2024

Web3 Security: Full Lifecycle Protection

Speaker: Thinking - Security Audit Team Leader of SlowMist

Tracelnsight: Real-Time and Early Detection of Smart Contract Vulnerabilities

Speaker: Dr.Chiachih Wu - Partner & Head of Web3 Security at Amber Group

Security Practice in MPC Adoption: Enhancing Web3 Security

Speaker: Max He - Co-founder & Chief Scientist of Safeheron

Panel Discussion (Web3 Security and Compliance)

· Keywolf - Partner & CPO of SlowMist

· Tony Chen - Co-Founder & CTO of TokenPocket

· Mr.Gilbert Ng - Lawyer & Head of Legal and Compliance at Mualana

· Prof.Feida ZHU - Tenured Associate Professor & Associate Dean of SMU

Web3 DevSecOps: Methodology and Best Practices

Speaker: SunSec - CISO of XREX & Founder of DeFiHackLabs

Empowering Web3 Innovation: Akamai's Cutting-Edge Security Defense System

Speaker: Zoe - Principal Security Consultant of Akamai

2023

SlowMist Night Talk

Building a Collaborative Blockchain Security Defense System.

2022

SlowMist Night Talk

Building a Collaborative Blockchain Security Defense System.

2021

SlowMist Night Talk

Building a Collaborative Blockchain Security Defense System.

2020

In-Depth Analysis of Security Systems for Digital Asset Platforms

Sharing ideas on building security systems for centralized digital asset platforms, including standards and best security practices.

Analysis of Security Vulnerabilities in Decentralized Wallets

Examining security vulnerabilities in a well-known decentralized wallet and corresponding defense measures.

Analysis of Security Vulnerabilities in Third-Party Service Programs

Analyzing security vulnerabilities in a customer service platform program and sharing best security practices for third-party service components.

Attack and Defense on Digital Asset Platforms

Sharing attack methods and APT case studies relevant to digital asset platform business scenarios, along with corresponding defense measures.

How Should Security Emergency Response Be Conducted?

Sharing best operational practices for the security team on how to quickly locate, isolate, and collect evidence after a digital asset platform's defenses are breached.

SlowMist Night Talk

Building a Collaborative Blockchain Security Defense System (Invitation-only).

DeFi Flash Loan Attack and Defense Battle

Speaker: Yudan & Kong - Senior Security Engineers at SlowMist

Practical Security for Digital Asset Platform Businesses

Speaker: TooLong - VP of Engineering @ big.one

Taiji - Blockchain Network Infrastructure

Speaker: 魏殊予 - System Engineer at Xinghuo Mining Pool

Trusted Computing, MPC, and Digital Asset Security

Speaker: Max He - Chief Scientist at Xianbing Technology

Commercial Security and Privacy Awareness in Complex Environments

Speaker: Longas - Head of RC2 Anti-Eavesdropping Laboratory

Latest Security Situations and Strategies in "Response"

Speaker: Zoe - Technical Consultant at Akamai Greater China

Practical Experience in Digital Currency Tracking and Tracing

Speaker: Aroundight - Founder of Joinsec

2019

Analysis of Hacking Cases

Examining all disclosed hacking incidents in history, showcasing the activities of underground hackers globally.

Security System Construction

Providing a comprehensive approach to building security systems for both centralized and decentralized business scenarios.

On-Chain Attack and Defense of Public Chains

Analyzing practical vulnerabilities inherent to public chains, along with demonstrations and defense recommendations.

On-Chain Attack and Defense of Smart Contracts

Examining practical vulnerabilities in smart contracts, along with demonstrations and defense recommendations.

Q&A: SlowMist Night Talk

Some good questions, some good answers—discussing security in the SlowMist Night Talk.

Off-Chain Attack and Defense: Classic Vulnerabilities

Analyzing classic vulnerabilities that have occurred in the real world, showcasing attack methods, and providing demonstrations and defense recommendations.

Off-Chain Attack and Defense: Unknown Secrets

Analyzing undisclosed attack methods that have occurred in the real world. How should we respond when underground hackers come from within?

Demonstration of Advanced Underground Hacker Invasion Techniques

Demonstrating invasion techniques used by advanced underground hackers (including advanced phishing and Trojan intrusions) and providing defense recommendations.

Review of Security System Construction

A comprehensive review of the work involved in building a security system, leaving with valuable insights.

Q&A

Open Q&A session.

2024

AI-based Security Audit Knowledge Base Management

Speaker: Thinking & Aro

Hardware Wallet Security Audit Guide

Speaker: Thinking

Deep-Learning Based Case Investigation Report

Speaker: LC

Best Security Practices for Aggregated Swap

Speaker: White

2023

Bitcoin Signature Security

Speaker: Cos

Web Front-end Security Audit Guide

Speaker: Yao

Solana Security Audit Guide

Speaker: Johan

Early Malice Detection On BTC with Asset Transfer Path and Intention Discovery

Speaker: LC

Explanation of zk-SNARK Groth16

Speaker: Kong

In-depth understanding of ZK-STARK: Arithmetization

Speaker: Enze

Cairo Smart Contract Security Audit Guide

Speaker: DoubleNine

Introduction to Zero-Knowledge Proofs

Speaker: Wuwei

2022

Core Guide to MistTrack Investigation

Speaker: Zero

Aptos MOVE Security Audit Guide

Speaker: Kong

Blockchain Security Audit Guide

Speaker: Johan

On Chain: Security Emergency Response

Speaker: Kong

NFT Signature Phishing Demo and Principle Analysis

Speaker: Cos

Application of Machine Learning in AML

Speaker: Lyndon

Web3 Browser Extension Wallet Security Audit Guide

Speaker: Thinking

Utilization Ideas and Applicable Scenarios for ms-officecmd-rce

Speaker: Yao

2020

Evolution and Principles of Wallet Systems in Centralized Exchanges

Speaker: Keywolf

2019

Penetration Testing: Collection of Key Information

Speaker: 23pds

Insights on Software Architecture

Speaker: Cos

False Top-up Vulnerability Testing Guide

Speaker: Yudan

Experience in XSS Vulnerability Discovery

Speaker: Cos

Exploring EVM Opcodes

Speaker: Thinking

EOS Smart Contract Security Audit Guide

Speaker: Johan