{"id":410,"date":"2024-03-19T08:29:40","date_gmt":"2024-03-19T08:29:40","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbxphdays\/?page_id=410"},"modified":"2024-05-24T16:26:17","modified_gmt":"2024-05-24T16:26:17","slug":"elementor-410","status":"publish","type":"page","link":"https:\/\/conference.hitb.org\/hitbxphdays\/","title":{"rendered":"Home (Redesign)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"410\" class=\"elementor elementor-410\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-3e9eaa4b elementor-section-full_width elementor-section-height-full elementor-section-items-stretch elementor-section-content-middle elementor-section-height-default\" data-id=\"3e9eaa4b\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-21fba229\" data-id=\"21fba229\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-36b3f796 elementor-widget elementor-widget-text-editor\" data-id=\"36b3f796\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>A deep-knowledge security conference and gathering<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-7a7847d9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7a7847d9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-5dd09ae\" data-id=\"5dd09ae\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5ddbe9e7 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"5ddbe9e7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/HITB-logo-regular-300x300.png\" class=\"attachment-medium size-medium wp-image-347\" alt=\"\" srcset=\"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/HITB-logo-regular-300x300.png 300w, https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/HITB-logo-regular-150x150.png 150w, https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/HITB-logo-regular-768x768.png 768w, https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/HITB-logo-regular-400x400.png 400w, https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/HITB-logo-regular-600x600.png 600w, https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/HITB-logo-regular-100x100.png 100w, https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/elementor\/thumbs\/HITB-logo-regular-ql89ckcbr6c46njpbvn6175x82wq7lkb0draqnsq5w.png 50w, https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/HITB-logo-regular.png 900w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29c51ba8 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"29c51ba8\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/phdays.com\/en\/\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"3613\" height=\"1675\" src=\"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/3_PHD2_logo_short_monochrome-white.png\" class=\"attachment-full size-full wp-image-340\" alt=\"\" srcset=\"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/3_PHD2_logo_short_monochrome-white.png 3613w, https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/3_PHD2_logo_short_monochrome-white-300x139.png 300w, https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/3_PHD2_logo_short_monochrome-white-1024x475.png 1024w, https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/3_PHD2_logo_short_monochrome-white-768x356.png 768w, https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/3_PHD2_logo_short_monochrome-white-1536x712.png 1536w, https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/3_PHD2_logo_short_monochrome-white-2048x949.png 2048w, https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/3_PHD2_logo_short_monochrome-white-600x278.png 600w\" sizes=\"(max-width: 3613px) 100vw, 3613px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f52f6fc elementor-widget elementor-widget-heading\" data-id=\"1f52f6fc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">\/\/ HITB x PHDays<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-268d0b3c elementor-widget elementor-widget-text-editor\" data-id=\"268d0b3c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Saturday, May 25th &#8211; Level M, Residence, Grand Hyatt Erawan Bangkok<br><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-30edf5e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"30edf5e\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-8f7378e\" data-id=\"8f7378e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-544759bd eael_simple_menu_hamburger_disable_selected_menu_hide eael-hamburger--none elementor-widget__width-auto eael-simple-menu-hamburger-align-left elementor-hidden-mobile elementor-widget elementor-widget-eael-simple-menu\" data-id=\"544759bd\" data-element_type=\"widget\" data-widget_type=\"eael-simple-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t            <div data-hamburger-icon=\"&lt;svg aria-hidden=&quot;true&quot; class=&quot;e-font-icon-svg e-fas-bars&quot; viewBox=&quot;0 0 448 512&quot; xmlns=&quot;http:\/\/www.w3.org\/2000\/svg&quot;&gt;&lt;path d=&quot;M16 132h416c8.837 0 16-7.163 16-16V76c0-8.837-7.163-16-16-16H16C7.163 60 0 67.163 0 76v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16z&quot;&gt;&lt;\/path&gt;&lt;\/svg&gt;\" data-indicator-icon=\"&lt;svg aria-hidden=&quot;true&quot; class=&quot;e-font-icon-svg e-fas-angle-down&quot; viewBox=&quot;0 0 320 512&quot; xmlns=&quot;http:\/\/www.w3.org\/2000\/svg&quot;&gt;&lt;path d=&quot;M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z&quot;&gt;&lt;\/path&gt;&lt;\/svg&gt;\" data-dropdown-indicator-icon=\"&lt;svg class=&quot;e-font-icon-svg e-fas-angle-down&quot; viewBox=&quot;0 0 320 512&quot; xmlns=&quot;http:\/\/www.w3.org\/2000\/svg&quot;&gt;&lt;path d=&quot;M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z&quot;&gt;&lt;\/path&gt;&lt;\/svg&gt;\" class=\"eael-simple-menu-container eael-simple-menu-align-center eael-simple-menu--stretch eael-simple-menu-dropdown-align-left preset-1\" data-hamburger-breakpoints=\"{&quot;mobile&quot;:&quot;Mobile Portrait (&gt; 767px)&quot;,&quot;tablet&quot;:&quot;Tablet Portrait (&gt; 1024px)&quot;,&quot;desktop&quot;:&quot;Desktop (&gt; 2400px)&quot;,&quot;none&quot;:&quot;None&quot;}\" data-hamburger-device=\"none\">\n                <ul id=\"menu-main\" class=\"eael-simple-menu eael-simple-menu-dropdown-animate-to-top eael-simple-menu-indicator eael-hamburger-left eael-simple-menu-horizontal\"><li id=\"menu-item-342\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-342\"><a href=\"\/hitbxphdays\/#about\">About<\/a><\/li>\n<li id=\"menu-item-343\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-343\"><a href=\"\/hitbxphdays\/#agenda\">Agenda<\/a><\/li>\n<li id=\"menu-item-341\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-341\"><a href=\"\/hitbxphdays\/#speakers\">Speakers<\/a><\/li>\n<li id=\"menu-item-345\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-345\"><a href=\"\/hitbxphdays\/#talks\">Talks<\/a><\/li>\n<li id=\"menu-item-344\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-344\"><a href=\"\/hitbxphdays\/#venue\">Venue<\/a><\/li>\n<\/ul>                <button class=\"eael-simple-menu-toggle\">\n                    <span class=\"sr-only \">Humberger Toggle Menu<\/span>\n                    <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-bars\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M16 132h416c8.837 0 16-7.163 16-16V76c0-8.837-7.163-16-16-16H16C7.163 60 0 67.163 0 76v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16z\"><\/path><\/svg>                <\/button>\n            <\/div>\n            \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32b2083 elementor-widget__width-auto top-login-button elementor-widget elementor-widget-button\" data-id=\"32b2083\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/hitbxphdays\/login\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">LOGIN<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ca27f3 elementor-widget__width-auto nav-cart-icon elementor-widget elementor-widget-button\" data-id=\"9ca27f3\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Cart<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-450ad264 elementor-section-full_width elementor-section-height-full elementor-section-height-default elementor-section-items-middle\" data-id=\"450ad264\" data-element_type=\"section\" id=\"about\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b026b1f\" data-id=\"b026b1f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73ee4f7e elementor-hidden-mobile elementor-widget elementor-widget-eael-countdown\" data-id=\"73ee4f7e\" data-element_type=\"widget\" data-widget_type=\"eael-countdown.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n\t\t<div class=\"eael-countdown-wrapper\" data-countdown-id=\"73ee4f7e\" data-expire-type=\"none\" data-countdown-type=\"due_date\">\n\t\t\t<div class=\"eael-countdown-container eael-countdown-label-block eael-countdown-label-inline-tablet  \">\n\t\t\t\t<ul id=\"eael-countdown-73ee4f7e\" class=\"eael-countdown-items\" data-date=\"May 25 2024 12:00:00 +0\">\n\t\t\t\t\t<li class=\"eael-countdown-item\"><div class=\"eael-countdown-days\"><span data-days class=\"eael-countdown-digits\">00<\/span><span class=\"eael-countdown-label\">Days<\/span><\/div><\/li>\t\t\t\t\t<li class=\"eael-countdown-item\"><div class=\"eael-countdown-hours\"><span data-hours class=\"eael-countdown-digits\">00<\/span><span class=\"eael-countdown-label\">Hours<\/span><\/div><\/li>\t\t\t\t<li class=\"eael-countdown-item\"><div class=\"eael-countdown-minutes\"><span data-minutes class=\"eael-countdown-digits\">00<\/span><span class=\"eael-countdown-label\">Minutes<\/span><\/div><\/li>\t\t\t\t<li class=\"eael-countdown-item\"><div class=\"eael-countdown-seconds\"><span data-seconds class=\"eael-countdown-digits\">00<\/span><span class=\"eael-countdown-label\">Seconds<\/span><\/div><\/li>\t\t\t\t<\/ul>\n                <div class=\"eael-countdown-expiry-template\" style=\"display: none;\">\n\t\t\t\t\t                <\/div>\n\t\t\t\t<div class=\"clearfix\"><\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e2a1ef1 elementor-widget elementor-widget-text-editor\" data-id=\"1e2a1ef1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><b>Join us in Bangkok for a security get-together featuring some of the regions hottest network security researchers!<\/b><br>&#8211; Held in collaboration with Postive Hack Days Festival in Moscow &#8211;&nbsp;<\/p>\n<p>_________________________________________<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1de4830c elementor-widget elementor-widget-text-editor\" data-id=\"1de4830c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>\u00a0<\/p><p>PHDays is the oldest and biggest cybersec event in Russia that\u2019s been held annually since 2011. It brings together renowned international cybersecurity and IT experts to discuss offensive and defensive security, application security, Devsecops, AI, and more.