關於我
簡介 Bio
馬聖豪(ShengHao Ma, aka aaaddress1)目前於 TXOne Networks 擔任資安威脅研究員,專研 Windows 逆向工程分析超過十年經驗,熱愛 x86、漏洞技巧、編譯器實務、與作業系統原理。
此外,他目前為台灣資安社群 CHROOT 成員。並曾任 DEFCON、HITB、BlackHat、VXCON、HITCON、ROOTCON、CYBERSEC 等各個國內外年會講者與授課培訓,並著有熱銷資安書籍《Windows APT Warfare:惡意程式前線作戰指南》
Sheng-Hao Ma (@aaaddress1) is currently working as a threat researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan.
He has also served as a speaker and instructor for various international conferences and organizations such as DEFCON, HITB, BlackHat, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".
聯繫方式 Contact
- aaaddress1@chroot.org
- Twitter (@aaaddress1)
- Facebook (馬聖豪, Sheng-Hao Ma)
- Linkedin (Sheng-Hao Ma)
- Github (aaaddress1, Sheng-Hao Ma)
著作 Publishcation
經歷 Outlines
- CHROOT 資安社群成員
- TXOne Networks - 資安威脅研究員
- 工業技術研究院、資訊工業策進會 實習生
- HITB (Hack In The Box) Amsterdam: Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland
- iThome CYBERSEC 2021: 重建天堂之門:從 32bit 地獄一路打回天堂聖地
- iThome CYBERSEC 2020: 唉唷,你的簽章根本沒在驗啦。
- SITCON 2020: Playing Win32 Like a K!NG ;)
- ROOTCON 2021: Skrull Like A King: From File Unlink to Persistence
- HITCON CMT 2021: Skrull Like A King: 從重兵看守的天眼防線殺出重圍
- HITCON CMT 2020: Reversing In Wonderland: Neural Network Based Malware Detection Techniques
- HITCON CMT 2019: Duplicate Paths Attack: Get Elevated Privilege from Forged Identities
- IEEE S&P (Co-located with Oakland) 2019: Demo: An Emulator-based Active Protection System against IoT Malware
- DEFCON 26: Playing Malware Injection with Exploit thoughts
- Black Hat 2018 Speaker: PUZZCODE, MAKE BACKDOORS GREAT AGAIN!
- VXCON 2018 Speaker: Implementing Software Packer
- HITCON CMT 2015 Speaker: Android AIDS:Automatic Intelligence De-advertisement Scheme In CSharproid
- HITCON CMT 2015 Speaker: 欺騙IDA Pro Hex Rays插件!讓逆向分析者看見完全不同的結果 IDA Pro Hex-Rays Decompiler Cheat
- HITCON CMT 2016 Lightning Talk: PokemonGo Hacking without Jailbreak
- HITCON CMT 2017 Speaker: Windows Injection 101: from Zero to ROP
- HITCON CMT 2018 Speaker: Malware Sandbox Emulation in Python
- HoneyCon 2018: 加密與保護:揭秘程式保護殼如何防止駭客破解你的產品
- SITCON 2016 Speaker: 防毒擋不住?勒索病毒猖獗與實作
- SITCON 2017 Speaker: 開發學校雲端服務的奇技淫巧
- iThome#Chatbot Day 2017 Speaker: 孫子廣播電台
- ICNC'17 IEEE Workshop 論文: Advertisement Removal of Android Applications by Reverse Engineering
教育訓練 Training
- HITCON Training 2021/2020/2019: Windows APT Warfare
- HITCON Training 2018: from Zero to Windows Shellcode Expert
- 資安卓越中心計畫(CCoE)頂尖資安人才培育專案 2021
- 教育部資訊安全人才培育計畫: Windows 惡意程式分析實務
- 教育部資安實務攻防研習營 (Pwn, Reversing)
- 教育部資訊安全基礎技術工作坊 (Pwn, Reversing)
留言
張貼留言