Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

GEEKCON Security Geek Competition ends in Shanghai, China. The safety performance of smart cars and mobile phones is tested in turn.

2025-04-04 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > IT Information >

Share

Shulou(Shulou.com)11/24 Report--

The "GEEKCON 2023" China race was held at Shanghai West Coast Art Center on October 24. This year, GeekPwn, the world's first cutting-edge platform to explore artificial intelligence and professional security, has been upgraded to "GEEKCON New Great", which aims to focus on security confrontation, enhance the value of white hat, convey the value of network security and corporate and social significance, and help promote the high-quality and orderly development of technology, industry and digital economy. This time, top security experts, industry top professionals and top white hat hackers from Ant Group, Huawei, Baidu, JD.com, OPPO, Tencent, Xiaomi, vivo and other technology and Internet companies all participated in the competition.

This year's GEEKCON 2023 China Competition has set up five special events: "AVSS Challenge against Research and judgment", "Special Disclosure of Deep Blue Insight", "theme clash of the year: GPT and Hacker", "vulnerability and Exploitation DAF Challenge", and "155th Deep sharing", covering real attack and defense confrontation, deep technology sharing, black and gray industry disclosure, GPT and security trend research and judgment.

Wang Qi, chairman of the GEEKCON Organizing Committee, chairman of DARKNAVY and CEO, said that this year's geek competition's focus on the security industry has upgraded from geek "personal capability value" to "corporate security value". Through security confrontation test competitions, verify the safety of smart cars, mobile phones and other products, and gradually establish safety industry standards and benchmarking effect, so that safety performance has become one of the dimensions to measure the value of enterprises and product brands.

The site of the "GEEKCON 2023" China Station

AVSS game: real attack and defense is the only way to verify security

In the 2023 GEEKCON AVSS online trials, a total of 93 teams composed of universities, enterprises and individuals were received, spanning four continents of Asia, Europe, the United States and Africa, and six teams were finally decided. Among them, the first Tianshu Dubhe team in the online qualifying competition in the AVSS network security collision test field (mobile track) is a security team composed of a group of small partners from Beijing University of posts and Telecommunications (BUPT). The core team has about 30 people. Active in large and small security events at home and abroad, committed to the research and exchange of security technologies in all directions. At the scene of the competition day, six top teams went through eight hours of fierce finals. the scene showed whether multiple versions of Android phones would be invaded by Trojans when browsing malicious websites, whether mobile phones were prone to bullying ads or rogue software, whether location information was leaked, text messages and other sensitive information was hijacked.

Wang Qi expressed the hope that through the competition, the value of network security can be measured and the ability of security can be visualized. Measurable is through the AVSS attack and defense confrontation challenge and scoring system to provide strong support for the standardization of security value measurement; visualization is through a series of attack and defense confrontation real scene presentation, on-site intuitive expression. China already has a very developed digital industry and rich digital scenes, which is in the leading position in the world. at the same time, it is also necessary to incorporate security value into the brand value of enterprises and products. make products more competitive in the domestic and even global markets.

Wang Qi, Chairman of GEEKCON Organizing Committee, Chairman of DARKNAVY and CEO, made a speech.

In-depth disclosure: White hat hackers help law enforcement departments to get rid of underground industry gangs, showing value

Those who use network loopholes to destroy network and information security and seek illegal interests for themselves are called black hat hackers, and those who find system loopholes and maintain network information security and social justice are called white hat hackers. In other words, white hat hackers are hackers who use hacker technology to maintain network information security, and they are just messengers of black and white. The white hat hackers who have participated in geek competitions over the years are all top justice experts at home and abroad. Although many of them are relatively young, they have helped Internet companies or law enforcement departments to track down underground black ash products through their technical capabilities, and are at the forefront of anti-fraud, cracking down on black ash products, and protecting the majority of users.

This year, a special disclosure session was set up on the field, and several groups of contestants disclosed cases of helping law enforcement departments root out underground industry gangs in the past year, including tracing the source of layers of attacks, tracking the traces of illegal acts, tracing the flow of illegal funds, etc., peeling the cocoons to find malicious components in App, preventing the underground industry from exploiting system loopholes to fake traffic, and manipulating mobile phones to click and browse web pages to deceive advertisers and platforms. And prevent the data leakage and manipulation caused by the theft of the user's account, and prevent the user's account from being used to like, comment, brush, and so on. Among them, they helped law enforcement get rid of the largest underground industry gang on mobile, involving more than 100 million controlled mobile phones. Their existence also plays an important role in loophole repair, user privacy and data and even property security protection of major Internet companies.