<\/p><p>For the second year in a row PHDays offers cybersecurity awareness content for general public, in 2023 a total of 140 000 spectators visited PHDays Fest in the famous Gorky Park in Moscow. This year the PHDays main event will be held at the Luzhniki stadium that hosted the FIFA World Cup Final in 2018.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ccd2e3a elementor-widget elementor-widget-text-editor\" data-id=\"ccd2e3a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #ffffff;\"><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a192b9 elementor-widget elementor-widget-text-editor\" data-id=\"4a192b9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<a href=\"#\" class=\"hitb_add_to_cart btn-hitb-addtocart\" data-ticket-type=\"IN-PERSON\" data-event-id=\"41\" data-ticket-id=\"357\" role=\"button\">REGISTER<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-9bc31b9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9bc31b9\" data-element_type=\"section\" id=\"agenda\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2dd23e27\" data-id=\"2dd23e27\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-46f4e765 elementor-widget elementor-widget-heading\" data-id=\"46f4e765\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">\/ AGENDA<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-8c21908 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8c21908\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3dfa63f7\" data-id=\"3dfa63f7\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4c5be4f3 elementor-widget elementor-widget-text-editor\" data-id=\"4c5be4f3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>11:00<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5f8a4d60\" data-id=\"5f8a4d60\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d0e4c61 elementor-widget elementor-widget-text-editor\" data-id=\"5d0e4c61\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><b>WELCOME DRINKS<\/b><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-4ee15021 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4ee15021\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1f3afa38\" data-id=\"1f3afa38\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a9b675c elementor-widget elementor-widget-text-editor\" data-id=\"2a9b675c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>12:30<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3e046f91\" data-id=\"3e046f91\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-581eac elementor-widget elementor-widget-text-editor\" data-id=\"581eac\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><a href=\"#talk001\"><b><span style=\"color: #ffffff;\"><span style=\"color: #75fb71;\">Talk 001 &#8211; Attacking Organizations with Big Scopes: From Zero to Hero<\/span><\/span><\/b><\/a><br \/>Hussein Daher (@HusseiN98D)<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-2a907caf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2a907caf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4a4f0c8\" data-id=\"4a4f0c8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-440e9160 elementor-widget elementor-widget-text-editor\" data-id=\"440e9160\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>13:15<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2f0480fd\" data-id=\"2f0480fd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a45686b elementor-widget elementor-widget-text-editor\" data-id=\"a45686b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><a href=\"#talk002\"><b><span style=\"color: #ffffff;\"><span style=\"color: #75fb71;\">Talk 002 &#8211; SW-RASP &#8211; Java Self Protection Defense<\/span><\/span><\/b><\/a><br \/>Ming Hu<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-7c5b7d84 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7c5b7d84\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7252d95c\" data-id=\"7252d95c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-66efd097 elementor-widget elementor-widget-text-editor\" data-id=\"66efd097\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>14:00<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-794c3fe0\" data-id=\"794c3fe0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-126a5d00 elementor-widget elementor-widget-text-editor\" data-id=\"126a5d00\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><a href=\"#talk003\"><b><span style=\"color: #ffffff;\"><span style=\"color: #75fb71;\">Talk 003 &#8211; Critical Proof Forgery Attack on zkEVM<\/span><\/span><\/b><\/a><br \/>Uyen Nguyen &amp; Thanh Nguyen (@redragonvn)<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-5e9e5263 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5e9e5263\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6f7b15bd\" data-id=\"6f7b15bd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4285ebfd elementor-widget elementor-widget-text-editor\" data-id=\"4285ebfd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>14:45<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-38a2d915\" data-id=\"38a2d915\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69a21e47 elementor-widget elementor-widget-text-editor\" data-id=\"69a21e47\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><a href=\"#talk004\"><b><span style=\"color: #ffffff;\"><span style=\"color: #75fb71;\">Talk 004 &#8211; XPost: A Post Exploitation Tool for High Value Systems<\/span><\/span><\/b><\/a><br \/>Linhong Cao (@skay_00)<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-4de04b67 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4de04b67\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2fd004b6\" data-id=\"2fd004b6\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-31de89de elementor-widget elementor-widget-text-editor\" data-id=\"31de89de\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>15:30<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-42e63ac3\" data-id=\"42e63ac3\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d43e419 elementor-widget elementor-widget-text-editor\" data-id=\"4d43e419\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><b>COFFEE BREAK<\/b><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-3b5e1789 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3b5e1789\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5f8de27d\" data-id=\"5f8de27d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-44b821cf elementor-widget elementor-widget-text-editor\" data-id=\"44b821cf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>16:00<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-172a0fd2\" data-id=\"172a0fd2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-de2e788 elementor-widget elementor-widget-text-editor\" data-id=\"de2e788\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><b><span style=\"color: #ffffff;\"><span style=\"color: #75fb71;\">Talk 005 &#8211;\u00a0<\/span><\/span><\/b><a href=\"#talk005\"><b><span style=\"color: #ffffff;\"><span style=\"color: #75fb71;\">A Privilege Escalation Exploit in Windows That Microsoft Won&#8217;t Fix<\/span><\/span><\/b><\/a><br \/>BeichenDream<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-9a53b94 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9a53b94\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-69cd020a\" data-id=\"69cd020a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3fb2ff49 elementor-widget elementor-widget-text-editor\" data-id=\"3fb2ff49\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>16:45<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-645f7fa6\" data-id=\"645f7fa6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6d5fc0d elementor-widget elementor-widget-text-editor\" data-id=\"6d5fc0d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><a href=\"#talk006\"><b><span style=\"color: #ffffff;\"><span style=\"color: #75fb71;\">Talk 006 &#8211; Escaping Sandboxes on Windows <\/span><\/span><\/b><\/a><br \/>Dr. Zhiniang Peng (@edwardzpeng)<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-6ca6fa83 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6ca6fa83\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4249300f\" data-id=\"4249300f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-75870683 elementor-widget elementor-widget-text-editor\" data-id=\"75870683\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>17:30<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-15ee9a13\" data-id=\"15ee9a13\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f3dba78 elementor-widget elementor-widget-text-editor\" data-id=\"f3dba78\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><b><span style=\"color: #ffffff;\"><span style=\"color: #75fb71;\">Talk 007 &#8211;\u00a0<\/span><\/span><\/b><a href=\"#talk007\"><b><span style=\"color: #ffffff;\"><span style=\"color: #75fb71;\">A Bug Hunter&#8217;s Reflections on Fuzzing<\/span><\/span><\/b><\/a><br \/>Alexander Popov (@a13xp0p0v)<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-6aa13a36 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6aa13a36\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-682e3036\" data-id=\"682e3036\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-35d877c2 elementor-widget elementor-widget-text-editor\" data-id=\"35d877c2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>18:15<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3aaad1b9\" data-id=\"3aaad1b9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6fd885b2 elementor-widget elementor-widget-text-editor\" data-id=\"6fd885b2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><a href=\"#talk008\"><b><span style=\"color: #ffffff;\"><span style=\"color: #75fb71;\">Talk 008 &#8211; Javascript Engine Vulnerability Research &#8211; State of the Art<\/span><\/span><\/b><\/a><br \/>Alisa Esage (@alisaesage)<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-44d5e5e1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"44d5e5e1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1cb078b4\" data-id=\"1cb078b4\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1ea8ab0e elementor-widget elementor-widget-text-editor\" data-id=\"1ea8ab0e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>19:00 &#8211; 21:00<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7c82750a\" data-id=\"7c82750a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2b424096 elementor-widget elementor-widget-text-editor\" data-id=\"2b424096\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><b>NETWORKING RECEPTION &amp; POST CONFERENCE PARTY<br \/><\/b><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-7a197b8f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7a197b8f\" data-element_type=\"section\" id=\"speakers\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-76ea52cb\" data-id=\"76ea52cb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-369336ad elementor-widget elementor-widget-heading\" data-id=\"369336ad\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">\/ INVITED SPEAKERS<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60822daf eael-fg-card-content-align-left elementor-widget elementor-widget-eael-filterable-gallery\" data-id=\"60822daf\" data-element_type=\"widget\" data-settings=\"{&quot;photo_gallery&quot;:&quot;yes&quot;}\" data-widget_type=\"eael-filterable-gallery.