8月属于注定是网络安全的月份,从这周开始安全会议不断,Blackhat、Defcon、CNCERT的年会、阿里网络安全生态会、Kcon、腾讯CSS峰会、Xcon、微步情报大会。可能由于国内的已经够多了,今年似乎没有看到太多blackhat的报道,所以只能靠自己凑合看了下。
Blachat会议两天一共118个议题,214个演讲者。过了一遍议题简介第一个感受是黑客的世界仍然保持着无比精彩,安全不仅仅是AI,不仅仅是ML,即便还是Web,二进制这些领域,其研究的要素组件都是前所未有的,科技化使生活的越来越精彩丰富便利,而黑客的眼里这都一片全新的领域而且在其中还游刃有余。
另外一个新奇点是,不知道从什么时候开始,竟然多了这么多关注搬砖工程师心理健康的方面的议题。

万能的google翻译几乎已经可以大概说明白议题的大概方向了,这里就不一一介绍了。今年特别关注了一下演讲人,这里简单的归为三类,甲方科技巨头、乙方安全公司、第三方组织(政府机构、学校、研究组织、独立研究者等等)

总体来说还是乙方的人数较多,但是出现了很多不同类型的领域的厂商了。如今已经不是清一色的杀毒厂商或者NGFW厂商了。Fireeye似乎也不见了踪影。排除了独立研究人员之后的top10演讲人员组织,可以此了解一下有意思的一些新晋安全厂商或者甲方的最佳实践。
演讲组织  | 演讲人数  | 
Microsoft  | 10  | 
Riscure  | 9  | 
Tencent Keen Security Lab  | 8  | 
6  | |
Graz University of Technology  | 6  | 
EURECOM  | 5  | 
IBM Research  | 5  | 
Duo Security  | 4  | 
Endgame  | 4  | 
Global Commission on the Stability of Cyberspace  | 4  | 
KAIST  | 4  | 
Positive Technologies  | 4  | 
其他的乙方公司按演讲顺序简单整理如下,可以感受一下还有剩多少是熟悉的面孔。
VirusBay
Kaspersky
GoSecure
Endgame
Duo Security
Sophos
Riscure
Trail of Bits
Leviathan Security Group
Nozomi Networks
DarkMatter
ZwillGen PLLC
River Loop Security
Eclypsium
PwC
Trimarc
SpecterOps
Immunity Inc
Shostack & Associates
DEVCORE
leveldown security
Cylance Inc
NewAE Technology Inc
Trustwave SpiderLabs
Dragos Inc
Digita Security
Terbium Labs
Cymptom
Positive Technologies
F5 Networks
CrowdStrike Inc
Winsider Seminars & Solutions
Quarkslab
Fleetsmith
Forcepoint
Hex-Rays SA
Lookout
IBM Research
Threatcare
Cisco
NCC Group
G DATA Advanced Analytics
McAfee
IOActive
ForAllSecure
RSM Partners
PortSwigger Web Security
Bastille Networks
Whitescope
QED
HORNE Cyber
Secarma Ltd
Red Sky Solutions,LLC
RSA Security
Tripwire VERT
时间仓促就未对厂商类型再做进一步分类分析了。最后附上议题,供各位与会者参考一下,同一个时间段有上10个议题,也就只能选一个方向听一下了。
Keynote  | Optimistic Dissatisfaction with the Status Quo: Steps We Must Take to Improve Security in Complex Landscapes  | WEDNESDAY | 9:00AM  | 
AWS上检测凭证被窃  | Detecting Credential Compromise in AWS  | WEDNESDAY | 10:30AM  | 
识别online scanners  | Dissecting Non-Malicious Artifacts: One IP at a Time  | WEDNESDAY | 10:30AM  | 
ESI引擎漏洞挖掘  | Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparent Session Hijacking  | WEDNESDAY | 10:30AM  | 
钓鱼邮件安全意识  | Exposing the Bait: A Qualitative Look at the Impact of Autonomous Peer Communication to Enhance Organizational Phishing Detection  | WEDNESDAY | 10:30AM  | 
Xori自动反编译分析恶意软件  | Finding Xori: Malware Analysis Triage with Automated Disassembly  | WEDNESDAY | 10:30AM  | 
安全从业人员人文关怀  | Holding on for Tonight: Addiction in InfoSec  | WEDNESDAY | 10:30AM  | 
SBOM物联网政策  | How I Learned to Stop Worrying and Love the SBOM  | WEDNESDAY | 10:30AM  | 
恶意软件检测  | Measuring the Speed of the Red Queen's Race; Adaption and Evasion in Malware  | WEDNESDAY | 10:30AM  | 
硬件钱包  | Software Attacks on Hardware Wallets  | WEDNESDAY | 10:30AM  | 
