November 13-14, 2025

Four Seasons Seoul, Korea

About

POC, established in 2006 and organized by POC Security, is an international hacking and cybersecurity conference held annually in South Korea. It emphasizes advanced technical research and innovative discussions, covering topics such as vulnerability discovery, sophisticated exploit techniques, and emerging cybersecurity insights.

The POC Conference brings together world-leading cybersecurity experts, providing exclusive access to groundbreaking insights and real-world expertise from pioneers driving the future of digital security. Do not miss out this unique opportunity to learn directly from the forefront of innovation

To celebrate its 20th anniversary, what began in 2006 as Korea’s first international hacking conference now evolves and reborn. New identity — same mission, same spirit.

Talks

Full Schedule
card-img
iOS

Trigon: developing a deterministic iOS kernel exploit

card-img
Windows

Follow the Link: Building Full-Chain Local Privilege Escalation on Windows

card-img
Keynote

From Buffer Overflows to Breaking AI: Two Decades of ZDI Vulnerability Research

card-img
macOS

(Sploit)Lights, Camera, Action! Exploiting Spotlight to Bypass TCC and Leak Data from Apple Intelligence

card-img
Linux

Race Condition Symphony: From Tiny Idea to Pwnie

card-img
Browser

Internet explorer isn't forgotten

card-img
Blockchain

Zero Knowledge, Full Coverage: A Fuzzing Paradox

card-img
Windows

Revisiting Windows 11 KTM: Lessons Learnt from New Vulnerabilities

card-img
Android

Security World Vulnerability Discovery Across Diverse Chip Architectures

card-img
Automotive

PerfektBlue: Universal 1-click Exploit to Pwn Automotive Industry - Mercedes-Benz, Volkswagen, Skoda, and others

card-img
Browser

JavaScript Engine Security in 2025: New Bugs, New Defenses

card-img
AI

ATLANTIS: AI-driven Threat Localization, Analysis, and Triage Intelligence System

card-img
Linux

Dirty Ptrace: Exploiting Undocumented Behaviors in Kernel mmap Handlers

card-img
Android
Auth

The Biometric AuthToken Heist: Cracking PINs and Bypassing CE via a Long-Ignored Attack Surface

card-img
Android

A tale of challenging MTE: Rooting Google Pixel with kernel MTE enabled in one shot

card-img
VM

Bug Tamer: Turning Limited Heap Overflow into Full VMware Escape

card-img
AI

Large Language Models-Powered Defense Upgrade: Reshaping the Automated Path for APT Intelligence Operations and Live Drills

card-img
Keynote

From Buffer Overflows to Breaking AI: Two Decades of ZDI Vulnerability Research

Hall A&B
card-img
AI

ATLANTIS: AI-driven Threat Localization, Analysis, and Triage Intelligence System

Hall A&B
card-img
Browser

JavaScript Engine Security in 2025: New Bugs, New Defenses

Hall A&B
card-img
Android

Security World Vulnerability Discovery Across Diverse Chip Architectures

Hall A
card-img
AI

Large Language Models-Powered Defense Upgrade: Reshaping the Automated Path for APT Intelligence Operations and Live Drills

Hall B
card-img
Automotive

PerfektBlue: Universal 1-click Exploit to Pwn Automotive Industry - Mercedes-Benz, Volkswagen, Skoda, and others

Hall A
card-img
Browser

Internet explorer isn't forgotten

Hall B
card-img
Android

A tale of challenging MTE: Rooting Google Pixel with kernel MTE enabled in one shot

Hall A
card-img
macOS

(Sploit)Lights, Camera, Action! Exploiting Spotlight to Bypass TCC and Leak Data from Apple Intelligence

Hall B
  • This lineup is for Day1 only.
  • TBA

    The schedule is not yet available. Please check back later.

    card-img
    Android
    Auth

    The Biometric AuthToken Heist: Cracking PINs and Bypassing CE via a Long-Ignored Attack Surface