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style id=\"eael-fg-inline-css-60822daf\">@media only screen and (max-width: 2399px) {\n\t\t\t\t\t.elementor-element.elementor-element-60822daf .eael-filterable-gallery-item-wrap {\n\t\t\t\t\t        width: 33.333333333333%;\n\t\t\t\t\t    }\n\t\t\t\t\t}@media only screen and (max-width: 1024px) {\n\t\t\t\t\t.elementor-element.elementor-element-60822daf  .eael-filterable-gallery-item-wrap {\n\t\t\t\t\t        width: 50%;\n\t\t\t\t\t    }\n\t\t\t\t\t}@media only screen and (max-width: 767px) {\n\t\t\t\t\t.elementor-element.elementor-element-60822daf  .eael-filterable-gallery-item-wrap {\n\t\t\t\t\t        width: 100%;\n\t\t\t\t\t    }\n\t\t\t\t\t}<\/style>        <div id=\"eael-filter-gallery-wrapper-60822daf\" class=\"eael-filter-gallery-wrapper\" data-layout-mode=\"card\" data-breakpoints=\"{&quot;mobile&quot;:{&quot;label&quot;:&quot;Mobile Portrait&quot;,&quot;value&quot;:767,&quot;default_value&quot;:767,&quot;direction&quot;:&quot;max&quot;,&quot;is_enabled&quot;:true},&quot;mobile_extra&quot;:{&quot;label&quot;:&quot;Mobile Landscape&quot;,&quot;value&quot;:880,&quot;default_value&quot;:880,&quot;direction&quot;:&quot;max&quot;,&quot;is_enabled&quot;:false},&quot;tablet&quot;:{&quot;label&quot;:&quot;Tablet Portrait&quot;,&quot;value&quot;:1024,&quot;default_value&quot;:1024,&quot;direction&quot;:&quot;max&quot;,&quot;is_enabled&quot;:true},&quot;tablet_extra&quot;:{&quot;label&quot;:&quot;Tablet Landscape&quot;,&quot;value&quot;:1200,&quot;default_value&quot;:1200,&quot;direction&quot;:&quot;max&quot;,&quot;is_enabled&quot;:false},&quot;laptop&quot;:{&quot;label&quot;:&quot;Laptop&quot;,&quot;value&quot;:1366,&quot;default_value&quot;:1366,&quot;direction&quot;:&quot;max&quot;,&quot;is_enabled&quot;:false},&quot;widescreen&quot;:{&quot;label&quot;:&quot;Widescreen&quot;,&quot;value&quot;:2400,&quot;default_value&quot;:2400,&quot;direction&quot;:&quot;min&quot;,&quot;is_enabled&quot;:false}}\" data-default_control_key=\"0\" data-custom_default_control=\"1\">\n            \n            \n            <div class=\"eael-filter-gallery-container masonry\" data-images-per-page=\"\" data-total-gallery-items=\"9\" data-nomore-item-text=\"\" data-settings=\"{&quot;grid_style&quot;:&quot;masonry&quot;,&quot;popup&quot;:&quot;none&quot;,&quot;duration&quot;:&quot;500&quot;,&quot;gallery_enabled&quot;:&quot;yes&quot;,&quot;video_gallery_yt_privacy&quot;:&quot;&quot;,&quot;control_all_text&quot;:null,&quot;post_id&quot;:410,&quot;widget_id&quot;:&quot;60822daf&quot;}\" data-search-all=\"\" data-gallery-items=\"[&quot;\\u003Cdiv class=\\u0022eael-filterable-gallery-item-wrap\\u0022\\u003E\\n\\t\\t\\t\\t\\u003Cdiv class=\\u0022eael-gallery-grid-item\\u0022\\u003E\\u003Cdiv class=\\u0022gallery-item-thumbnail-wrap\\u0022\\u003E\\u003Cimg src=\\u0022https:\\\/\\\/conference.hitb.org\\\/hitbxphdays\\\/wp-content\\\/uploads\\\/sites\\\/24\\\/2024\\\/03\\\/HITB.jpeg\\u0022 data-lazy-src=\\u0022https:\\\/\\\/conference.hitb.org\\\/hitbxphdays\\\/wp-content\\\/uploads\\\/sites\\\/24\\\/2024\\\/03\\\/HITB.jpeg\\u0022 alt=\\u0022\\u0022 class=\\u0022gallery-item-thumbnail\\u0022\\u003E\\u003C\\\/div\\u003E\\u003Cdiv class=\\u0022gallery-item-caption-wrap caption-style-card \\u0022\\u003E\\u003Cdiv class=\\u0022gallery-item-caption-over\\u0022\\u003E\\u003Ch5 class=\\u0022fg-item-title\\u0022\\u003EHussein Daher\\u003C\\\/h5\\u003E\\u003Cdiv class=\\u0022fg-item-content\\u0022\\u003E\\u003Cp style=\\u0022text-align: left;\\u0022\\u003EHussein Daher is a cyber security professional with over 10 years of experience in the industry. Despite holding a business master\\u0027s degree, he chose to pursue a career in cyber security and is now the CEO of Web Immunify, a leading provider of pentest services.\\u003C\\\/p\\u003E\\n\\u003Cp style=\\u0022text-align: left;\\u0022\\u003EThroughout his career, Hussein has submitted over 1000 vulnerabilities via bug bounty platforms. He has won numerous awards, including the Vigilante award at H1-2010, best team collaboration at H1-2010, BugBash best team collaboration, and the Intigriti 1337up\\u0027s competition in May. He also finished Yahoo Elite top 1 in the last cycle and has successfully tackled many other challenges in the industry.\\u003C\\\/p\\u003E\\n\\u003Cp style=\\u0022text-align: left;\\u0022\\u003EApart from his professional achievements, Hussein has also made a significant impact as an instructor, creating the Udemy course \\u0022Bug Bounty - An Advanced Guide to Finding Good Bugs.\\u0022 With over 4.5+ ratings, the course has helped over 140 students gain in-depth knowledge about bug bounty hunting.\\u003C\\\/p\\u003E\\n\\u003Cp style=\\u0022text-align: left;\\u0022\\u003EIn his free time, Hussein enjoys traveling and spending time on the African tropical sea. He is a highly sought-after professional in the industry and is always eager to take on new challenges and share his expertise with others.\\u003C\\\/p\\u003E\\n\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E&quot;,&quot;\\u003Cdiv class=\\u0022eael-filterable-gallery-item-wrap\\u0022\\u003E\\n\\t\\t\\t\\t\\u003Cdiv class=\\u0022eael-gallery-grid-item\\u0022\\u003E\\u003Cdiv class=\\u0022gallery-item-thumbnail-wrap\\u0022\\u003E\\u003Cimg src=\\u0022https:\\\/\\\/conference.hitb.org\\\/hitbxphdays\\\/wp-content\\\/uploads\\\/sites\\\/24\\\/2024\\\/03\\\/drzhiniang.jpg\\u0022 data-lazy-src=\\u0022https:\\\/\\\/conference.hitb.org\\\/hitbxphdays\\\/wp-content\\\/uploads\\\/sites\\\/24\\\/2024\\\/03\\\/drzhiniang.jpg\\u0022 alt=\\u0022\\u0022 class=\\u0022gallery-item-thumbnail\\u0022\\u003E\\u003C\\\/div\\u003E\\u003Cdiv class=\\u0022gallery-item-caption-wrap caption-style-card \\u0022\\u003E\\u003Cdiv class=\\u0022gallery-item-caption-over\\u0022\\u003E\\u003Ch5 class=\\u0022fg-item-title\\u0022\\u003EDr. Zhiniang Peng\\u003C\\\/h5\\u003E\\u003Cdiv class=\\u0022fg-item-content\\u0022\\u003E\\u003Cp style=\\u0022text-align: justify;\\u0022\\u003EDr. Zhiniang Peng is the Chief Architect and the Principal Security Researcher at Sangfor.\\u003C\\\/p\\u003E\\n\\u003Cp\\u003EHis current research areas include applied cryptography, software security and AI.\\u003C\\\/p\\u003E\\n\\u003Cp\\u003EHe has more than 10 years of experience in both offensive and defensive security and published many research in both academia and industry.\\u003C\\\/p\\u003E\\n\\u003Cp\\u003EMore about him: \\u003Ca href=\\u0022https:\\\/\\\/sites.google.com\\\/site\\\/zhiniangpeng\\u0022 target=\\u0022_blank\\u0022 rel=\\u0022noopener\\u0022\\u003Ehttps:\\\/\\\/sites.google.com\\\/site\\\/zhiniangpeng\\u003C\\\/a\\u003E\\u003C\\\/p\\u003E\\n\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E&quot;,&quot;\\u003Cdiv class=\\u0022eael-filterable-gallery-item-wrap\\u0022\\u003E\\n\\t\\t\\t\\t\\u003Cdiv class=\\u0022eael-gallery-grid-item\\u0022\\u003E\\u003Cdiv class=\\u0022gallery-item-thumbnail-wrap\\u0022\\u003E\\u003Cimg src=\\u0022https:\\\/\\\/conference.hitb.org\\\/hitbxphdays\\\/wp-content\\\/uploads\\\/sites\\\/24\\\/2024\\\/04\\\/uyen.jpg\\u0022 data-lazy-src=\\u0022https:\\\/\\\/conference.hitb.org\\\/hitbxphdays\\\/wp-content\\\/uploads\\\/sites\\\/24\\\/2024\\\/04\\\/uyen.jpg\\u0022 alt=\\u0022\\u0022 class=\\u0022gallery-item-thumbnail\\u0022\\u003E\\u003C\\\/div\\u003E\\u003Cdiv class=\\u0022gallery-item-caption-wrap caption-style-card \\u0022\\u003E\\u003Cdiv class=\\u0022gallery-item-caption-over\\u0022\\u003E\\u003Ch5 class=\\u0022fg-item-title\\u0022\\u003EUyen Nguyen\\u003C\\\/h5\\u003E\\u003Cdiv class=\\u0022fg-item-content\\u0022\\u003E\\u003Cp\\u003EUyen serves as a highly skilled Cryptography Engineer at Verichains, leveraging her in-depth knowledge of cryptography and computer science to enhance the security of blockchain projects. Her expertise extends to modern cryptographic technologies, including Zero Knowledge Proofs and Multi-Party Computation. Uyen conducts comprehensive audits of cryptographic components, identifying and mitigating vulnerabilities that could compromise security. Her contributions have demonstrably enhanced the security posture of numerous blockchain projects.\\u003C\\\/p\\u003E\\n\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E&quot;,&quot;\\u003Cdiv class=\\u0022eael-filterable-gallery-item-wrap\\u0022\\u003E\\n\\t\\t\\t\\t\\u003Cdiv class=\\u0022eael-gallery-grid-item\\u0022\\u003E\\u003Cdiv class=\\u0022gallery-item-thumbnail-wrap\\u0022\\u003E\\u003Cimg src=\\u0022https:\\\/\\\/conference.hitb.org\\\/hitbxphdays\\\/wp-content\\\/uploads\\\/sites\\\/24\\\/2024\\\/03\\\/skay.jpg\\u0022 data-lazy-src=\\u0022https:\\\/\\\/conference.hitb.org\\\/hitbxphdays\\\/wp-content\\\/uploads\\\/sites\\\/24\\\/2024\\\/03\\\/skay.jpg\\u0022 alt=\\u0022\\u0022 class=\\u0022gallery-item-thumbnail\\u0022\\u003E\\u003C\\\/div\\u003E\\u003Cdiv class=\\u0022gallery-item-caption-wrap caption-style-card \\u0022\\u003E\\u003Cdiv class=\\u0022gallery-item-caption-over\\u0022\\u003E\\u003Ch5 class=\\u0022fg-item-title\\u0022\\u003ELinhong Cao\\u003C\\\/h5\\u003E\\u003Cdiv class=\\u0022fg-item-content\\u0022\\u003E\\u003Cp\\u003ELinhong Cao specializes in code auditing and vulnerability research.\u00a0\\u003C\\\/p\\u003E\\n\\u003Cp\\u003EShe has conducted security research and vulnerability mining on many open source and closed source systems and focuses her research on the latest vulnerability mining and exploitation techniques.