About
POC, established in 2006 and organized by POC Security, is an international hacking and cybersecurity conference held annually in South Korea. It emphasizes advanced technical research and innovative discussions, covering topics such as vulnerability discovery, sophisticated exploit techniques, and emerging cybersecurity insights.
The POC Conference brings together world-leading cybersecurity experts, providing exclusive access to groundbreaking insights and real-world expertise from pioneers driving the future of digital security. Do not miss out this unique opportunity to learn directly from the forefront of innovation
2006 - 2024
2025 -
To celebrate its 20th anniversary, what began in 2006 as Korea’s first international hacking conference now evolves and reborn. New identity — same mission, same spirit.
Talks

Trigon: developing a deterministic iOS kernel exploit

Follow the Link: Building Full-Chain Local Privilege Escalation on Windows

From Buffer Overflows to Breaking AI: Two Decades of ZDI Vulnerability Research

(Sploit)Lights, Camera, Action! Exploiting Spotlight to Bypass TCC and Leak Data from Apple Intelligence

Race Condition Symphony: From Tiny Idea to Pwnie

Internet explorer isn't forgotten

Zero Knowledge, Full Coverage: A Fuzzing Paradox

Revisiting Windows 11 KTM: Lessons Learnt from New Vulnerabilities

Security World Vulnerability Discovery Across Diverse Chip Architectures

PerfektBlue: Universal 1-click Exploit to Pwn Automotive Industry - Mercedes-Benz, Volkswagen, Skoda, and others

JavaScript Engine Security in 2025: New Bugs, New Defenses

ATLANTIS: AI-driven Threat Localization, Analysis, and Triage Intelligence System

Dirty Ptrace: Exploiting Undocumented Behaviors in Kernel mmap Handlers

The Biometric AuthToken Heist: Cracking PINs and Bypassing CE via a Long-Ignored Attack Surface

A tale of challenging MTE: Rooting Google Pixel with kernel MTE enabled in one shot

Bug Tamer: Turning Limited Heap Overflow into Full VMware Escape

Large Language Models-Powered Defense Upgrade: Reshaping the Automated Path for APT Intelligence Operations and Live Drills

From Buffer Overflows to Breaking AI: Two Decades of ZDI Vulnerability Research

ATLANTIS: AI-driven Threat Localization, Analysis, and Triage Intelligence System

JavaScript Engine Security in 2025: New Bugs, New Defenses

Security World Vulnerability Discovery Across Diverse Chip Architectures

Large Language Models-Powered Defense Upgrade: Reshaping the Automated Path for APT Intelligence Operations and Live Drills

PerfektBlue: Universal 1-click Exploit to Pwn Automotive Industry - Mercedes-Benz, Volkswagen, Skoda, and others

Internet explorer isn't forgotten

A tale of challenging MTE: Rooting Google Pixel with kernel MTE enabled in one shot

(Sploit)Lights, Camera, Action! Exploiting Spotlight to Bypass TCC and Leak Data from Apple Intelligence
TBA
The schedule is not yet available. Please check back later.

The Biometric AuthToken Heist: Cracking PINs and Bypassing CE via a Long-Ignored Attack Surface

Revisiting Windows 11 KTM: Lessons Learnt from New Vulnerabilities

Race Condition Symphony: From Tiny Idea to Pwnie

Bug Tamer: Turning Limited Heap Overflow into Full VMware Escape

Trigon: developing a deterministic iOS kernel exploit

Zero Knowledge, Full Coverage: A Fuzzing Paradox

Dirty Ptrace: Exploiting Undocumented Behaviors in Kernel mmap Handlers

Follow the Link: Building Full-Chain Local Privilege Escalation on Windows
TBA
The schedule is not yet available. Please check back later.
Training
POC Conference offers hands-on training courses designed to equip participants with the skills to uncover vulnerabilities in influential software. Learn refined techniques and deep insights directly from those who lead the field.
Chrome (Renderer) Exploitation on Android
11.10 ~ 11.12
Vitaly Nikolenko
Security Researcher
MacOS/iOS Kernel User fuzzing training
11.10 ~ 11.12
Meysam Firouzi
Security Researcher
Reversing Modern Binaries: Practical Rust & Go Analysis
11.10 ~ 11.12
Nabih Benazzouz & Daniel Frederic
FuzzingLabs
Cedric Halbronn
Security Researcher
Registration
Please refer to the following table for registration fees and payment methods.
Conference
| nationality |
earlybird 09.01 ~ 09.30 |
standard 10.01 ~ 10.31 |
on site (Cash Only) |
|---|---|---|---|
| korean | ₩800,000 | ₩900,000 | ₩1,000,000 |
| foreigner | $800 | $900 | $1,000 |
| nationality |
earlybird 09.01 ~ 09.30 |
standard 10.01 ~ 10.31 |
on site (Cash Only) |
|---|---|---|---|
| korean ~60% Off | ₩300,000 | ₩400,000 | ₩500,000 |
|
|||
Training
| title |
earlybird 06.05 ~ 07.31 |
standard 08.01 ~ 09.30 |
|---|---|---|
| Chrome (Renderer) Exploitation on Android | $3800 | $4000 |
| MacOS/iOS Kernel User fuzzing training | $3300 | $3500 |
| Reversing Modern Binaries: Practical Rust & Go Analysis | $3300 | $3500 |
| Windows Kernel Exploitation: Becoming an Advanced Exploit Developer | $3400 | $3600 |
| title |
earlybird 06.05 ~ 07.31 |
standard 08.01 ~ 09.30 |
|---|---|---|
| Chrome (Renderer) Exploitation on Android | ₩5,308,600 | ₩5,588,000 |
| MacOS/iOS Kernel User fuzzing training | ₩4,610,100 | ₩4,889,500 |
| Reversing Modern Binaries: Practical Rust & Go Analysis | ₩4,610,100 | ₩4,889,500 |
| Windows Kernel Exploitation: Becoming an Advanced Exploit Developer | ₩4,749,800 | ₩5,029,200 |
|
||
Sponsors
POC Conference is made possible thanks to the support of our sponsors. Their continued partnership has played a vital role in sustaining and growing POC over the years. We sincerely thank them for their contribution.













