skip to main content

DEF CON China 1.0 Hacking Conference



English | 中文

Transferability of adversarial examples to attack real world porn images detection service

Liu Yan (Dou Goodman) Senior Security Researcher, Baidu X-Lab

Wei Tao Chief Security Scientist, Baidu

Adversarial learning aims at understanding the weaknesses of machine learning in the adversarial environment and developing protection against potential threats. In the field of object detection and image classification, a large number of open source machine learning models are used by industry. Researchers can attack Faster RCNN, SSD, VGG, ResNet and so on by using white boxes to generate adversarial images, then transfer learning to attack object detection and image classification systems in the real world before. But in the field of porn images detection, the only well-known open source model is Yahoo's NSFW. We have proved through experiments that transfer learning to the Yahoo's NSFW, can attack the real world porn images detection service with a lower success rate. Further research shows that by optimizing the loss function and adjusting the attack algorithm, a higher success rate can be achieved without affecting human senses through smaller disturbances. We call the new attack algorithm as FDA (FeatureMap Destroy Attack). At the same time, we also propose a method to detection and defense Real-World Adversarial Images for Illicit Online Porn.

Liu Yan (Dou Goodman), Head of AI security team of Baidu Xlab, Famous technology writer of《machine learning for the web security》,《deep learning for the web security》,《reinforcement learning and GANs for the web security》.

Creating the DEFCON China 1.0 Badge

Joe Grand (Kingpin)

In honor of the first official DEFCON China event, we present to you a badge with a purpose. Created with the specific goal of bringing the DEFCON China community together, the badge is a fun, open source, hackable, and reusable electronic device.

Join badge designer Joe Grand as he guides you through the entire badge development process, including early concepts, prototyping, manufacturing, and all of the challenges he faced along the way.

Joe Grand (@joegrand), also known as Kingpin, is a computer engineer, hardware hacker, DEFCON badge designer, teacher, advisor, runner, daddy, honorary doctor, TV host, member of legendary hacker group L0pht Heavy Industries, and the proprietor of Grand Idea Studio ( He has been creating, exploring, and manipulating electronic devices since the 1980s. @joegrand (Twitter) and

Tag-side attacks against NFC

Christopher Wade

This talk covers tag-side attacks against NFC communication protocols, including cracking of Mifare encryption keys and performing targeted attacks against NFC readers. In addition, it will cover the design and creation of devices capable of emulating NFC tags down to the raw protocol using standard components and tools, with no abstraction to dedicated hardware, covering and expanding on the capabilities of available products. This talk will contain how 13.56MHz NFC works at a raw level, how tools can be built for analysing it, how the protocol can be implemented in full on standard Microcontrollers, and the security weaknesses present in its design.

Chris is a seasoned security researcher and testing consultant. His main focuses are in reverse engineering hardware, fingerprinting USB vulnerabilities and playing with Software Defined Radios, with his key strength lying in firmware analysis, which he utilises as part of the hardware testing team at Pen Test Partners.
@Iskuri1 on Twitter

The art of game security

Joey Zhu Expert/Director

The game security is a branch of security without noteworthy, but the problems is critical for game survival. The underground economy cost billions of dollars loss from game, the presentation will discover some founding at underground economy at first. In the main part of presentation will show some techniques details of game hacks with comparison of traditional security problem. The last part will discuss some protection countermeasures against those hacks and exploits.

Joey Zhu is an expert and director at Tencent, and working on Game Security since 2013. Previously, he was an architect and researcher at Trend Micro China from 2005 to 2012. His major work focus on PE virus sandbox, Script Analysis Engine on web threats and Game Security solution. He was honored to be a speaker on the topic “Chinese phishing at DEF CON 19”, in Las Vegas, in 2011.

WeChat: joey-nj

Hacking Driverless Vehicles


Did you watch Total Recall and wish you could fuck up JohnnyCab? Driverless vehicles are here at last and practically ripe for the hacking. Autonomous and unmanned systems already patrol our skies and oceans, and are being tested on our streets, highways and sidewalks. All trends indicate these systems are at an inflection point that will show them rapidly becoming commonplace. It is therefore a salient time for a discussion of their capabilities and potential vulnerabilities.

This session will be an informative and light-hearted look at the current state of civil driverless vehicles and what hackers or other reprobates might do to mess with them. Topics covered will include the full suite of common and proposed sensors, decision profiles and potential failure modes that could be exploited. This talk aims to both inspire unmanned vehicle designers and end users to think about robustness to adversarial and malicious scenarios, and to give the paranoid false hope of resisting the robot revolution.

Zoz is a robotics interface designer and rapid prototyping specialist. As co-host of the Discovery Channel show 'Prototype This!' he pioneered urban pizza delivery with robotic vehicles, including the first autonomous crossing of an active highway bridge in the USA, and airborne delivery of life preservers at sea from an autonomous aircraft. He, for one, welcomes our new robot chauffeurs, and would only mess with them out of tough love.

WARNING: Magnitude 10 Earthquake Is Coming in One Minute

Weiguang Li LTE Security Researcher from 360 Technology

Lin Huang

Yuwei Zheng

Public warning system (PWS) based on mobile communication system is used to alert the public to emergency events such as earthquakes, tsunamis, hurricanes, etc. We carefully study the PWS in LTE network and uncover the vulnerability of PWS in LTE air interface, i.e., the warning messages of the PWS are not encrypted or signed when they are transmitted over the air. Thus, it is possible that malicious PWS warning messages can be transmitted.

We simply use a low cost soft define radio (SDR) device and modify not much code of the LTE open source project srsLTE in order to forge the warning messages. Both Apple and Android test mobile phones are affected by our forged warning messages.

Fake PWS warning messages will cause serious panics among the population, they also could be used to send advertising or spam messages. The public warning system may become paralyzed and useless under the threat of the abuse of fake warning messages.

Weiguang Li is a mobile network security researcher from UnicornTeam of 360 Technology Co. Ltd in China. He mainly focuses on GSM and LTE security, He is also interested in NB-IOT baseband reverse engineering and software-defined radio development. WeChat: ColorLight