\u00a0\\u003C\\\/p\\u003E\\n\\u003Cp\\u003EShe has received public acknowledgement from many open source projects and companies such as Apache, Oracle, Cisco, Zimbra , Zoho, etc. and has previously spoken at BlackHat ASIA 2023. \\u003C\\\/p\\u003E\\n\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E&quot;,&quot;\\u003Cdiv class=\\u0022eael-filterable-gallery-item-wrap\\u0022\\u003E\\n\\t\\t\\t\\t\\u003Cdiv class=\\u0022eael-gallery-grid-item\\u0022\\u003E\\u003Cdiv class=\\u0022gallery-item-thumbnail-wrap\\u0022\\u003E\\u003Cimg src=\\u0022https:\\\/\\\/conference.hitb.org\\\/hitbxphdays\\\/wp-content\\\/uploads\\\/sites\\\/24\\\/2024\\\/03\\\/beichen.png\\u0022 data-lazy-src=\\u0022https:\\\/\\\/conference.hitb.org\\\/hitbxphdays\\\/wp-content\\\/uploads\\\/sites\\\/24\\\/2024\\\/03\\\/beichen.png\\u0022 alt=\\u0022\\u0022 class=\\u0022gallery-item-thumbnail\\u0022\\u003E\\u003C\\\/div\\u003E\\u003Cdiv class=\\u0022gallery-item-caption-wrap caption-style-card \\u0022\\u003E\\u003Cdiv class=\\u0022gallery-item-caption-over\\u0022\\u003E\\u003Ch5 class=\\u0022fg-item-title\\u0022\\u003EBeichenDream\\u003C\\\/h5\\u003E\\u003Cdiv class=\\u0022fg-item-content\\u0022\\u003E\\u003Cp\\u003EI am a freelance security researcher focused on Windows security and vulnerability discovery. I have 5 years of experience in red and blue teaming, and have discovered several remote code vulnerabilities in Apache, Oracle, and a JDK vulnerability in Cobalt Strike that resulted in an emergency patch.\\u003C\\\/p\\u003E\\n\\u003Cp\\u003EMy Github: \\u003Ca href=\\u0022https:\\\/\\\/github.com\\\/BeichenDream\\u0022 target=\\u0022_blank\\u0022 rel=\\u0022noopener\\u0022\\u003Ehttps:\\\/\\\/github.com\\\/BeichenDream\\u003C\\\/a\\u003E\\u003C\\\/p\\u003E\\n\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E&quot;,&quot;\\u003Cdiv class=\\u0022eael-filterable-gallery-item-wrap\\u0022\\u003E\\n\\t\\t\\t\\t\\u003Cdiv class=\\u0022eael-gallery-grid-item\\u0022\\u003E\\u003Cdiv class=\\u0022gallery-item-thumbnail-wrap\\u0022\\u003E\\u003Cimg src=\\u0022https:\\\/\\\/conference.hitb.org\\\/hitbxphdays\\\/wp-content\\\/uploads\\\/sites\\\/24\\\/2024\\\/03\\\/hu-ming.jpg\\u0022 data-lazy-src=\\u0022https:\\\/\\\/conference.hitb.org\\\/hitbxphdays\\\/wp-content\\\/uploads\\\/sites\\\/24\\\/2024\\\/03\\\/hu-ming.jpg\\u0022 alt=\\u0022\\u0022 class=\\u0022gallery-item-thumbnail\\u0022\\u003E\\u003C\\\/div\\u003E\\u003Cdiv class=\\u0022gallery-item-caption-wrap caption-style-card \\u0022\\u003E\\u003Cdiv class=\\u0022gallery-item-caption-over\\u0022\\u003E\\u003Ch5 class=\\u0022fg-item-title\\u0022\\u003EMing Hu\\u003C\\\/h5\\u003E\\u003Cdiv class=\\u0022fg-item-content\\u0022\\u003E\\u003Cp\\u003EChief Technology Officer (CTO) of Shanghai Seres Information Technology Co.Ltd., specializing in the fields of cybersecurity and artificial intelligence. \\u003C\\\/p\\u003E\\n\\u003Cp\\u003EAlso serving as the Director of Wenyao Network Security Science Laboratory at Shanghai Jiao Tong University, with over 10 years of experience in cybersecurity. \\u003C\\\/p\\u003E\\n\\u003Cp\\u003EI have discovered multiple vulnerabilities in Windows, Apache, and Oracle. Proficient in vulnerability discovery, offensive and defensive tactics, as well as chip security. Currently focusing on trusted chip security.\\u003C\\\/p\\u003E\\n\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E&quot;,&quot;\\u003Cdiv class=\\u0022eael-filterable-gallery-item-wrap\\u0022\\u003E\\n\\t\\t\\t\\t\\u003Cdiv class=\\u0022eael-gallery-grid-item\\u0022\\u003E\\u003Cdiv class=\\u0022gallery-item-thumbnail-wrap\\u0022\\u003E\\u003Cimg src=\\u0022https:\\\/\\\/conference.hitb.org\\\/hitbxphdays\\\/wp-content\\\/uploads\\\/sites\\\/24\\\/2024\\\/04\\\/alisa-esage-e1712150024356.jpg\\u0022 data-lazy-src=\\u0022https:\\\/\\\/conference.hitb.org\\\/hitbxphdays\\\/wp-content\\\/uploads\\\/sites\\\/24\\\/2024\\\/04\\\/alisa-esage-e1712150024356.jpg\\u0022 alt=\\u0022\\u0022 class=\\u0022gallery-item-thumbnail\\u0022\\u003E\\u003C\\\/div\\u003E\\u003Cdiv class=\\u0022gallery-item-caption-wrap caption-style-card \\u0022\\u003E\\u003Cdiv class=\\u0022gallery-item-caption-over\\u0022\\u003E\\u003Ch5 class=\\u0022fg-item-title\\u0022\\u003EAlisa Esage\\u003C\\\/h5\\u003E\\u003Cdiv class=\\u0022fg-item-content\\u0022\\u003E\\u003Cp\\u003EAlisa Esage (Shevchenko) is an independent hacker and founder of Zero Day Engineering trainings. She is specialized in vulnerability research and exploit prototyping for complex systems, such as hypervisors and JavaScript engines. She is a solo winner of Pwn2Own Vancouver 2021.\\u003C\\\/p\\u003E\\n\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E&quot;,&quot;\\u003Cdiv class=\\u0022eael-filterable-gallery-item-wrap\\u0022\\u003E\\n\\t\\t\\t\\t\\u003Cdiv class=\\u0022eael-gallery-grid-item\\u0022\\u003E\\u003Cdiv class=\\u0022gallery-item-thumbnail-wrap\\u0022\\u003E\\u003Cimg src=\\u0022https:\\\/\\\/conference.hitb.org\\\/hitbxphdays\\\/wp-content\\\/uploads\\\/sites\\\/24\\\/2024\\\/04\\\/reddragon.jpg\\u0022 data-lazy-src=\\u0022https:\\\/\\\/conference.hitb.org\\\/hitbxphdays\\\/wp-content\\\/uploads\\\/sites\\\/24\\\/2024\\\/04\\\/reddragon.jpg\\u0022 alt=\\u0022\\u0022 class=\\u0022gallery-item-thumbnail\\u0022\\u003E\\u003C\\\/div\\u003E\\u003Cdiv class=\\u0022gallery-item-caption-wrap caption-style-card \\u0022\\u003E\\u003Cdiv class=\\u0022gallery-item-caption-over\\u0022\\u003E\\u003Ch5 class=\\u0022fg-item-title\\u0022\\u003EThanh Nguyen\\u003C\\\/h5\\u003E\\u003Cdiv class=\\u0022fg-item-content\\u0022\\u003E\\u003Cp\\u003EThanh Nguyen (@redragonvn) is the Founder of Verichains, leading a world-class security and cryptography research team to deliver cutting-edge solutions for a safer, more secure Web3 ecosystem.\\u003C\\\/p\\u003E\\n\\u003Cp\\u003EVerichains is renowned for its expertise in investigating and mitigating major Web3 hacks, having identified critical flaws within the core of Multi-Party Computation (MPC) and Zero-Knowledge Proofs (ZKP) implementations by major vendors, impacting billions of dollars across the industry.\\u003C\\\/p\\u003E\\n\\u003Cp\\u003EThanh also serves as CEO at VNG Digital Business and GreenNode.ai. Previously, he worked as a CPU Security Architect at Intel Corporation, responsible for the security design of Intel\u2019s next-generation technologies, including Atom Mobile \\u0026amp; SoC platforms, vPro \\u0026amp; Management Engine, Nehalem, Ivybridge, and Haswell micro-architecture.\\u003C\\\/p\\u003E\\n\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E&quot;,&quot;\\u003Cdiv class=\\u0022eael-filterable-gallery-item-wrap\\u0022\\u003E\\n\\t\\t\\t\\t\\u003Cdiv class=\\u0022eael-gallery-grid-item\\u0022\\u003E\\u003Cdiv class=\\u0022gallery-item-thumbnail-wrap\\u0022\\u003E\\u003Cimg src=\\u0022https:\\\/\\\/conference.hitb.org\\\/hitbxphdays\\\/wp-content\\\/uploads\\\/sites\\\/24\\\/2024\\\/04\\\/alex-popov.jpg\\u0022 data-lazy-src=\\u0022https:\\\/\\\/conference.hitb.org\\\/hitbxphdays\\\/wp-content\\\/uploads\\\/sites\\\/24\\\/2024\\\/04\\\/alex-popov.jpg\\u0022 alt=\\u0022\\u0022 class=\\u0022gallery-item-thumbnail\\u0022\\u003E\\u003C\\\/div\\u003E\\u003Cdiv class=\\u0022gallery-item-caption-wrap caption-style-card \\u0022\\u003E\\u003Cdiv class=\\u0022gallery-item-caption-over\\u0022\\u003E\\u003Ch5 class=\\u0022fg-item-title\\u0022\\u003EAlexander Popov\\u003C\\\/h5\\u003E\\u003Cdiv class=\\u0022fg-item-content\\u0022\\u003E\\u003Cp\\u003EAlexander Popov has been a Linux kernel developer since 2013. He is a principal security researcher at Positive Technologies, where he has a lot of fun with Linux kernel vulnerabilities, exploitation techniques, and defensive technologies.\\u003C\\\/p\\u003E\\n\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E\\u003C\\\/div\\u003E&quot;]\" data-init-show=\"10\">\n                <div class=\"eael-filterable-gallery-item-wrap\">\n\t\t\t\t<div class=\"eael-gallery-grid-item\"><div class=\"gallery-item-thumbnail-wrap\"><img decoding=\"async\" src=\"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/HITB.jpeg\" alt=\"\" class=\"gallery-item-thumbnail\"><\/div><div class=\"gallery-item-caption-wrap caption-style-card \"><div class=\"gallery-item-caption-over\"><h5 class=\"fg-item-title\">Hussein Daher<\/h5><div class=\"fg-item-content\"><p style=\"text-align: left\">Hussein Daher is a cyber security professional with over 10 years of experience in the industry. Despite holding a business master's degree, he chose to pursue a career in cyber security and is now the CEO of Web Immunify, a leading provider of pentest services.<\/p>\n<p style=\"text-align: left\">Throughout his career, Hussein has submitted over 1000 vulnerabilities via bug bounty platforms. He has won numerous awards, including the Vigilante award at H1-2010, best team collaboration at H1-2010, BugBash best team collaboration, and the Intigriti 1337up's competition in May. He also finished Yahoo Elite top 1 in the last cycle and has successfully tackled many other challenges in the industry.<\/p>\n<p style=\"text-align: left\">Apart from his professional achievements, Hussein has also made a significant impact as an instructor, creating the Udemy course \"Bug Bounty - An Advanced Guide to Finding Good Bugs.\" With over 4.5+ ratings, the course has helped over 140 students gain in-depth knowledge about bug bounty hunting.<\/p>\n<p style=\"text-align: left\">In his free time, Hussein enjoys traveling and spending time on the African tropical sea. He is a highly sought-after professional in the industry and is always eager to take on new challenges and share his expertise with others.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"eael-filterable-gallery-item-wrap\">\n\t\t\t\t<div class=\"eael-gallery-grid-item\"><div class=\"gallery-item-thumbnail-wrap\"><img decoding=\"async\" src=\"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/drzhiniang.jpg\" alt=\"\" class=\"gallery-item-thumbnail\"><\/div><div class=\"gallery-item-caption-wrap caption-style-card \"><div class=\"gallery-item-caption-over\"><h5 class=\"fg-item-title\">Dr. Zhiniang Peng<\/h5><div class=\"fg-item-content\"><p style=\"text-align: justify\">Dr. Zhiniang Peng is the Chief Architect and the Principal Security Researcher at Sangfor.<\/p>\n<p>His current research areas include applied cryptography, software security and AI.<\/p>\n<p>He has more than 10 years of experience in both offensive and defensive security and published many research in both academia and industry.