Organizer DARKNAVY has always been deeply concerned about the development of the geek community. After the innovation and upgrading of the GEEKCON event in 2023, it still hopes that the geek spirit of independence and freedom will continue to shine, so that geeks can get a greater and more sustainable value. Wang Qi said that white hat hackers, like doctors in enterprises, can enhance the immunity of their products. They have done a lot of protection behind their backs, and consumers should have the right to know about the security of the electronic information products they use. It also allows enterprises and products that attach importance to security to gain more trust.

Smart car: avoid loopholes and control the car remotely

As the automobile has changed from traditional mechanical products to electronic consumer products, in addition to the safety performance of the vehicle itself, the information security of the automobile is also very important. More and more intelligent cars store more sensitive information such as personal information, driving habits and navigation records, which may cause a series of problems if these data are stolen. Last year, there were varying degrees of disclosure of user information of different brands. If the vehicle control data is maliciously attacked, stolen and tampered with, so that the vehicle is illegally controlled, it will lead to serious social road safety problems, so the information security protection of enterprises continue to put forward higher requirements.

Auto safety-related projects have been the focus of the stage since the first geek contest in 2014. Different brands, different loopholes, different problems, there have been more than a dozen car cracking projects appeared on the field. This year, several groups of contestants have conducted research on polar krypton intelligent connected cars to find out the relevant network security issues. From the race site to December, polar krypton cars will be tested by safety researchers to help brands continuously improve the safety capabilities of their products.

Liu Hao, vice president of extreme krypton intelligent technology, said that polar krypton cars attach great importance to network security manipulation. at present, there are about 5,000 people in electronic and electrical appliances, intelligent driving and other areas. from the development trend of the industry, the number of lines of code for smart cars in 2025 will exceed 1 billion lines, so in addition to car physical security, the distance of digital security will be longer. The car digital safety collision track in this competition can enhance the immunity of automobile digital safety.

Liu Hao, vice president of polar krypton intelligent technology, spoke.

Focus on the frontier of GPT: apply GPT to security attack and defense to prevent AI from being abused

With the continuous iteration of the GPT model and the extensive increase of various application scenarios, new business type, new models, new tools and new markets have been created in the industry, and the intelligence of various industries has been promoted at the same time, but along with it, ensuring safety and rational use of AI is the premise of rapid development.

Researchers from many laboratories, such as Ant Security Lightyear Lab, challenge GPT security and show their research results: use self-made tools to generate "jailbreak" prompts in batch, mislead GPT to break through restrictions or make errors; from a positive point of view, use GPT to assist security research, apply GPT to security attack and defense, prevent AI technology from being abused and used, and maintain network order and security.

Wei Tao, vice president and chief technical safety officer of Ant Group, who is also the judge and issue review committee of GEEKCON, said that the general technology in the future is AI and safety. With the great improvement in production efficiency brought about by GPT, it is necessary to match the corresponding safety capabilities. When the digital output value of the Internet industry and various industries is getting larger and larger, if the positive investment in security is insufficient, the reverse will be violated on a large scale, and the degree is deep and wide. At present, the annual investment in the field of security is less than 1/1000 of AI, and the volume gap between domestic and foreign security market is relatively large, the security industry still has a lot of room for improvement. Ant Group assists law enforcement departments every year and has done a lot of work in big data leakage and anti-fraud. For example, the African fraud gang that we once knocked down, they use GPT to generate fraud scripts and translation tools to defraud domestic investment, but this is only a part of the security industry. The whole security industry development and marketization process need common development through compliance, actual combat, insurance and other fields. The science popularization of information security makes everyone and every enterprise have the promotion of security awareness and awareness, so that it is possible to effectively protect the security of all parties in the complex and ever-changing international environment and the rapidly developing domestic environment.

Wei Tao, vice president of Ant Group, chief technical safety officer, GEEKCON competition judge and topic review committee, made a speech.

For a long time, GEEKCON pays attention to the development and change of the whole security industry and geek group, from the frontier AI security, to intelligent life security, to the measurable and visualization of industrial security and value. GEEKCON Competition always walks in the forefront of the security industry, brings together top talents at home and abroad, and gives birth to numerous "world first", "world first" and "global only" technological achievements. Its social value and industrial value are also constantly recognized by the industry and authoritative organizations, providing safety standards and tests for the whole industry and consumers.

There is no system without loopholes in the world, and all security efforts are to ensure the security of network information as much as possible. Network security is a war without gunpowder smoke, and every country, enterprise and individual is a participant.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

IT Information

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report