DEVELOP AND NURTURE TALENTS OF THE WORLD
QUANTIFY AND ENHANCE VALUE OF THE INDUSTRY
DEVELOP AND NURTURE
TALENTS OF THE WORLD
QUANTIFY AND ENHANCE
VALUE OF THE INDUSTRY
OCBC Arena @ Singapore Sports Hub
SEE YOU NEXT TIME
Kira Chen
Surviving MiraclePtr: Navigating of Webp and Beyond
John Doe
Can Airport X-ray Detection Machine Be Trusted?
Lianji Li
Changing Faces with AI Disguise Glasses
AVSS
Connie Lam
Friend or Foe: A Bridge Vulnerability About "Public and Friend"
Hao Ke
John Wu
Azhara Assanova
Hardening Android: Insights and Systemic Protections from Google's Front Lines
Contributors: Achim Thesmann, Nan Wu
Ye Wang
Yanze Zhang
Role Play Attack for Web3 DeFi Applications
Lars Fröder
Jailbreak Apple iOS16: Defeating Code Signing Using a PPL Bypass
John Doe
If Autonomous Driving Is Prone to Blinding...
Yifei Wu
Cuiying Gao
JD.com Security
The Secrets Behind Advertising Traffic
kangel
ttt
Nop
Hostile Takeovers within Cloud Hosts Part 1: From Guest to Host
Neoni
Hostile Takeovers within Cloud Hosts Part 2: From Host to Root
NWMonster
slipper
Unlocking Crypto Vulnerabilities: Insights into Hardware Wallet Security
Yichi Zhang
Can Large Models Be Fooled by Illusion?
Boris Larin
Operation Triangulation: Do Not Attack iPhones of Researchers!
Zhaofeng Chen
Yx
ModuleBomb: Persistent Blockchain Outage Attack
Peter Hlavaty
HyperV and Effective Ways of Fuzzing It for RCEs
Jay Turla
How Long Does it Take to Stealthily Unlock a Car?
YizheZhuang
Exploiting Steam: A Journey into Vulnerability Discovery of a CEF-based Application
Chao Zhang
Hai Zhao
Yue Liu
Defeating Self-protection of Chips
Lorant Szabo
Daniel Komaromy
Attacking Over the Air: Exploiting Basebands in Radio Layer Two
Kai Jern Lau
Redefine Reverse Engineering in Web3
Haixin Duan
Xiang Li
TuDoor in the DNS Wall: The Fastest DNS Cache Poisoning Attack
Zhutian Feng
Haojie He
Overlooked Bugs
Serious Impact
Dennis Giese
Braelynn
Could Smart Home Robots Become the Trojan Spying on Our Lives?
1 GEEKCON organizing committee (hereinafter referred to as "the committee") recognizes the technical capability of the winner individually, but doesn't acknowledge that it represents the capability of the winner's working organization.
2 We recognize and promote the comprehensive assessment of vulnerability exploitation capabilities and mitigation mechanisms from a confrontational perspective, and do not endorse the judgement of security levels of the target products involved in the event based on a single dimension or non-quantitative dimension.
3 The committee firmly follows the Responsible Disclosure principle. The committee and contestant commit not to disclose any details to third-party before manufactures fix the issues.
4 The committee advocates and encourages in-depth knowledge sharing and communication, but firmly opposes any speech and behavior that violates laws and regulations or infringes on the rights of others.
5 The committee guarantees that the participants' personal information will not be disclosed to third-party or used for commercial activities without their agreement and authentication.
6 We will set up awards and honors based on the research efforts, technical breakthrough, and technical innovation of the projects. As the top 1 security geek IP operator in China, we always advocate a reward mechanism that emphasizes both honor and moderate bounty, encouraging more geeks to participate in technical innovation and knowledge sharing.