Home About
About
Cancel

About

黃智威 ( Jr-Wei Huang ) a.k.a. in0de, Will

畢業於台灣科技大學資工所, Connectivity Lab 主要研究主題: malware analysis、system security

SKILL

  • Programing Language
    • C, C++, assembly, python
  • Debugging Tools
    • GDB, IDA Pro, Radare2, x64dbg, Frida
  • Familiar with
    • ELF, PE, Firmware, Reverse Engineering

INTERN

  • 2021 TEAM T5-杜浦數位安全有限公司, Product developer
  • 2020 TEAM T5-杜浦數位安全有限公司, Intern
  • 2019 NICT-日本情報通信研究機構, Intern
  • 2018 安華聯網科技股份有限公司, Intern

Reported CVE

  • CVE-2021-1602 (Remote Command Execution Vulnerability)

TRAINING

  • 2022 iThome CYBERSEC - 威脅獵捕實戰演練 ( 2hr )
  • 2022 T5camp - 一日系統底層初探 ( 4hr )
  • 2021 企業教育訓練 - Dynamic Symbolic Execution in IoT ( 6hr )
  • 2021 企業教育訓練 - Windows Reversing ( 6hr )
  • 2021 教育部資訊安全人才培育計畫-網路攻防暨逆向工程工作坊 -Target Attack Analysis and Incident Response ( 3hr )
  • 2020 台科大資安社 - IoT Malware Analysis ( 2hr )
  • 2020 台科大網路安全 - HTTPS Introduce ( 3hr )
  • 2019 台科大資訊安全導論 - Beginning of CTF ( 3hr )
  • 2018 台科大電腦研習社 - Python 爬蟲 ( 4hr )

SPEAKING

  • 2023 JSAC - Track Down Stealth Fileless Injection-based Nginx Backdoor in the Attack
  • 2022 HITCON - Every Authorization Has Its Black: Tackling Privilege Escalation in macOS

AWARDED

  • 2020 HITCON X BALSN 資安交流經典賽 1st
  • 2020 InnoServe Security Group 1st
  • 2020 IoT sandbox final 9th
  • 2020 金盾獎 嶄露頭角獎
  • 2020 AIS3 EOF Final 9th
  • 2018 AIS3 MyFirstCTF 1st

Academic publication

  • 2020 IEEE S&P (poster accept)
    • ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple HardwareArchitectures
  • 2019 AsiaJCIS (paper accept)
    • Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices

email: willll1616@gmail.com