關於我


簡介 Bio

馬聖豪(@aaaddress1)目前為 TXOne Networks 產品資安事件應變暨威脅研究團隊 資安威脅研究員,專研 Windows 逆向工程分析超過十年經驗,熱愛 x86、漏洞技巧、編譯器實務、與作業系統原理。 

此外,他目前為台灣資安社群 CHROOT 成員。並曾任 Black Hat USA、DEFCON、CODE BLUE、 HITB、VXCON、HITCON、ROOTCON、CYBERSEC 等各個國內外年會講者與授課培訓,並著有熱銷資安書籍《Windows APT Warfare:惡意程式前線作戰指南》

Sheng-Hao Ma (@aaaddress1) is currently working as a senior threat researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 

He has also served as a speaker and instructor for various international conferences and organizations such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

聯繫方式 Contact 

著作 Publishcation 

經歷 Outlines

  1. CHROOT 資安社群成員
  2. TXOne Networks, inc. 資安威脅研究員
  3. 工業技術研究院、資訊工業策進會、奧義智慧科技 實習生
  4. BlackHat USA 2022: A New Trend for the Blue Team - Using a Practical Symbolic Engine to Detect Evasive Forms of Malware/Ransomware
  5. DEFCON 26: Playing Malware Injection with Exploit thoughts
  6. HITB (Hack In The Box) 2021 AMS: Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland
  7. COSCUP 2022: 跨國投稿從入門到精通:那些投稿大師必備的小技巧
  8. iThome CYBERSEC 2022: 現代攻擊者免殺心法:以時間鉗形戰術打穿即時防護
  9. iThome CYBERSEC 2022: 文件格式混用在野技巧:從防守盲點到惡意利用
  10. iThome CYBERSEC 2022: 從反組譯建立次世代語意感知特徵碼引擎
  11. iThome CYBERSEC 2022: 我識破你的識破:LSALSASSUSELESS
  12. iThome CYBERSEC 2021: 重建天堂之門:從 32bit 地獄一路打回天堂聖地
  13. iThome CYBERSEC 2020: 唉唷,你的簽章根本沒在驗啦。
  14. ROOTCON 2021: Skrull Like A King: From File Unlink to Persistence
  15. HITCON 2022: 藍隊新曙光 - 以語意感知之的啟發式符號引擎挫敗在野勒索軟體
  16. HITCON CMT 2021: Skrull Like A King: 從重兵看守的天眼防線殺出重圍
  17. HITCON CMT 2020: Reversing In Wonderland: Neural Network Based Malware Detection Techniques
  18. HITCON CMT 2019: Duplicate Paths Attack: Get Elevated Privilege from Forged Identities
  19. IEEE S&P (Co-located with Oakland) 2019: Demo: An Emulator-based Active Protection System against IoT Malware
  20. Black Hat Asia Arsenal 2018: PUZZCODE, MAKE BACKDOORS GREAT AGAIN!
  21. VXCON 2018 Speaker: Implementing Software Packer
  22. 果核數位 2022: 在野軍火提權戰略:攻破 Windows 11 再次奪下主控權
  23. SITCON 2020: Playing Win32 Like a K!NG ;)
  24. HITCON CMT 2015 Speaker: Android AIDS:Automatic Intelligence De-advertisement Scheme In CSharproid
  25. HITCON CMT 2015 Speaker: 欺騙IDA Pro Hex Rays插件!讓逆向分析者看見完全不同的結果 IDA Pro Hex-Rays Decompiler Cheat
  26. HITCON CMT 2016 Lightning Talk: PokemonGo Hacking without Jailbreak
  27. HITCON CMT 2017 Speaker: Windows Injection 101: from Zero to ROP
  28. HITCON CMT 2018 Speaker: Malware Sandbox Emulation in Python
  29. HoneyCon 2018: 加密與保護:揭秘程式保護殼如何防止駭客破解你的產品
  30. SITCON 2016 Speaker: 防毒擋不住?勒索病毒猖獗與實作
  31. SITCON 2017 Speaker: 開發學校雲端服務的奇技淫巧
  32. iThome#Chatbot Day 2017 Speaker: 孫子廣播電台
  33. ICNC'17 IEEE Workshop 論文: Advertisement Removal of Android Applications by Reverse Engineering

教育訓練 Training

  1. HITCON Training 2021/2020/2019: Windows APT Warfare
  2. HITCON Training 2018: from Zero to Windows Shellcode Expert
  3. 資安卓越中心計畫(CCoE)頂尖資安人才培育專案 2021, 2022
  4. 教育部資訊安全人才培育計畫: Windows 惡意程式分析實務 
  5. 教育部資安實務攻防研習營 (PwnReversing)
  6. 教育部資訊安全基礎技術工作坊 (PwnReversing)

留言

這個網誌中的熱門文章

重建天堂之門:從 32 位元地獄一路打回天堂聖地(下)攻擊篇:x96 Shellcode、天堂聖杯 & 天堂注入器

[ASM][IDA][C++]爆破也能很優雅!純靜態爆破文件關鍵點+純靜態打Patch(IDA反組譯﹢打Patch)

[C#] Lambda花式應用噁爛寫法(跨UI委派秒幹、多線程處理...etc)