<\/p>\n<p>More about him: <a href=\"https:\/\/sites.google.com\/site\/zhiniangpeng\" target=\"_blank\" rel=\"noopener\">https:\/\/sites.google.com\/site\/zhiniangpeng<\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"eael-filterable-gallery-item-wrap\">\n\t\t\t\t<div class=\"eael-gallery-grid-item\"><div class=\"gallery-item-thumbnail-wrap\"><img decoding=\"async\" src=\"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/04\/uyen.jpg\" alt=\"\" class=\"gallery-item-thumbnail\"><\/div><div class=\"gallery-item-caption-wrap caption-style-card \"><div class=\"gallery-item-caption-over\"><h5 class=\"fg-item-title\">Uyen Nguyen<\/h5><div class=\"fg-item-content\"><p>Uyen serves as a highly skilled Cryptography Engineer at Verichains, leveraging her in-depth knowledge of cryptography and computer science to enhance the security of blockchain projects. Her expertise extends to modern cryptographic technologies, including Zero Knowledge Proofs and Multi-Party Computation. Uyen conducts comprehensive audits of cryptographic components, identifying and mitigating vulnerabilities that could compromise security. Her contributions have demonstrably enhanced the security posture of numerous blockchain projects.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"eael-filterable-gallery-item-wrap\">\n\t\t\t\t<div class=\"eael-gallery-grid-item\"><div class=\"gallery-item-thumbnail-wrap\"><img decoding=\"async\" src=\"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/skay.jpg\" alt=\"\" class=\"gallery-item-thumbnail\"><\/div><div class=\"gallery-item-caption-wrap caption-style-card \"><div class=\"gallery-item-caption-over\"><h5 class=\"fg-item-title\">Linhong Cao<\/h5><div class=\"fg-item-content\"><p>Linhong Cao specializes in code auditing and vulnerability research.\u00a0<\/p>\n<p>She has conducted security research and vulnerability mining on many open source and closed source systems and focuses her research on the latest vulnerability mining and exploitation techniques.\u00a0<\/p>\n<p>She has received public acknowledgement from many open source projects and companies such as Apache, Oracle, Cisco, Zimbra , Zoho, etc. and has previously spoken at BlackHat ASIA 2023. <\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"eael-filterable-gallery-item-wrap\">\n\t\t\t\t<div class=\"eael-gallery-grid-item\"><div class=\"gallery-item-thumbnail-wrap\"><img decoding=\"async\" src=\"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/beichen.png\" alt=\"\" class=\"gallery-item-thumbnail\"><\/div><div class=\"gallery-item-caption-wrap caption-style-card \"><div class=\"gallery-item-caption-over\"><h5 class=\"fg-item-title\">BeichenDream<\/h5><div class=\"fg-item-content\"><p>I am a freelance security researcher focused on Windows security and vulnerability discovery. I have 5 years of experience in red and blue teaming, and have discovered several remote code vulnerabilities in Apache, Oracle, and a JDK vulnerability in Cobalt Strike that resulted in an emergency patch.<\/p>\n<p>My Github: <a href=\"https:\/\/github.com\/BeichenDream\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/BeichenDream<\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"eael-filterable-gallery-item-wrap\">\n\t\t\t\t<div class=\"eael-gallery-grid-item\"><div class=\"gallery-item-thumbnail-wrap\"><img decoding=\"async\" src=\"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/hu-ming.jpg\" alt=\"\" class=\"gallery-item-thumbnail\"><\/div><div class=\"gallery-item-caption-wrap caption-style-card \"><div class=\"gallery-item-caption-over\"><h5 class=\"fg-item-title\">Ming Hu<\/h5><div class=\"fg-item-content\"><p>Chief Technology Officer (CTO) of Shanghai Seres Information Technology Co.Ltd., specializing in the fields of cybersecurity and artificial intelligence. <\/p>\n<p>Also serving as the Director of Wenyao Network Security Science Laboratory at Shanghai Jiao Tong University, with over 10 years of experience in cybersecurity. <\/p>\n<p>I have discovered multiple vulnerabilities in Windows, Apache, and Oracle. Proficient in vulnerability discovery, offensive and defensive tactics, as well as chip security. Currently focusing on trusted chip security.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"eael-filterable-gallery-item-wrap\">\n\t\t\t\t<div class=\"eael-gallery-grid-item\"><div class=\"gallery-item-thumbnail-wrap\"><img decoding=\"async\" src=\"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/04\/alisa-esage-e1712150024356.jpg\" alt=\"\" class=\"gallery-item-thumbnail\"><\/div><div class=\"gallery-item-caption-wrap caption-style-card \"><div class=\"gallery-item-caption-over\"><h5 class=\"fg-item-title\">Alisa Esage<\/h5><div class=\"fg-item-content\"><p>Alisa Esage (Shevchenko) is an independent hacker and founder of Zero Day Engineering trainings. She is specialized in vulnerability research and exploit prototyping for complex systems, such as hypervisors and JavaScript engines. She is a solo winner of Pwn2Own Vancouver 2021.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"eael-filterable-gallery-item-wrap\">\n\t\t\t\t<div class=\"eael-gallery-grid-item\"><div class=\"gallery-item-thumbnail-wrap\"><img decoding=\"async\" src=\"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/04\/reddragon.jpg\" alt=\"\" class=\"gallery-item-thumbnail\"><\/div><div class=\"gallery-item-caption-wrap caption-style-card \"><div class=\"gallery-item-caption-over\"><h5 class=\"fg-item-title\">Thanh Nguyen<\/h5><div class=\"fg-item-content\"><p>Thanh Nguyen (@redragonvn) is the Founder of Verichains, leading a world-class security and cryptography research team to deliver cutting-edge solutions for a safer, more secure Web3 ecosystem.<\/p>\n<p>Verichains is renowned for its expertise in investigating and mitigating major Web3 hacks, having identified critical flaws within the core of Multi-Party Computation (MPC) and Zero-Knowledge Proofs (ZKP) implementations by major vendors, impacting billions of dollars across the industry.<\/p>\n<p>Thanh also serves as CEO at VNG Digital Business and GreenNode.ai. Previously, he worked as a CPU Security Architect at Intel Corporation, responsible for the security design of Intel\u2019s next-generation technologies, including Atom Mobile &amp; SoC platforms, vPro &amp; Management Engine, Nehalem, Ivybridge, and Haswell micro-architecture.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"eael-filterable-gallery-item-wrap\">\n\t\t\t\t<div class=\"eael-gallery-grid-item\"><div class=\"gallery-item-thumbnail-wrap\"><img decoding=\"async\" src=\"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/04\/alex-popov.jpg\" alt=\"\" class=\"gallery-item-thumbnail\"><\/div><div class=\"gallery-item-caption-wrap caption-style-card \"><div class=\"gallery-item-caption-over\"><h5 class=\"fg-item-title\">Alexander Popov<\/h5><div class=\"fg-item-content\"><p>Alexander Popov has been a Linux kernel developer since 2013. He is a principal security researcher at Positive Technologies, where he has a lot of fun with Linux kernel vulnerabilities, exploitation techniques, and defensive technologies.<\/p>\n<\/div><\/div><\/div><\/div><\/div>            <\/div>\n            \n                    <\/div>\n        \n        \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-1ce45f61 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1ce45f61\" data-element_type=\"section\" id=\"talks\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6c0aa923\" data-id=\"6c0aa923\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-388098b8 elementor-widget elementor-widget-heading\" data-id=\"388098b8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">\/ TALK DETAILS<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-b87bdbc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b87bdbc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1b98e375\" data-id=\"1b98e375\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-13608e23 elementor-widget elementor-widget-menu-anchor\" data-id=\"13608e23\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\nbody.elementor-page .elementor-widget-menu-anchor{margin-bottom:0}<\/style>\t\t<div class=\"elementor-menu-anchor\" id=\"talk001\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a4ee491 elementor-widget elementor-widget-heading\" data-id=\"a4ee491\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Talk 001 - Attacking Organizations with Big Scopes: From Zero to Hero<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-516cbab0 elementor-widget elementor-widget-heading\" data-id=\"516cbab0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Hussein Daher<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69c1e376 elementor-widget elementor-widget-text-editor\" data-id=\"69c1e376\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>This presentation offers a comprehensive exploration of reconnaissance strategies tailored specifically for bug bounty hunters, illuminating pathways to uncover vulnerabilities and reap substantial rewards.<\/p><p>Delving into the realm of bug bounty programs, participants will discover the crucial role of reconnaissance in maximizing success. From understanding program scope to identifying potential attack surfaces, attendees will learn how to lay the groundwork for fruitful bug hunting endeavors.<\/p><p>Drawing upon the latest methodologies and best practices, the presentation navigates participants through the intricacies of reconnaissance in bug bounty contexts. Whether it&#8217;s mapping out web applications, dissecting network architectures, or profiling key personnel, attendees will gain actionable insights into gathering the intelligence needed to uncover elusive vulnerabilities.<\/p><p>Moreover, the presentation addresses the nuances of bug bounty hunting within expansive organizational scopes, offering strategic guidance on prioritizing targets and optimizing reconnaissance efforts. Attendees will learn to leverage automation tools and open-source intelligence (OSINT) platforms effectively, empowering them to navigate the complex digital ecosystems of large-scale organizations with precision and efficiency.<\/p><p>Through real-world examples and case studies, the presentation illustrates the tangible benefits of a strategic reconnaissance approach in bug bounty hunting. Participants will gain practical knowledge and actionable tips to enhance their bug hunting endeavors, ultimately positioning themselves as formidable adversaries in the pursuit of securing large-scale organizations against cyber threats.<\/p><p>Attendees will be guided through the utilization of specialized tools such as FFuf, Linkfinder and others to gather actionable intelligence and target elusive vulnerabilities effectively. Through real-world examples and strategic guidance, participants will gain practical knowledge and actionable insights to enhance their bug hunting endeavors, positioning themselves as formidable adversaries in the pursuit of securing large-scale organizations against cyber threats.