Hyper-V漏洞挖掘  | A Dive in to Hyper-V Architecture & Vulnerabilities  | WEDNESDAY | 11:15AM  | 
以太坊智能合约区块链漏洞挖掘  | Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths  | WEDNESDAY | 11:15AM  | 
深度学习神经网络做安全检测  | Deep Neural Networks for Hackers: Methods, Applications, and Open Source Tools  | WEDNESDAY | 11:15AM  | 
机器人的法律探讨  | From Bot to Robot: How Abilities and Law Change with Physicality  | WEDNESDAY | 11:15AM  | 
Keen team的iOS越狱  | KeenLab iOS Jailbreak Internals: Userland Read-Only Memory can be Dangerous  | WEDNESDAY | 11:15AM  | 
Miasm工程框架  | Miasm: Reverse Engineering Framework  | WEDNESDAY | 11:15AM  | 
JavaScript引擎内置的即时(JIT)编译器漏洞挖掘  | New Trends in Browser Exploitation: Attacking Client-Side JIT Compilers  | WEDNESDAY | 11:15AM  | 
黑客与压力  | Stress and Hacking: Understanding Cognitive Stress in Tactical Cyber Ops  | WEDNESDAY | 11:15AM  | 
TRITON工控  | TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of Industrial Control Systems, Forever  | WEDNESDAY | 11:15AM  | 
软件定义SD-WAN攻击  | CANCELLED: Too Soft[ware Defined] Networks: SD-WAN VulnerabilityAssessment  | WEDNESDAY | 1:30PM  | 
VPN攻击  | Compression Oracle Attacks on VPN Networks  | WEDNESDAY | 1:30PM  | 
ICS防火墙  | Deep Dive into an ICS Firewall, Looking for the Fire Hole  | WEDNESDAY | 1:30PM  | 
法律政策  | Legal Landmines: How Law and Policy are Rapidly Shaping Information Security  | WEDNESDAY | 1:30PM  | 
地缘政治与恶意软件分析  | No Royal Road … Notes on Dangerous Game  | WEDNESDAY | 1:30PM  | 
UEFI firmware固件攻击  | Remotely Attacking System Firmware  | WEDNESDAY | 1:30PM  | 
无线SD卡攻击  | Reversing a Japanese Wireless SD Card - From Zero to Code Execution  | WEDNESDAY | 1:30PM  | 
侧信道攻击解密  | Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers  | WEDNESDAY | 1:30PM  | 
汽车固件ECU攻击  | There will be Glitches: Extracting and Analyzing Automotive Firmware Efficiently  | WEDNESDAY | 1:30PM  | 
检测twitter机器人  | Don't @ Me: Hunting Twitter Bots at Scale  | WEDNESDAY | 2:40PM  | 
ROSE远程在线社工  | Every ROSE has its Thorn: The Dark Art of Remote Online Social Engineering  | WEDNESDAY | 2:40PM  | 
工作站到域控的攻击  | From Workstation to Domain Admin: Why Secure Administration isn't Secure and How to Fix it  | WEDNESDAY | 2:40PM  | 
Meltdown详解  | Meltdown: Basics, Details, Consequences  | WEDNESDAY | 2:40PM  | 
黑客的心理健康  | Mental Health Hacks: Fighting Burnout, Depression and Suicide in the Hacker Community  | WEDNESDAY | 2:40PM  | 
Sysmon高级玩法  | Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology  | WEDNESDAY | 2:40PM  | 
BMC攻击  | The Unbearable Lightness of BMC's  | WEDNESDAY | 2:40PM  | 
威胁建模  | Threat Modeling in 2018: Attacks, Impacts and Other Updates  | WEDNESDAY | 2:40PM  | 
WireGuard密码学攻击VPN  | WireGuard: Next Generation Secure Network Tunnel  | WEDNESDAY | 2:40PM  | 
