March 29th, 2015
GeekPwn Open Class at Z-Innoway, Beijing
April 26th, 2015
GeekPwn Open Class at Shanghai Jiao Tong University
June 25th, 2015
GeekPwn Open Class at Long Museum, Shanghai
July 13th, 2015
GeekPwn Open Class at The Uhouse, Nanjing
July 27th, 2015
Start registration of Call For Pwn
July 15th, 2015
GeekPwn Training Camp, Nanjing
September 30th, 2014
Deadline of registration
October 24th, 2015
GeekPwn Contest
Address: Zendai Himalayas Center, No. 1, 1188 Fangdian Road, Pudong New District, Shanghai,
China
October 25th, 2015
Geekon
Address: Zendai Himalayas Center, No. 1, 1188 Fangdian Road, Pudong New District, Shanghai,
China
I want to be a contestant
1. GeekPwn accepts contestant registration since July 27th, 2015. We welcome any registration in contestant’s own name. The committee reserves the right to reject the registration of contestant who has record of criminal or violating code of ethics.
2. Contestant can visit GeekPwn website to download the “Call For Pwn” registration form, Please fill the form with accurate and detailed information, then send email to cfp@geekcon.top with the registration form.
3. The Committee will qualify contestant to attend GeekPwn event within 5 working days. During the period, the committee may contact the contestant to ask for more information which can help to make the judgment.
4. When the contestant is qualified, the committee will setup and announce the device category. The device will be provided during GeekPwn event for contestant to demonstrate the Pwn technical approach.
5. After the contestant is qualified, contestant needs to sign non-disclosure agreement.
I want to be a spectator
No matter professionals or non-professionals, we welcome you to join if you like the Geek spirit. Please send your questions or ticket requests to ticket@geekcon.top. Please write in the email your name, contact method, address, your ticket requests, etc and we shall contact you soon.
Time | Ticket Price | Group Purchase(more than 3) |
Before 2015.9.26 | RMB 1680 | RMB 1280 |
2015.9.27-10.17 | RMB 2240 | RMB 1680 |
2015.10.18-10.24 | RMB 2800 | RMB 2240 |
Ticket fee will cover:
1. Participate Geekpwn on 10.24 and Geekon on 10.25
2. Two days buffet at noon
3. Small gifts
1. GeekPwn Open Class is held in China nationwide non-periodically. Please follow GeekPwn Wechat public account for registration information and the contents.
2. GeekPwn Training Camp 2015 has already finished. You can find the details in GeekPwn Wechat public account. Please pay attention to next year’s activities.
3、Geekon will open on Oct. 25th 2015. Please send your questions or ticket requests to ticket@geekcon.top. Please write in the email your name, contact method, address, your ticket requests, etc and we shall contact you soon.
Time | Ticket Price | Group Purchase(more than 3) |
Before 2015.9.26 | RMB 1680 | RMB 1280 |
2015.9.27-10.17 | RMB 2240 | RMB 1680 |
2015.10.18-10.24 | RMB 2800 | RMB 2240 |
Ticket fee will cover:
1. Participate Geekpwn on 10.24 and Geekon on 10.25
2. Two days buffet at noon
3. Small gifts
Yu Yang, known as Tombkeeper or TK, is one of the two winner worldwide of Microsoft security bounty program with 100 thousand USD for his research findings of mitigation bypass techniques. He is a veteran with rich experience in security research field and has abundant research results on vulnerabilities, malware etc. In addition, he independently found the techniques to break iPhone fingerprint identification mechanism and crack wireless RFID communication etc. He has great fame in security community with his high-quality presentations in CanSecWest, HITCon, XCon and many other security conferences. Now, he is head of Tencent XuanWu Security Research Lab.
Chen Liang, Chief Security Researcher of Keen Team, Leader of Keen Exploitation project. He is the key contributor of Keen Team to win Pwn2Own 2013 and 2014 with discovering the exploitation techniques on Windows and iOS. Keen Team is the only Pwn2Own winner team in China, and the only team to win Pwn2Own Mobile and PC contest worldwide.
Peter Hlavaty from Slovakia is a senior researcher of Keen Team. At Pwn2Own 2015 in Vancouver Canada, he represented Keen Team to compromise FLASH and get system privilege, thereby being awarded winner of this event. Peter focuses in the research on desktop OS, such as vulnerability analysis and exploitation analysis. He’s also progressively switching to vulnerability analysis and exploitation analysis of mobile OS. Currently he and his wife are living and working in China.
Dr. Wei Tao is the leader of Baidu Security Lab, and was Associate Professor of Beijing University. He is a Co-organizer of BitBlaze, well known security team in UC Berkeley. He is also a Co-founder of MITBBS. He has made great acheivements in both security academy and industry. He is now the leader of Baidu security lab, including sites of Beijing and San Francisco Bay Area. The lab is providing advanced security technology and ability to Baidu business.
