BlueHatShanghai 2019 May 29, 2019 to May 29, 2019, Shanghai, China

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Erik Doerr N/Are
China Cyber Landscape 2018 Yunqian Zhu Through multiple data resources analysis, the presentation will review the China's cybersecurity situation in 2018 ...
Liar Game: The Secret of Mitigation Bypass Techniques Yunhai Zhang In the past five years, we have developed a dozen or so mitigation bypass techniques, ...
Advances in Machine Learning at Microsoft Threat Protection Christian Seifert A security solution without machine learning is unthinkable today. Decisions need to be made within ...
Is my Container Secure? - Large-Scale Empirical Study on Container Vulnerabilities Cecilia Guan Container, as a lightweight virtualization technique, enable enterprise to automate many aspects of web application ...
Advanced Lateral Movement on Kubernetes Cluster Zhaoyan Xu Google's Kubernetes (aka k8s) has become the de facto standard for software container orchestration. As ...
Enhance Security Awareness with Data Mining: Data-driven Intrusion Detection Solutions in Alibaba Cloud Yue Zheng Today, with the breakthroughs achieved by machine learning one after another, more and more companies ...
From Dvr to See Exploit of IoT Device Fan Wu The security of IoT devices greets us because of its popularization in recent years. Our ...
Betrayal of Reputation: Trusting the Untrustable Hardware and Software with Reputation Seunghun Han Reputation is based on trust, and people normally trust the products produced by global companies ...
MesaTEE SGX: Redefining AI and Big Data Analysis with Intel SGX Yu Ding Intel SGX provides integrity and confidentiality guarantees on its "Secure Enclaves" to protect user's data. ...