iOS 11的async_wake漏洞利用  | A Brief History of Mitigation: The Path to EL1 in iOS 11  | WEDNESDAY | 4:00PM  | 
Meltdown漏洞响应的背后故事  | Behind the Speculative Curtain: The True Story of Fighting Meltdown and Spectre  | WEDNESDAY | 4:00PM  | 
新型web攻击面path normalization漏洞挖掘  | Breaking Parser Logic: Take Your Path Normalization off and Pop 0days Out!  | WEDNESDAY | 4:00PM  | 
工控网关漏洞  | Breaking the IIoT: Hacking industrial Control Gateways  | WEDNESDAY | 4:00PM  | 
LET网络注入恶意包  | LTE Network Automation Under Threat  | WEDNESDAY | 4:00PM  | 
针对用于移动和物联网设备的微软Cortana攻击  | Open Sesame: Picking Locks with Cortana  | WEDNESDAY | 4:00PM  | 
GO语言漏洞  | Squeezing a Key through a Carry Bit  | WEDNESDAY | 4:00PM  | 
X86架构下的提取漏洞  | Why so Spurious? How a Highly Error-Prone x86/x64 CPU "Feature" can be Abused to Achieve Local Privilege Escalation on Many Operating Systems  | WEDNESDAY | 4:00PM  | 
零信任网络的威胁  | ZEROing Trust: Do Zero Trust Approaches Deliver Real Security?  | WEDNESDAY | 4:00PM  | 
AFL的盲点  | AFL's Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries  | WEDNESDAY | 5:05PM  | 
加密货币IOTA的攻击  | A Tangled Curl: Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme  | WEDNESDAY | 5:05PM  | 
KVM Hypervisor安全设计  | Back to the Future: A Radical Insecure Design of KVM on ARM  | WEDNESDAY | 5:05PM  | 
区块链分散和抗删除的域名技术对抗  | Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure  | WEDNESDAY | 5:05PM  | 
安全社区的X骚扰事件  | How can Communities Move Forward After Incidents of Sexual Harassment or Assault?  | WEDNESDAY | 5:05PM  | 
开源工具ChipWhisperer-Lint在硬件侧信到攻击中使用  | I, for One, Welcome Our New Power Analysis Overlords  | WEDNESDAY | 5:05PM  | 
腐败对信息安全社区的影响  | InfoSec Philosophies for the Corrupt Economy  | WEDNESDAY | 5:05PM  | 
黑手党是否接管了网络犯罪  | Is the Mafia Taking Over Cybercrime?  | WEDNESDAY | 5:05PM  | 
针对物理隔离Air-Gap的攻击  | The Air-Gap Jumpers  | WEDNESDAY | 5:05PM  | 
安卓ARTist逆向分析工具  | ARTist - A Novel Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware  | THURSDAY | 9:00AM  | 
网络安全的PTSD创伤后应激障碍  | Demystifying PTSD in the Cybersecurity Environment  | THURSDAY | 9:00AM  | 
基于主机的Mac OS防火墙研究  | Fire & Ice: Making and Breaking macOS Firewalls  | THURSDAY | 9:00AM  | 
WinVote Voting Machines必胜投票机取证  | Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines  | THURSDAY | 9:00AM  | 
用网上情报资源预测支付欺诈  | Money-rity Report: Using Intelligence to Predict the Next Payment Card Fraud Victims  | THURSDAY | 9:00AM  | 
deception欺骗检测技术的弱点  | Real Eyes, Realize, Real Lies: Beating Deception Technologies  | THURSDAY | 9:00AM  | 
BlackBerry产品安全管理经验  | Stop that Release, There's a Vulnerability!  | THURSDAY | 9:00AM  | 
WebAssembly漏洞挖掘  | The Problems and Promise of WebAssembly  | THURSDAY | 9:00AM  | 
YubiKey双因子  | Two-Factor Authentication, Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key  | THURSDAY | 9:00AM  | 