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e453e5c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e453e5c\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\n.elementor-widget-divider{--divider-border-style:none;--divider-border-width:1px;--divider-color:#0c0d0e;--divider-icon-size:20px;--divider-element-spacing:10px;--divider-pattern-height:24px;--divider-pattern-size:20px;--divider-pattern-url:none;--divider-pattern-repeat:repeat-x}.elementor-widget-divider .elementor-divider{display:flex}.elementor-widget-divider .elementor-divider__text{font-size:15px;line-height:1;max-width:95%}.elementor-widget-divider .elementor-divider__element{margin:0 var(--divider-element-spacing);flex-shrink:0}.elementor-widget-divider .elementor-icon{font-size:var(--divider-icon-size)}.elementor-widget-divider .elementor-divider-separator{display:flex;margin:0;direction:ltr}.elementor-widget-divider--view-line_icon .elementor-divider-separator,.elementor-widget-divider--view-line_text .elementor-divider-separator{align-items:center}.elementor-widget-divider--view-line_icon .elementor-divider-separator:after,.elementor-widget-divider--view-line_icon .elementor-divider-separator:before,.elementor-widget-divider--view-line_text .elementor-divider-separator:after,.elementor-widget-divider--view-line_text .elementor-divider-separator:before{display:block;content:\"\";border-block-end:0;flex-grow:1;border-block-start:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--element-align-left .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-left .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-left .elementor-divider__element{margin-left:0}.elementor-widget-divider--element-align-right .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-right .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-right .elementor-divider__element{margin-right:0}.elementor-widget-divider--element-align-start .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-start .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-start .elementor-divider__element{margin-inline-start:0}.elementor-widget-divider--element-align-end .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-end .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-end .elementor-divider__element{margin-inline-end:0}.elementor-widget-divider:not(.elementor-widget-divider--view-line_text):not(.elementor-widget-divider--view-line_icon) .elementor-divider-separator{border-block-start:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--separator-type-pattern{--divider-border-style:none}.elementor-widget-divider--separator-type-pattern.elementor-widget-divider--view-line .elementor-divider-separator,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:after,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:before,.elementor-widget-divider--separator-type-pattern:not([class*=elementor-widget-divider--view]) .elementor-divider-separator{width:100%;min-height:var(--divider-pattern-height);-webkit-mask-size:var(--divider-pattern-size) 100%;mask-size:var(--divider-pattern-size) 100%;-webkit-mask-repeat:var(--divider-pattern-repeat);mask-repeat:var(--divider-pattern-repeat);background-color:var(--divider-color);-webkit-mask-image:var(--divider-pattern-url);mask-image:var(--divider-pattern-url)}.elementor-widget-divider--no-spacing{--divider-pattern-size:auto}.elementor-widget-divider--bg-round{--divider-pattern-repeat:round}.rtl .elementor-widget-divider .elementor-divider__text{direction:rtl}.e-con-inner>.elementor-widget-divider,.e-con>.elementor-widget-divider{width:var(--container-widget-width,100%);--flex-grow:var(--container-widget-flex-grow)}<\/style>\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-d3d8dcd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d3d8dcd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-0bbbae8\" data-id=\"0bbbae8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c811a11 elementor-widget elementor-widget-menu-anchor\" data-id=\"c811a11\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"talk002\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c2f55a elementor-widget elementor-widget-heading\" data-id=\"0c2f55a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Talk 002 - SW-RASP - Java Self-Protection Defense<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b11af75 elementor-widget elementor-widget-heading\" data-id=\"b11af75\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ming Hu<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cfd17be elementor-widget elementor-widget-text-editor\" data-id=\"cfd17be\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>SW-RASP is a Java application runtime self-protection defense technology capable of intercepting unknown network attacks at runtime. <br \/><br \/>Leveraging low-level technology based on JVMTI, SW-RASP hooks into the underlying logic of the JDK (Java Development Kit) at runtime, enabling it to intercept command injection attacks, arbitrary file uploads, Webshell connections, and other malicious activities. <br \/><br \/>Furthermore, SW-RASP utilizes Asm syntax tree analysis to identify malicious operations, achieving a 99% interception rate. SW-RASP offers superior protection compared to traditional WAF solutions because it operates at the application&#8217;s underlying logic rather than at the traffic layer. SW-RASP does not need to detect traffic, because SW-RASP&#8217;s interception principle is from the call stack credibility detection, and based on SQL semantics and command parsing semantics detection.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0101e0 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d0101e0\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-6402304b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6402304b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1fae801a\" data-id=\"1fae801a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-44e0835a elementor-widget elementor-widget-menu-anchor\" data-id=\"44e0835a\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"talk003\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3290295b elementor-widget elementor-widget-heading\" data-id=\"3290295b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Talk 003 - Critical Proof Forgery Attack on zkEVM<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ca6c714 elementor-widget elementor-widget-heading\" data-id=\"4ca6c714\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Uyen Nguyen & Thanh Nguyen<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41cf8442 elementor-widget elementor-widget-text-editor\" data-id=\"41cf8442\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>This presentation unveils the discovery and resolution of a critical vulnerability in Polygon zkEVM. zkEVM is a layer-2 solution designed to enhance Ethereum&#8217;s scalability through off-chain transaction processing and the use of Zero-Knowledge Proofs (ZKP).<\/p><p>Verichains cryptography research team (Duy Hieu Nguyen, Uyen Nguyen, Giap Nguyen) found a critical security loophole in the zkProver component, allowing proof forgery attacks that posed a critical threat to the integrity and security of all funds across Layer 1 and Layer 2 of the blockchain. The attack works under all circumstances, and, given a forged proof, no one can tell how it is forged since the mechanism is completely hidden by the zero-knowledgeness of the argument systems.<\/p><p>The presentation will delve into the specifics of mathematical vulnerabilities, the method of exploiting it through a proof forgery attack, and its broad implications for the blockchain&#8217;s integrity and security. Furthermore, the talk will emphasize the need for collaboration between security researchers and blockchain developers to ensure continuous security evaluations and the adoption of proactive measures to enhance the resilience of blockchain ecosystems.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e31a94d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7e31a94d\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-3c685ec elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3c685ec\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-12223519\" data-id=\"12223519\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2d72f4c6 elementor-widget elementor-widget-menu-anchor\" data-id=\"2d72f4c6\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"talk004\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-443b6a2a elementor-widget elementor-widget-heading\" data-id=\"443b6a2a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Talk 004 - XPost: A Post Exploitation Tool for High Value Systems<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9359ce8 elementor-widget elementor-widget-heading\" data-id=\"9359ce8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Linhong Cao<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fcbd9d7 elementor-widget elementor-widget-text-editor\" data-id=\"5fcbd9d7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>XPost is a post-exploitation tool tailored for high-value systems (currently supports Zimbra, Confluence, Zoho) that is designed to assist in real-world attack penetration testing and an initial version of the tool will be made available after this talk. <br \/><br \/># What can it do?<\/p><p>Including but not limited to\uff1aemail retrieval, plaintext password recording, operations data acquisition, obtaining arbitrary login credentials under unknown passwords, domain controller information retrieval, single sign-on hijacking, and trace cleaning operations.<\/p><p># Advantages<\/p><p>The data callback traffic achieves traffic concealment stealth persistence, fileless landing after server rebooting or patch updates and the backdoor remains undetectable.