Avatar of Ma Sheng Hao.
Ma Sheng Hao
Senior Researcher
ProfileResume
Posts
16Connections
印刷
Avatar of the user.

Ma Sheng Hao

Senior Researcher
Sheng-Hao Ma(@aaaddress1) is currently working as a threat researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. He has also served as a speaker and instructor for various international conferences and organizations such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".
TXOne Networks, inc.
National Taiwan University of Science and Technology
Taiwan

Professional Background

  • 現在の状況
    就職中
  • Profession
    Research / R&D
  • Fields
    サイバーセキュリティ
  • 職務経験
    2〜4年 (6〜10年関連の実務経験)
  • Management
    なし
  • Skills
    C++
    C
    Assembly Language
    Node.js
    JavaScript
    c#
    python
    X86 Assembly
    Security
    Exploit
    Cyber Security
  • Languages
    Chinese
    ネイティブまたはバイリンガル
    English
    流暢
  • Highest level of education
    Master

Job search preferences

  • Desired job type
    フルタイム
    リモートワークに興味あり
  • Desired positions
    Security Researcher
  • 希望の勤務地
    Taiwan
  • Freelance
    非フリーランス

Work Experience

Senior Researcher

TXOne Networks, inc.
フルタイム
3月 2021 - 現在
Taipei City, Taiwan
Research the exploits used by the trendy Ransomware family e.g. REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444. Also published a semantic decompiler analysis engine in BlackHat USA and Code Blue in 2022.

Security Researcher

11月 2020 - 現在
Researched and created a new method on memory forensic and investigation in identifying malware signature, as well as methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++

Consultant

2月 2019 - 2月 2020
1 yr 1 mo
Research trendy Windows exploit techniques used by APT organizations, e.g. UAC Bypassing, EoP, Persistence.

Intern

7月 2016 - 7月 2017
1 yr 1 mo
Build up a Python engine based on Nmap used for scanning vulnerable victims on the network.

Malware Researcher

1月 2015 - 1月 2016
1 yr 1 mo
Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Education

Master’s Degree
Computer Science
2018 - 2020
Bachelor of Science (BS)
Computer Science
2014 - 2018