2024
-
Web3 Security: Full Lifecycle Protection
Speaker: Thinking - Security Audit Team Leader of SlowMist
-
Tracelnsight: Real-Time and Early Detection of Smart Contract Vulnerabilities
Speaker: Dr.Chiachih Wu - Partner & Head of Web3 Security at Amber Group
-
Security Practice in MPC Adoption: Enhancing Web3 Security
Speaker: Max He - Co-founder & Chief Scientist of Safeheron
-
Panel Discussion (Web3 Security and Compliance)
· Keywolf - Partner & CPO of SlowMist
· Tony Chen - Co-Founder & CTO of TokenPocket
· Mr.Gilbert Ng - Lawyer & Head of Legal and Compliance at Mualana
· Prof.Feida ZHU - Tenured Associate Professor & Associate Dean of SMU
-
Web3 DevSecOps: Methodology and Best Practices
Speaker: SunSec - CISO of XREX & Founder of DeFiHackLabs
-
Empowering Web3 Innovation: Akamai's Cutting-Edge Security Defense System
Speaker: Zoe - Principal Security Consultant of Akamai
2023
-
SlowMist Night Talk
Building a Collaborative Blockchain Security Defense System.
2022
-
SlowMist Night Talk
Building a Collaborative Blockchain Security Defense System.
2021
-
SlowMist Night Talk
Building a Collaborative Blockchain Security Defense System.
2020
-
In-Depth Analysis of Security Systems for Digital Asset Platforms
Sharing ideas on building security systems for centralized digital asset platforms, including standards and best security practices.
-
Analysis of Security Vulnerabilities in Decentralized Wallets
Examining security vulnerabilities in a well-known decentralized wallet and corresponding defense measures.
-
Analysis of Security Vulnerabilities in Third-Party Service Programs
Analyzing security vulnerabilities in a customer service platform program and sharing best security practices for third-party service components.
-
Attack and Defense on Digital Asset Platforms
Sharing attack methods and APT case studies relevant to digital asset platform business scenarios, along with corresponding defense measures.
-
How Should Security Emergency Response Be Conducted?
Sharing best operational practices for the security team on how to quickly locate, isolate, and collect evidence after a digital asset platform's defenses are breached.
-
SlowMist Night Talk
Building a Collaborative Blockchain Security Defense System (Invitation-only).
-
DeFi Flash Loan Attack and Defense Battle
Speaker: Yudan & Kong - Senior Security Engineers at SlowMist
-
Practical Security for Digital Asset Platform Businesses
Speaker: TooLong - VP of Engineering @ big.one
-
Taiji - Blockchain Network Infrastructure
Speaker: 魏殊予 - System Engineer at Xinghuo Mining Pool
-
Trusted Computing, MPC, and Digital Asset Security
Speaker: Max He - Chief Scientist at Xianbing Technology
-
Commercial Security and Privacy Awareness in Complex Environments
Speaker: Longas - Head of RC2 Anti-Eavesdropping Laboratory
-
Latest Security Situations and Strategies in "Response"
Speaker: Zoe - Technical Consultant at Akamai Greater China
-
Practical Experience in Digital Currency Tracking and Tracing
Speaker: Aroundight - Founder of Joinsec
2019
-
Analysis of Hacking Cases
Examining all disclosed hacking incidents in history, showcasing the activities of underground hackers globally.
-
Security System Construction
Providing a comprehensive approach to building security systems for both centralized and decentralized business scenarios.
-
On-Chain Attack and Defense of Public Chains
Analyzing practical vulnerabilities inherent to public chains, along with demonstrations and defense recommendations.
-
On-Chain Attack and Defense of Smart Contracts
Examining practical vulnerabilities in smart contracts, along with demonstrations and defense recommendations.
-
Q&A: SlowMist Night Talk
Some good questions, some good answers—discussing security in the SlowMist Night Talk.
-
Off-Chain Attack and Defense: Classic Vulnerabilities
Analyzing classic vulnerabilities that have occurred in the real world, showcasing attack methods, and providing demonstrations and defense recommendations.
-
Off-Chain Attack and Defense: Unknown Secrets
Analyzing undisclosed attack methods that have occurred in the real world. How should we respond when underground hackers come from within?
-
Demonstration of Advanced Underground Hacker Invasion Techniques
Demonstrating invasion techniques used by advanced underground hackers (including advanced phishing and Trojan intrusions) and providing defense recommendations.
-
Review of Security System Construction
A comprehensive review of the work involved in building a security system, leaving with valuable insights.
-
Q&A
Open Q&A session.
2024
-
AI-based Security Audit Knowledge Base Management
Speaker: Thinking & Aro
-
Hardware Wallet Security Audit Guide
Speaker: Thinking
-
Deep-Learning Based Case Investigation Report
Speaker: LC
-
Best Security Practices for Aggregated Swap
Speaker: White
2023
-
Bitcoin Signature Security
Speaker: Cos
-
Web Front-end Security Audit Guide
Speaker: Yao
-
Solana Security Audit Guide
Speaker: Johan
-
Early Malice Detection On BTC with Asset Transfer Path and Intention Discovery
Speaker: LC
-
Explanation of zk-SNARK Groth16
Speaker: Kong
-
In-depth understanding of ZK-STARK: Arithmetization
Speaker: Enze
-
Cairo Smart Contract Security Audit Guide
Speaker: DoubleNine
-
Introduction to Zero-Knowledge Proofs
Speaker: Wuwei
2022
-
Core Guide to MistTrack Investigation
Speaker: Zero
-
Aptos MOVE Security Audit Guide
Speaker: Kong
-
Blockchain Security Audit Guide
Speaker: Johan
-
On Chain: Security Emergency Response
Speaker: Kong
-
NFT Signature Phishing Demo and Principle Analysis
Speaker: Cos
-
Application of Machine Learning in AML
Speaker: Lyndon
-
Web3 Browser Extension Wallet Security Audit Guide
Speaker: Thinking
-
Utilization Ideas and Applicable Scenarios for ms-officecmd-rce
Speaker: Yao
2020
-
Evolution and Principles of Wallet Systems in Centralized Exchanges
Speaker: Keywolf
2019
-
Penetration Testing: Collection of Key Information
Speaker: 23pds
-
Insights on Software Architecture
Speaker: Cos
-
False Top-up Vulnerability Testing Guide
Speaker: Yudan
-
Experience in XSS Vulnerability Discovery
Speaker: Cos
-
Exploring EVM Opcodes
Speaker: Thinking
-
EOS Smart Contract Security Audit Guide
Speaker: Johan