhuang
Exploiting Steam: A Journey into Vulnerability Discovery of a CEF-based Application
Kaiya Li @ ExpAttack Team
Guangming Liu@ k1Mirr0rs sec lab
The Art of Deception
Can AI Be Manipulated by Evil Force?
Chao Zhang
Machine Language Model for Binary Analysis
Hai Zhao
Yue Liu
Defeating Self-protection of Chips
Yifei Wu
Cuiying Gao
The Secrets Behind Advertising Traffic
Yongkang Jia
Xiao Lei
Yiming Tao
Hostile Takeovers within Cloud Hosts Part 1: From Guest to Host
Neoni
Hostile Takeovers within Cloud Hosts Part 2: From Host to Root
Dennis Giese
Braelynn
Could Smart Home Robots Become the Trojan Spying on Our Lives?
Lorant Szabo
Daniel Komaromy
Attacking Over the Air: Exploiting Basebands in Radio Layer Two
Yichi Zhang
Can Large Models Be Fooled by Illusion?
Lars Froder
Jailbreak Apple iOS16: Defeating Code Signing Using a PPL Bypass
Zhaofeng Chen
ModuleBomb: Persistent Blockchain Outage Attack
Peter Hlavaty
HyperV and Effective Ways of Fuzzing It for RCEs
Jay Turla
How Long Does it Take to Stealthily Unlock a Car?
Kai Jern Lau
Redefine Reverse Engineering in Web3
Haixin Duan
Xiang Li
TuDoor in the DNS Wall: The Fastest DNS Cache Poisoning Attack
Gelei Deng @ NTU
Yuqiang Sun, Daoyuan Wu @ NTU
Will AI Become a More Powerful Hacker?
NWMonster
slipper
Unlocking Crypto Vulnerabilities: Insights into Hardware Wallet Security
Zhutian Feng
Haojie He
Overlooked Bugs
Serious Impact
1 GEEKCON organizing committee (hereinafter referred to as "the committee") recognizes the technical capability of the winner individually, but doesn't acknowledge that it represents the capability of the winner's working organization.
2 We recognize and promote the comprehensive assessment of vulnerability exploitation capabilities and mitigation mechanisms from a confrontational perspective, and do not endorse the judgement of security levels of the target products involved in the event based on a single dimension or non-quantitative dimension.
3 The committee firmly follows the Responsible Disclosure principle. The committee and contestant commit not to disclose any details to third-party before manufactures fix the issues.
4 The committee advocates and encourages in-depth knowledge sharing and communication, but firmly opposes any speech and behavior that violates laws and regulations or infringes on the rights of others.
5 The committee guarantees that the participants' personal information will not be disclosed to third-party or used for commercial activities without their agreement and authentication.
6 We will set up awards and honors based on the research efforts, technical breakthrough, and technical innovation of the projects. As the top 1 security geek IP operator in China, we always advocate a reward mechanism that emphasizes both honor and moderate bounty, encouraging more geeks to participate in technical innovation and knowledge sharing.