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a820e06 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a820e06\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-71398869 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71398869\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-73e59bb9\" data-id=\"73e59bb9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-32f5ad4d elementor-widget elementor-widget-menu-anchor\" data-id=\"32f5ad4d\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"talk005\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2558a892 elementor-widget elementor-widget-heading\" data-id=\"2558a892\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Talk 005 - A Privilege Escalation Exploit in Windows That Microsoft Won't Fix<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27f268c elementor-widget elementor-widget-heading\" data-id=\"27f268c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">BeichenDream<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f9e95c7 elementor-widget elementor-widget-text-editor\" data-id=\"5f9e95c7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Based on the 6 year old Potato privilege escalation, I discovered a new attack by researching DCOM. <br \/><br \/>Similar to the Potato attacks of the past (which currently do not run on the latest version of Windows), this new privilege escalation attack requires access to web \/ database as a non-privilege user and allows for escalation to &#8220;NT AUTHORITY\\SYSTEM&#8221; in Windows 2012 &#8211; Windows 2022. The method was discovered while I was researching DCOM relating to some defects in RPCSS when dealing with oxid. I named it GodPotato. <\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c0b505d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7c0b505d\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-a3a1e87 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a3a1e87\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-9063ca8\" data-id=\"9063ca8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aec0606 elementor-widget elementor-widget-menu-anchor\" data-id=\"aec0606\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"talk006\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d99d2d elementor-widget elementor-widget-heading\" data-id=\"5d99d2d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Talk 006 - Escaping Sandboxes on Windows<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80197cb elementor-widget elementor-widget-heading\" data-id=\"80197cb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dr. Zhiniang Peng<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b82c1f6 elementor-widget elementor-widget-text-editor\" data-id=\"b82c1f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Modern desktop applications have become increasingly secure due to various mitigations, but Chrome and Adobe PDF reader are still the popular targets for top attackers.<\/p><p>Of course, sandbox escape is the primary challenge here and in this talk, we will discuss our journey of research on sandbox escape including the sandbox internals on Microsoft Windows and our sandbox escape methodology. We will also do a review on the attack surface of different sandboxes on Windows and we will of course show our exploits for escaping the Chrome and Adobe sandbox on Windows.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c332a6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6c332a6\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-3a897f86 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3a897f86\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1c2d235\" data-id=\"1c2d235\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1e018971 elementor-widget elementor-widget-menu-anchor\" data-id=\"1e018971\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"talk007\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20678442 elementor-widget elementor-widget-heading\" data-id=\"20678442\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Talk 007 - A Bug Hunter's Reflections on Fuzzing<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab075ed elementor-widget elementor-widget-heading\" data-id=\"ab075ed\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Alexander Popov<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10e1cd23 elementor-widget elementor-widget-text-editor\" data-id=\"10e1cd23\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Fuzzing is an incredibly effective and popular technique for testing software. But not all the bugs that it finds are interesting for bug hunters. Fuzzing for vulnerability discovery is special, and in this talk, Alexander will share his reflections on that topic inspired by his experience in Linux kernel fuzzing.<\/p><p>Attendees can expect a detailed analysis of the fuzzing process, the cases from Alexander&#8217;s vulnerability research practice, and\u00a0insights on how to make fuzzing effective for bug hunting.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc6acd6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"cc6acd6\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-104003f1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"104003f1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-60460902\" data-id=\"60460902\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-77814fd5 elementor-widget elementor-widget-menu-anchor\" data-id=\"77814fd5\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"talk008\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c9aa5f0 elementor-widget elementor-widget-heading\" data-id=\"6c9aa5f0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Talk 008 - Javascript Engine Vulnerability Research - State of the Art<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-214ef75 elementor-widget elementor-widget-heading\" data-id=\"214ef75\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Alisa Esage<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62cba8eb elementor-widget elementor-widget-text-editor\" data-id=\"62cba8eb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>In my talk on &#8220;JavaScript Engines Vulnerability Research: State of the Art\u201d &#8211; a series continuation of my previous talk: \u201cHypervisor Vulnerability Research: State of the Art\u201d (2018) &#8211; the presentation will unfold in two detailed sections to offer attendees a comprehensive understanding of the subject. Initially, the talk will introduce core abstract models and technology maps, pivotal for navigating the complex vulnerability landscape of JavaScript engines. This foundation will equip attendees with the theoretical knowledge necessary to identify and understand potential security flaws.<\/p><p>Following this, the session will transition into a meticulous examination of recent browser JavaScript bugs, offering a practical perspective. Audience members can anticipate gaining insights into the mechanisms behind these vulnerabilities, illustrated with real-world examples, and learn about the latest research methodologies employed in discovering and mitigating such issues.<\/p><p>This talk promises a blend of theoretical concepts and hands-on examples, making it a valuable learning experience for developers, security researchers, and anyone interested in the security aspects of JavaScript engines.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43313aab elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"43313aab\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-2b4d5585 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2b4d5585\" data-element_type=\"section\" id=\"venue\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b07f79e\" data-id=\"b07f79e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56cc37fc elementor-widget elementor-widget-heading\" data-id=\"56cc37fc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">\/ VENUE<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d25c36d elementor-widget elementor-widget-google_maps\" data-id=\"2d25c36d\" data-element_type=\"widget\" data-widget_type=\"google_maps.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\n.elementor-widget-google_maps .elementor-widget-container{overflow:hidden}.elementor-widget-google_maps .elementor-custom-embed{line-height:0}.elementor-widget-google_maps iframe{height:300px}<\/style>\t\t<div class=\"elementor-custom-embed\">\n\t\t\t<iframe loading=\"lazy\"\n\t\t\t\t\tsrc=\"https:\/\/maps.google.com\/maps?q=grand%20hyatt%20erawan&#038;t=m&#038;z=16&#038;output=embed&#038;iwloc=near\"\n\t\t\t\t\ttitle=\"grand hyatt erawan\"\n\t\t\t\t\taria-label=\"grand hyatt erawan\"\n\t\t\t><\/iframe>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-19bb48e5 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default\" data-id=\"19bb48e5\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4c30363a\" data-id=\"4c30363a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5cc2fbc9 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"5cc2fbc9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">\u00a9 2024 All Rights Reserved. - Hack In The Box Pte. Ltd. <\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17b10c8a e-grid-align-left elementor-widget__width-auto elementor-shape-rounded elementor-grid-0 elementor-widget elementor-widget-social-icons\" data-id=\"17b10c8a\" data-element_type=\"widget\" data-widget_type=\"social-icons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\n.elementor-widget-social-icons.elementor-grid-0 .elementor-widget-container,.elementor-widget-social-icons.elementor-grid-mobile-0 .elementor-widget-container,.elementor-widget-social-icons.elementor-grid-tablet-0 .elementor-widget-container{line-height:1;font-size:0}.elementor-widget-social-icons:not(.elementor-grid-0):not(.elementor-grid-tablet-0):not(.elementor-grid-mobile-0) .elementor-grid{display:inline-grid}.elementor-widget-social-icons .elementor-grid{grid-column-gap:var(--grid-column-gap,5px);grid-row-gap:var(--grid-row-gap,5px);grid-template-columns:var(--grid-template-columns);justify-content:var(--justify-content,center);justify-items:var(--justify-content,center)}.elementor-icon.elementor-social-icon{font-size:var(--icon-size,25px);line-height:var(--icon-size,25px);width:calc(var(--icon-size, 25px) + 2 * var(--icon-padding, .5em));height:calc(var(--icon-size, 25px) + 2 * var(--icon-padding, .5em))}.elementor-social-icon{--e-social-icon-icon-color:#fff;display:inline-flex;background-color:#69727d;align-items:center;justify-content:center;text-align:center;cursor:pointer}.elementor-social-icon i{color:var(--e-social-icon-icon-color)}.elementor-social-icon