Xu Hao, known as Windknown, key security researcher of Pangu Team, which is the first China team to accomplish iOS Jailbreak. His current focus is on OSX/iOS system security and application development. He also has rich research experience on Windows system security, including vulnerability, rootkit and virtualization. He has the fame in security community with high-quality presentations in XCon, POC, Syscan, Syscan360 and many other security conferences.
Wan Tao is a co-founder of IDF lab. He started to learn the technology of computer virus by himself since 1992. He has experienced and witnessed the development and evolvement course of China’s internet security and hacker industry. He worked for PwC, CAJinchen and IBM, and transformed from a financial auditor to a security architect of cloud computing. He delivered numbers of speeches on security conferences at home and abroad, such as Phdays in Russia, POC in South Korea, Hitcon in Taiwan. He is a man of wide interests. Currently he focuses in the researches and practices of threats information analysis, security of mobile internet and smart devices, photovoltaic station for home use and digital radio. He dedicated his spare time to technique commonweal. He contributed to establish 404 commonweal and Yiyun map for disaster relief, devoted to strike at abducting in children and disaster relief with technology, thereby being awarded top 10 annual charitarian by CCTV.
Dr. Zhuge Jianwei, is the Research Fellow of Network Science and Network Space Research Institute, and Network and Information Security Lab, Tsinghua University. He is the top lecturer and researcher on network and system security area, and supports the CCERT operations. He is also the leader of Blue Lotus CTF team (Tsinghua University), which entered DefCon CTF Finals for several times. The team is the first China team to enter CTF Finals.
Wang Yu loves everything regarding OS kernel, from the implementation of kernel architecture, driver programming, rootkit/anti-rootkit to hunting and exploiting of vulnerabilities, Android root. Currently, he’s working for a well known internet security company, engaged in the research of vulnerabilities and APT recognition. He delivered speeches on the conferences such as SysCan360 2012/2013, Hitcon 2013, Black Hat USA 2014.
Key member of 0x557, expert of vulnerability mining and exploitation, famous writer in security community. From year 2003, he discovered and published lots of web security issues, and presented lots of original exploitation techniques. He expanded his research areas to binary since year 2006, and had rich findings on PRC, kernel, Office, PDF and Flash vulnerabilities. He also worked on forensics tools of x86, ARM and MIPS platforms. Since year 2013, he got the fame in worldwide security community to submit hundreds of Internet Explorer vulnerabilities to Microsoft from the research team he leads.
Wu Shi, Chief Scientist of Keen Cloud Tech, head of Keen Team. He discovered hundreds of high-risk vulnerabilities on different operation systems in the past 14 years. He keeps the worldwide record of number of vulnerabilities discovered and reported. He led Keen Team to win ZDI Platinum Award for three consecutive years, and breakthrough the protection mechanism of latest version of Windows and iOS. In the year 2010, he was also nominated of Blackhat Pwnies award and it was the first nomination to China security researcher.
Dr. Du is the Vice President of Security Department of Alibaba Group. With over 15 years working experiences in network security, he has built up the network security emergency response team of China. He was the director of National Engineering Lab for Cyber Security Emergency Response Technology of China and National Cyber Security Technology Research Institute of China, and Vice President of APCERT (Asia-Pacific Computer Emergency Response Team ). He is also a part-time professor and tutor of Ph.D. students in several Universities. He has won first prize of National Science and Technology Progress Award of China, ISC2 Information Technology Expert Award, etc.
Mr. Yuan is a well-known guru-level representative of network security researchers and white-hat hackers in China. He was the first researcher in China who analyzed Windows system-level codes and found Windows 9X share codes, IIS Unicode vulnerabilities. He has worked in several well-known information security companies such as NSFOCUS, Qihu 360, etc.
Ding Liping is a researcher and a tutor of Ph.D. students in Institute of Software, Chinese Academy of Science. She is the Chief member of Computer Forensics Experts Committee in Chinese Institute of Electronics, Part-Time researcher of Law School in Renmin University of China and The Third Research Institute of Ministry of Public Security. She is also a part-time Professor of Central University of Finance and Economics, Beijing University of Technology and South China University of Technology, Senior Visiting Scholar of Network Defense Lab of North Carolina State University of USA. Her main research fields include Computer Forensics, Computer System Security and Trustworthy Computing. She has participated in over 6 important national science and technology projects as a main force.
Pan Zhuting, Chief Strategic Officer of Beijing Venus Information Technology Co., Ltd., top expert of information security system and theoretical research in China. He initialized several innovative security models and distinctive methodologies with his deep understanding and sharp insight on the revolution of security techniques. In Oct 2012, he was nominated and won the award “2012 China Top 10 Chief Technology Officer”.