ATM机攻击设备  | Black Box is Dead. Long Live Black Box!  | THURSDAY | 9:45AM  | 
SSO SAML漏洞挖掘  | Identity Theft: Attacks on SSO Systems  | THURSDAY | 9:45AM  | 
内核攻击  | Kernel Mode Threats and Practical Defenses  | THURSDAY | 9:45AM  | 
网络安全外交  | New Norms and Policies in Cyber-Diplomacy  | THURSDAY | 9:45AM  | 
VSS备份特性攻击  | Reconstruct the World from Vanished Shadow: Recovering Deleted VSS Snapshots  | THURSDAY | 9:45AM  | 
iot领域蜂窝设备的漏洞挖掘  | Snooping on Cellular Gateways and Their Critical Role in ICS  | THURSDAY | 9:45AM  | 
女网络安全工程师的招聘  | The Science of Hiring and Retaining Female Cybersecurity Engineers  | THURSDAY | 9:45AM  | 
针对Windows Notification的攻击  | The Windows Notification Facility: Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet  | THURSDAY | 9:45AM  | 
构造语音认证攻击  | Your Voice is My Passport  | THURSDAY | 9:45AM  | 
macOS MDM安全  | A Deep Dive into macOS MDM (and How it can be Compromised)  | THURSDAY | 11:00AM  | 
对机器学习算法的攻击  | AI & ML in Cyber Security - Why Algorithms are Dangerous  | THURSDAY | 11:00AM  | 
交易安全Trading Stocks  | Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies  | THURSDAY | 11:00AM  | 
微码安全研究  | Decompiler Internals: Microcode  | THURSDAY | 11:00AM  | 
检测恶意云账号行为  | Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform Capabilities  | THURSDAY | 11:00AM  | 
针对OpenPGP and S/MIME攻击  | Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels  | THURSDAY | 11:00AM  | 
x86处理器的硬件后门  | GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs  | THURSDAY | 11:00AM  | 
医疗领域hl7协议漏洞挖掘  | Pestilential Protocol: How Unsecure HL7 Messages Threaten Patient Lives  | THURSDAY | 11:00AM  | 
移动端的监听技术  | Stealth Mango and the Prevalence of Mobile Surveillanceware  | THURSDAY | 11:00AM  | 
自动驾驶的安全  | Applied Self-Driving Car Security  | THURSDAY | 12:10PM  | 
视频水印的攻击  | None of My Pixel is Your Business: Active Watermarking Cancellation Against Video Streaming Service  | THURSDAY | 12:10PM  | 
智慧城市的漏洞挖掘  | Outsmarting the Smart City  | THURSDAY | 12:10PM  | 
TLS 1.3安全  | Playback: A TLS 1.3 Story  | THURSDAY | 12:10PM  | 
增强机器学习抗攻击能力  | Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks  | THURSDAY | 12:10PM  | 
域控攻击  | So I became a Domain Controller  | THURSDAY | 12:10PM  | 
TLB的侧信道攻击  | TLBleed: When Protecting Your CPU Caches is Not Enough  | THURSDAY | 12:10PM  | 
WebAssembly漏洞挖掘  | WebAssembly: A New World of Native Exploits on the Browser  | THURSDAY | 12:10PM  | 
缓解speculative漏洞的故事  | Wrangling with the Ghost: An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities  | THURSDAY | 12:10PM  | 
关于DRAM的漏洞Rowhammer  | Another Flip in the Row  | THURSDAY | 2:30PM  | 
反序列化漏洞自动发现  | Automated Discovery of Deserialization Gadget Chains  | THURSDAY | 2:30PM  | 
