Ju Zhu has 10+ years of experience in Advanced Threat Research. Now he works for Meituan. Currently, he focuses on research about 0Day, nDay and vulnerability. He has been working on using automated systems to hunt advanced threats. He has found the first malware that exploited nDay(CVE-2014-7911) to attack smart TV at Christmas in 2015. In 2016, he also found a lot of malware using 0Day(CVE-2016-4606, CVE-2016-4659, CVE-2016-7651) attack victims in the 3rd Party App Store, and named them "Landmine". In 2017, he has hunted a suspected ransomware remote attack based on profile installation towards to iOS platform distributed in the wild at the first time, and proposed one new remote attack interface on iOS system research. He named them "Death Profile" and shared the topic at BlackHat Asia 2018. In 2018, his “Art of Dancing with Shackles” was selected by BlackHat USA 2018, and he shared "Wow, PESSR has Eroded Apple in Blink" at Code Blue 2018.
https://www.blackhat.com/asia-18/speakers/Ju-Zhu.html
https://www.blackhat.com/us-18/presenters/Ju-Zhu.html
https://codeblue.jp/2018/en/speakers (Ju Zhu)
https://www.blackhat.com/us-21/arsenal/schedule/presenters.html#ju-zhu-36513
http://blog.trendmicro.com/trendlabs-security-intelligence/the-xcodeghost-plague-how-did-it-happen
https://support.apple.com/en-us/HT205732 (CVE-2016-1721)
https://support.apple.com/en-us/HT206902 (CVE-2016-4627, CVE-2016-4628, CVE-2016-4653)
https://support.apple.com/en-us/HT207422 (CVE-2016-7651)
http://blog.trendmicro.com/trendlabs-security-intelligence/helper-haima-malicious-behavior
http://blog.trendmicro.com/trendlabs-security-intelligence/ios-masque-attack-spoof-apps-bypass-privacy-protection (CVE-2016-4606, CVE-2016-4659)
https://mp.weixin.qq.com/s/ZtCjdFZ8N5N38xaEjiO6Pg (TSec, Chinese)
https://www.blackhat.com/asia-18/briefings.html#death-profile
https://mp.weixin.qq.com/s/P-PA6EvMVH3US5KzsOe0_Q (Chinese)
https://support.apple.com/en-us/HT209106 (Acknowledge)
https://codeblue.jp/2018/en/talks (Wow, PESSR has Eroded Apple in Blink)
https://mp.weixin.qq.com/s/skgrUPBZ4X5L3IpL_x4oUQ (KCon,Chinese)