BlueHatShanghai 2019 May 29, 2019 to May 29, 2019, Shanghai, China
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote | Erik Doerr | N/Are | |
China Cyber Landscape 2018 | Yunqian Zhu | Through multiple data resources analysis, the presentation will review the China's cybersecurity situation in 2018 ... | |
Liar Game: The Secret of Mitigation Bypass Techniques | Yunhai Zhang | In the past five years, we have developed a dozen or so mitigation bypass techniques, ... | |
Advances in Machine Learning at Microsoft Threat Protection | Christian Seifert | A security solution without machine learning is unthinkable today. Decisions need to be made within ... | |
Is my Container Secure? - Large-Scale Empirical Study on Container Vulnerabilities | Cecilia Guan | Container, as a lightweight virtualization technique, enable enterprise to automate many aspects of web application ... | |
Advanced Lateral Movement on Kubernetes Cluster | Zhaoyan Xu | Google's Kubernetes (aka k8s) has become the de facto standard for software container orchestration. As ... | |
Enhance Security Awareness with Data Mining: Data-driven Intrusion Detection Solutions in Alibaba Cloud | Yue Zheng | Today, with the breakthroughs achieved by machine learning one after another, more and more companies ... | |
From Dvr to See Exploit of IoT Device | Fan Wu | The security of IoT devices greets us because of its popularization in recent years. Our ... | |
Betrayal of Reputation: Trusting the Untrustable Hardware and Software with Reputation | Seunghun Han | Reputation is based on trust, and people normally trust the products produced by global companies ... | |
MesaTEE SGX: Redefining AI and Big Data Analysis with Intel SGX | Yu Ding | Intel SGX provides integrity and confidentiality guarantees on its "Secure Enclaves" to protect user's data. ... |