黃智威 ( Jr-Wei Huang ) a.k.a. in0de, Will
畢業於台灣科技大學資工所, Connectivity Lab 主要研究主題: malware analysis、system security
SKILL
- Programing Language
- C, C++, assembly, python
- Debugging Tools
- GDB, IDA Pro, Radare2, x64dbg, Frida
- Familiar with
- ELF, PE, Firmware, Reverse Engineering
INTERN
- 2021 TEAM T5-杜浦數位安全有限公司, Product developer
- 2020 TEAM T5-杜浦數位安全有限公司, Intern
- 2019 NICT-日本情報通信研究機構, Intern
- 2018 安華聯網科技股份有限公司, Intern
Reported CVE
- CVE-2021-1602 (Remote Command Execution Vulnerability)
TRAINING
- 2022 iThome CYBERSEC - 威脅獵捕實戰演練 ( 2hr )
- 2022 T5camp - 一日系統底層初探 ( 4hr )
- 2021 企業教育訓練 - Dynamic Symbolic Execution in IoT ( 6hr )
- 2021 企業教育訓練 - Windows Reversing ( 6hr )
- 2021 教育部資訊安全人才培育計畫-網路攻防暨逆向工程工作坊 -Target Attack Analysis and Incident Response ( 3hr )
- 2020 台科大資安社 - IoT Malware Analysis ( 2hr )
- 2020 台科大網路安全 - HTTPS Introduce ( 3hr )
- 2019 台科大資訊安全導論 - Beginning of CTF ( 3hr )
- 2018 台科大電腦研習社 - Python 爬蟲 ( 4hr )
SPEAKING
- 2023 JSAC - Track Down Stealth Fileless Injection-based Nginx Backdoor in the Attack
- 2022 HITCON - Every Authorization Has Its Black: Tackling Privilege Escalation in macOS
AWARDED
- 2020 HITCON X BALSN 資安交流經典賽 1st
- 2020 InnoServe Security Group 1st
- 2020 IoT sandbox final 9th
- 2020 金盾獎 嶄露頭角獎
- 2020 AIS3 EOF Final 9th
- 2018 AIS3 MyFirstCTF 1st
Academic publication
- 2020 IEEE S&P (poster accept)
- ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple HardwareArchitectures
- 2019 AsiaJCIS (paper accept)
- Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices
email: willll1616@gmail.com