社工攻击研究  | Catch me, Yes we can! – Pwning Social Engineers using Natural Language Processing Techniques in Real-Time  | THURSDAY | 2:30PM  | 
智能手机baseband攻击  | Exploitation of a Modern Smartphone Baseband  | THURSDAY | 2:30PM  | 
自动漏洞利用(内核)  | From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities  | THURSDAY | 2:30PM  | 
Autism Spectrum Disorder研究  | How can Someone with Autism Specifically Enhance the Cyber Security Workforce?  | THURSDAY | 2:30PM  | 
SATCOM安全研究  | Last Call for SATCOM Security  | THURSDAY | 2:30PM  | 
iot漏洞的合法责任  | Legal Liability for IOT Cybersecurity Vulnerabilities  | THURSDAY | 2:30PM  | 
widnows Defender的仿真器  | Windows Offender: Reverse Engineering Windows Defender's Antivirus Emulator  | THURSDAY | 3:50PM  | 
mPOSl漏洞挖掘  | For the Love of Money: Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems  | THURSDAY | 3:50PM  | 
微软OSR团队对Hyper-V漏洞的挖掘  | Hardening Hyper-V through Offensive Security Research  | THURSDAY | 3:50PM  | 
IoT恶意软件的综合调查分析框架  | IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies  | THURSDAY | 3:50PM  | 
通过深度学习来帮助侧信道攻击  | Lowering the Bar: Deep Learning for Side Channel Analysis  | THURSDAY | 3:50PM  | 
大型机漏洞挖掘  | Mainframe [z/OS] Reverse Engineering and Exploit Development  | THURSDAY | 3:50PM  | 
web缓存中毒攻击  | Practical Web Cache Poisoning: Redefining 'Unexploitable'  | THURSDAY | 3:50PM  | 
小型组织创建SDL的实践  | SDL That Won't Break the Bank  | THURSDAY | 3:50PM  | 
无线电紧急系统的攻击  | SirenJack: Cracking a 'Secure' Emergency Warning Siren System  | THURSDAY | 3:50PM  | 
植入式医疗设备的漏洞挖掘  | Understanding and Exploiting Implanted Medical Devices  | THURSDAY | 3:50PM  | 
docker攻击  | An Attacker Looks at Docker: Approaching Multi-Container Applications  | THURSDAY | 5:00PM  | 
IBM的AI攻击DeepLocker研究DeepLocker - Concealing Targeted Attacks with AI Locksmithing  | DeepLocker - Concealing Targeted Attacks with AI Locksmithing  | THURSDAY | 5:00PM  | 
模糊测试Fuzz研究  | Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina  | THURSDAY | 5:00PM  | 
PHP的非序列漏洞研究  | It's a PHP Unserialization Vulnerability Jim  | THURSDAY | 5:00PM  | 
NOC BH统计分析报告  | Lessons and Lulz: The 4th Annual Black Hat USA NOC Report  | THURSDAY | 5:00PM  | 
NOC报告  | Lessons and Lulz: The 4th Annual Black Hat USA NOC Report  | THURSDAY | 5:00PM  | 
Keen team对特斯拉攻击的分享  | Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars  | THURSDAY | 5:00PM  | 
TLS漏洞分析  | Return of Bleichenbacher's Oracle Threat (ROBOT)  | THURSDAY | 5:00PM  | 
SDN的渗透测试框架  | The Finest Penetration Testing Framework for Software-Defined Networks  | THURSDAY | 5:00PM  | 
移动恶意软件攻击技术分析  | Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library  | THURSDAY | 5:00PM  | 
声明:本文来自张三丰的疯言疯语,版权归作者所有。文章内容仅代表作者独立观点,不代表安全内参立场,转载目的在于传递更多信息。如有侵权,请联系 anquanneican@163.com。