VXCON 2019
Main Conference: 27-April-2019 (Saturday)

Participants of the VXCON main conference are eligible to earn 6 hours of CPE

Workshop and Village (Tentative)
25-26 April Workshop
28 April Village
29-30 April Workshop

Early Bird Tickets!
Get your tix!


VXCON, we are glad to invite a few prominent speakers and researchers all over the world. They are frequent speakers of Blackhat, DEF CON, HITCON and in various global hacker and security conference. Meanwhile, some are very good at Malware Analysis, CTF and Exploitation and Hardware. We focus on offensive security, threat and exploitation. Please enjoy and join us.


-- update soon --

Satoshi Tanda

Security Researcher
Topic: AMD-V for Hackers

Moonbeom Park

Security Researcher
Topic: Malware, IoT and Threat

Dr Quynh and KJ

Security Researchers
Topic: Virtualizing IoT With Code Coverage Guided Fuzzing

Clarence Chio

Security Researcher
Topic: AI and Machine Learning

Anthony Lai

Security Researcher
Topic: Malware Analysis and Machine Learning


Security Researcher
Topic: Advanced Binary Exploitation


Tentative Schedule

Main Conference: 27-Apr 2019 09:00-18:00 (Venue: The Wave)
09:30 - 09:35Opening
09:40 - 09:55Keynote
10:00 - 10:45Dr Quinyh and KJ - Virtualizing IoT With Code Coverage Guided Fuzzing
10:45 - 11:00Break
11:00 - 11:45Clarence Chio - AI and Machine Learning
11:45 - 12:30Moonbeom Park - Malware, IoT and Threat
14:00 - 14:45Lunch Break
14:45 - 15:30이소연 So-Yeon Lee - Leaking Kernel pointers / CTF challenges walkthrough
15:30 - 15:45Break
15:45 - 16:30Satoshi Tanda - AMD-V for Hackers
16:30 - 17:00Anthony LAI/Ken Wong: Malware Analysis and Machine Learning
17:00 - 17:30[TBC]
Get your tickets - Early Bird

Tentative Workshop Schedule

Angelboy (World Top Binary pwner from HITCON)

Topic : Binary Exploitation - 2 days (25-26 April)
Linux Heap exploitation
Glibc memory allocator
Use after free
Unsafe unlink
House of force
Advanced Linux heap exploitation
Fastbin attack
Unsorted bin attack
Unsorted bin corruption
Large bin attack
File structure exploitation
File Structure internel
Make file structure great again
Windows exploitation
From Linux to Windows
Bypass some Protection

Satoshi (World Top Windows Kernel and Reverse Engineer)

Date: 28 April (1000-1500) Topic: Hypervisor Development Hands On for Security Researchers on Windows
Why Learning VT-x
Sharing Goals of the Workshop
Exercise 0: Run Our Hypervisor and Observe Behavior
Basics of Intel VT-x
Processor Modes: VMX root operation and VMX non-root operation
Mode Transition: VMX instructions, VM-exit and VM-entry
VMCS: A Context Structure for a Guest
Source Code Work-through
Exercise 1: Implement the CPUID Handler
Customizing Hypervisor
More on VMCS
Opting-in More VM-exit
Exercise 2: Implement a Context Switch Tracer (CR3 monitor)
Wrapping Up
Typical Vulnerabilities You Would Make
Further Features and Learning Resources
For workshop, please contact darkfloyd[at] for details


Please contact info[at] for arrangement

Supporting Organisations, CON and Friends


Conference Venue - The Wave

8/F, The Wave, 4 Hing Yip Street, Kwun Tong, Hong Kong