svg{fill:var(--e-social-icon-icon-color)}.elementor-social-icon:last-child{margin:0}.elementor-social-icon:hover{opacity:.9;color:#fff}.elementor-social-icon-android{background-color:#a4c639}.elementor-social-icon-apple{background-color:#999}.elementor-social-icon-behance{background-color:#1769ff}.elementor-social-icon-bitbucket{background-color:#205081}.elementor-social-icon-codepen{background-color:#000}.elementor-social-icon-delicious{background-color:#39f}.elementor-social-icon-deviantart{background-color:#05cc47}.elementor-social-icon-digg{background-color:#005be2}.elementor-social-icon-dribbble{background-color:#ea4c89}.elementor-social-icon-elementor{background-color:#d30c5c}.elementor-social-icon-envelope{background-color:#ea4335}.elementor-social-icon-facebook,.elementor-social-icon-facebook-f{background-color:#3b5998}.elementor-social-icon-flickr{background-color:#0063dc}.elementor-social-icon-foursquare{background-color:#2d5be3}.elementor-social-icon-free-code-camp,.elementor-social-icon-freecodecamp{background-color:#006400}.elementor-social-icon-github{background-color:#333}.elementor-social-icon-gitlab{background-color:#e24329}.elementor-social-icon-globe{background-color:#69727d}.elementor-social-icon-google-plus,.elementor-social-icon-google-plus-g{background-color:#dd4b39}.elementor-social-icon-houzz{background-color:#7ac142}.elementor-social-icon-instagram{background-color:#262626}.elementor-social-icon-jsfiddle{background-color:#487aa2}.elementor-social-icon-link{background-color:#818a91}.elementor-social-icon-linkedin,.elementor-social-icon-linkedin-in{background-color:#0077b5}.elementor-social-icon-medium{background-color:#00ab6b}.elementor-social-icon-meetup{background-color:#ec1c40}.elementor-social-icon-mixcloud{background-color:#273a4b}.elementor-social-icon-odnoklassniki{background-color:#f4731c}.elementor-social-icon-pinterest{background-color:#bd081c}.elementor-social-icon-product-hunt{background-color:#da552f}.elementor-social-icon-reddit{background-color:#ff4500}.elementor-social-icon-rss{background-color:#f26522}.elementor-social-icon-shopping-cart{background-color:#4caf50}.elementor-social-icon-skype{background-color:#00aff0}.elementor-social-icon-slideshare{background-color:#0077b5}.elementor-social-icon-snapchat{background-color:#fffc00}.elementor-social-icon-soundcloud{background-color:#f80}.elementor-social-icon-spotify{background-color:#2ebd59}.elementor-social-icon-stack-overflow{background-color:#fe7a15}.elementor-social-icon-steam{background-color:#00adee}.elementor-social-icon-stumbleupon{background-color:#eb4924}.elementor-social-icon-telegram{background-color:#2ca5e0}.elementor-social-icon-threads{background-color:#000}.elementor-social-icon-thumb-tack{background-color:#1aa1d8}.elementor-social-icon-tripadvisor{background-color:#589442}.elementor-social-icon-tumblr{background-color:#35465c}.elementor-social-icon-twitch{background-color:#6441a5}.elementor-social-icon-twitter{background-color:#1da1f2}.elementor-social-icon-viber{background-color:#665cac}.elementor-social-icon-vimeo{background-color:#1ab7ea}.elementor-social-icon-vk{background-color:#45668e}.elementor-social-icon-weibo{background-color:#dd2430}.elementor-social-icon-weixin{background-color:#31a918}.elementor-social-icon-whatsapp{background-color:#25d366}.elementor-social-icon-wordpress{background-color:#21759b}.elementor-social-icon-x-twitter{background-color:#000}.elementor-social-icon-xing{background-color:#026466}.elementor-social-icon-yelp{background-color:#af0606}.elementor-social-icon-youtube{background-color:#cd201f}.elementor-social-icon-500px{background-color:#0099e5}.elementor-shape-rounded .elementor-icon.elementor-social-icon{border-radius:10%}.elementor-shape-circle .elementor-icon.elementor-social-icon{border-radius:50%}<\/style>\t\t<div class=\"elementor-social-icons-wrapper elementor-grid\">\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-facebook-f elementor-animation-float elementor-repeater-item-7d876ef\" href=\"https:\/\/www.facebook.com\/hackinthebox\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Facebook-f<\/span>\n\t\t\t\t\t\t<svg class=\"e-font-icon-svg e-fab-facebook-f\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M279.14 288l14.22-92.66h-88.91v-60.13c0-25.35 12.42-50.06 52.24-50.06h40.42V6.26S260.43 0 225.36 0c-73.22 0-121.08 44.38-121.08 124.72v70.62H22.89V288h81.39v224h100.17V288z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon- elementor-animation-float elementor-repeater-item-37a6fde\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-twitter elementor-animation-float elementor-repeater-item-962a6bb\" href=\"https:\/\/twitter.com\/HITBSecConf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Twitter<\/span>\n\t\t\t\t\t\t<svg class=\"e-font-icon-svg e-fab-twitter\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M459.37 151.716c.325 4.548.325 9.097.325 13.645 0 138.72-105.583 298.558-298.558 298.558-59.452 0-114.68-17.219-161.137-47.106 8.447.974 16.568 1.299 25.34 1.299 49.055 0 94.213-16.568 130.274-44.832-46.132-.975-84.792-31.188-98.112-72.772 6.498.974 12.995 1.624 19.818 1.624 9.421 0 18.843-1.3 27.614-3.573-48.081-9.747-84.143-51.98-84.143-102.985v-1.299c13.969 7.797 30.214 12.67 47.431 13.319-28.264-18.843-46.781-51.005-46.781-87.391 0-19.492 5.197-37.36 14.294-52.954 51.655 63.675 129.3 105.258 216.365 109.807-1.624-7.797-2.599-15.918-2.599-24.04 0-57.828 46.782-104.934 104.934-104.934 30.213 0 57.502 12.67 76.67 33.137 23.715-4.548 46.456-13.32 66.599-25.34-7.798 24.366-24.366 44.833-46.132 57.827 21.117-2.273 41.584-8.122 60.426-16.243-14.292 20.791-32.161 39.308-52.628 54.253z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>A deep-knowledge security conference and gathering \/\/ HITB x PHDays Saturday, May 25th &#8211; Level M, Residence, Grand Hyatt Erawan Bangkok About Agenda Speakers Talks Venue Humberger Toggle Menu LOGIN Cart 00Days 00Hours 00Minutes 00Seconds Join us in Bangkok for a security get-together featuring some of the regions hottest network security researchers!&#8211; Held in collaboration [&hellip;]<\/p>\n","protected":false},"author":1147,"featured_media":234,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-410","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>HITBxPHDays - 25 May, Bangkok, Thailand<\/title>\n<meta name=\"description\" content=\"Join us for a security get-together in collaboration with PHDays featuring some of the regions hottest network security researchers!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HITBxPHDays - 25 May, Bangkok, Thailand\" \/>\n<meta property=\"og:description\" content=\"Join us for a security get-together in collaboration with PHDays featuring some of the regions hottest network security researchers!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbxphdays\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBxPHDays\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-24T16:26:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/phdays-hero.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2456\" \/>\n\t<meta property=\"og:image:height\" content=\"1728\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbxphdays\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbxphdays\/\",\"name\":\"HITBxPHDays - 25 May, Bangkok, Thailand\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbxphdays\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbxphdays\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbxphdays\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/phdays-hero.png\",\"datePublished\":\"2024-03-19T08:29:40+00:00\",\"dateModified\":\"2024-05-24T16:26:17+00:00\",\"description\":\"Join us for a security get-together in collaboration with PHDays featuring some of the regions hottest network security researchers!\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbxphdays\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbxphdays\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbxphdays\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/phdays-hero.png\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/phdays-hero.png\",\"width\":2456,\"height\":1728},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbxphdays\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbxphdays\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home (Redesign)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbxphdays\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbxphdays\/\",\"name\":\"HITBxPHDays\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbxphdays\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HITBxPHDays - 25 May, Bangkok, Thailand","description":"Join us for a security get-together in collaboration with PHDays featuring some of the regions hottest network security researchers!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"HITBxPHDays - 25 May, Bangkok, Thailand","og_description":"Join us for a security get-together in collaboration with PHDays featuring some of the regions hottest network security researchers!","og_url":"https:\/\/conference.hitb.org\/hitbxphdays\/","og_site_name":"HITBxPHDays","article_modified_time":"2024-05-24T16:26:17+00:00","og_image":[{"width":2456,"height":1728,"url":"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/phdays-hero.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbxphdays\/","url":"https:\/\/conference.hitb.org\/hitbxphdays\/","name":"HITBxPHDays - 25 May, Bangkok, Thailand","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbxphdays\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbxphdays\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbxphdays\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/phdays-hero.png","datePublished":"2024-03-19T08:29:40+00:00","dateModified":"2024-05-24T16:26:17+00:00","description":"Join us for a security get-together in collaboration with PHDays featuring some of the regions hottest network security researchers!","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbxphdays\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbxphdays\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbxphdays\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/phdays-hero.png","contentUrl":"https:\/\/conference.hitb.org\/hitbxphdays\/wp-content\/uploads\/sites\/24\/2024\/03\/phdays-hero.png","width":2456,"height":1728},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbxphdays\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbxphdays\/"},{"@type":"ListItem","position":2,"name":"Home (Redesign)"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbxphdays\/#website","url":"https:\/\/conference.hitb.org\/hitbxphdays\/","name":"HITBxPHDays","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbxphdays\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbxphdays\/wp-json\/wp\/v2\/pages\/410"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbxphdays\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbxphdays\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbxphdays\/wp-json\/wp\/v2\/users\/1147"}],"replies":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbxphdays\/wp-json\/wp\/v2\/comments?post=410"}],"version-history":[{"count":254,"href":"https:\/\/conference.hitb.org\/hitbxphdays\/wp-json\/wp\/v2\/pages\/410\/revisions"}],"predecessor-version":[{"id":861,"href":"https:\/\/conference.hitb.org\/hitbxphdays\/wp-json\/wp\/v2\/pages\/410\/revisions\/861"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbxphdays\/wp-json\/wp\/v2\/media\/234"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbxphdays\/wp-json\/wp\/v2\/media?parent=410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}