    Hall A
    card-img
    Windows

    Revisiting Windows 11 KTM: Lessons Learnt from New Vulnerabilities

    Hall B
    card-img
    Linux

    Race Condition Symphony: From Tiny Idea to Pwnie

    Hall A
    card-img
    VM

    Bug Tamer: Turning Limited Heap Overflow into Full VMware Escape

    Hall B
    card-img
    iOS

    Trigon: developing a deterministic iOS kernel exploit

    Hall A&B
    card-img
    Blockchain

    Zero Knowledge, Full Coverage: A Fuzzing Paradox

    Hall A&B
    card-img
    Linux

    Dirty Ptrace: Exploiting Undocumented Behaviors in Kernel mmap Handlers

    Hall A&B
    card-img
    Windows

    Follow the Link: Building Full-Chain Local Privilege Escalation on Windows

    Hall A&B
  • This lineup is for Day2 only.
  • TBA

    The schedule is not yet available. Please check back later.

    Training

    POC Conference offers hands-on training courses designed to equip participants with the skills to uncover vulnerabilities in influential software. Learn refined techniques and deep insights directly from those who lead the field.

    Vitaly Nikolenko

    Security Researcher

    Meysam Firouzi

    Security Researcher

    Nabih Benazzouz & Daniel Frederic

    FuzzingLabs

    Cedric Halbronn

    Security Researcher

    Registration

    Please refer to the following table for registration fees and payment methods.

    Conference

    SOLD OUT
    nationality earlybird
    09.01 ~ 09.30
    standard
    10.01 ~ 10.31
    on site
    (Cash Only)
    korean ₩800,000 ₩900,000 ₩1,000,000
    foreigner $800 $900 $1,000
    nationality earlybird
    09.01 ~ 09.30
    standard
    10.01 ~ 10.31
    on site
    (Cash Only)
    korean ~60% Off ₩300,000 ₩400,000 ₩500,000
    • 학생 등록은 학부생 대상이며, 파티 참석 권한은 포함되지 않습니다.
    • 대학원생, 재직 중인 학부생은 해당되지 않습니다.
    • 3개월 이내에 발급된 재학 증명서 제출이 필요합니다.

    Training

    SOLD OUT
    title earlybird
    06.05 ~ 07.31
    standard
    08.01 ~ 09.30
    Chrome (Renderer) Exploitation on Android $3800 $4000
    MacOS/iOS Kernel User fuzzing training $3300 $3500
    Reversing Modern Binaries: Practical Rust & Go Analysis $3300 $3500
    Windows Kernel Exploitation: Becoming an Advanced Exploit Developer $3400 $3600
    title earlybird
    06.05 ~ 07.31
    standard
    08.01 ~ 09.30
    Chrome (Renderer) Exploitation on Android ₩5,308,600 ₩5,588,000
    MacOS/iOS Kernel User fuzzing training ₩4,610,100 ₩4,889,500
    Reversing Modern Binaries: Practical Rust & Go Analysis ₩4,610,100 ₩4,889,500
    Windows Kernel Exploitation: Becoming an Advanced Exploit Developer ₩4,749,800 ₩5,029,200
    • 2025년 6월 5일 기준 최초 고시 환율인 1 USD = 1,397 KRW (소수점 이하 절사 적용 기준), 이 반영되었습니다.

    Organizer

    Organizer Logo

    Partner Company

    Partner Company Logo

    Sponsors

    POC Conference is made possible thanks to the support of our sponsors. Their continued partnership has played a vital role in sustaining and growing POC over the years. We sincerely thank them for their contribution.

    Diamond

    Party Sponsor

    Gold

    Supporting Friends

    • 0x41con
    • codeblue
    • kunlun
    • dailysecu
    • ekoparty
    • h2hc
    • hardweario
    • hexacon
    • hitcon
    • nopcon
    • nullcon
    • offensivecon
    • phdays
    • sincon
    • theori
    • xcon
    • zeronights