codeblue 2017 Nov. 7, 2017 to Nov. 10, 2017, tokyo,japan

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Sovereignty in Cyber Space Patrick O’keeffe Threats in cyber space rise constantly. The rapid expansion of information and communication technology (ICT) ...
Keynote: Make your car self-driving using open-source software George Hotz Come hear about open sourcing your car and why self-driving cars need nothing but engineers ...
For the Greater Good: Leveraging VMware's RPC Interface for fun and profit Brian Gorenc , Jasiel Spelman , Abdul-aziz Hariri Virtual machines play a crucial role in modern computing. They often are used to isolate ...
Industroyer: biggest threat to industrial control systems since Stuxnet Robert Lipovsky , Anton Cherepanov Industroyer is the first ever malware specifically designed to attack power grids. This unique and ...
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel Di Shen In this talk, we are going to disclose two unconventional Use-after-free kernel bugs on Android ...
Man in the NFC Haoqi Shan , Qing Yang NFC (Near Field Communication) technology is widely used in security, bank, payment and personal information ...
Possibility of arbitrary code execution by Step-Oriented Programming Hiroaki Sakai An embedded system has a stub to connect with a host PC and debug a ...
(In)Security of Japanese IT Asset Management Software Muneaki Nishimura In the Spring 2017, news that an IT asset management software vulnerability was exploited by ...
Currently focusing on vulnerability research & web application security. Orange enjoys to find vulnerabilities and participates Bug Bounty Program. He is enthusiasm for Remote Code Execution (RCE), al Orange Tsai A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! We propose ...
Passive Fingerprinting of HTTP/2 Clients. Ory Segal HTTP/2 is the second major version of the HTTP protocol. It changes the way HTTP ...
Androsia: A step ahead in securing in-memory Android application data Samit Anwer Android does not provide explicit APIs to reclaim memory from sensitive objects which are not ...
Key recovery attacks against commercial white-box cryptography implementations Sanghwan Ahn White-box cryptography aims to protect cryptographic primitives and keys in software implementations even when the ...
LG vs. Samsung Smart TV: Which Is Better for Tracking You? Sangmin Lee Recently, various IoT devices such as Smart Appliance, Smart Grid and Smart Car have been ...
PowerShell Inside Out: Applied .NET Hacking for Enhanced Visibility Satoshi Tanda In response to the emerging use of PowerShell by attackers, Microsoft released a feature called ...
Pursue the Attackers – Identify and Investigate Lateral Movement Based on Behavior Pattern – Shusei Tomonaga , Keisuke Muda In many targeted attack cases, once the attacker gains entry into the network, malware infection ...
Trueseeing: Effective Dataflow Analysis over Dalvik Opcodes Takahiro Yoshimura , Ken-ya Yoshimura Trueseeing is an automatic vulnerability scanner for Android apps. It is capable of not only ...
Fun and Practice for exercising your ARM(64) Moony Li , Jack Tang More and more security vulnerability of device drivers on mobile platform have been exposed in ...
AlphaBay Market - Post-Mortem of a Cyber Crime Leader Christy Quinn AlphaBay Market was, by far, the largest and most prolific provider of cybercrime and fraud-related ...
The Whole Picture of APT Attacks Targeting Japan - What We See from STIX-based Analysis - Keishi Kubo , Hiroshi Soeda JPCERT/CC analyzes APT attack campaigns observed in Japan by investigating C&C servers used in the ...
National Security and Public-Private Partnership for Cybersecurity: Strengths and Challenges Stefano Mele The high level of pervasiveness of technologies and the Internet in every field of today’s ...
Take a Jailbreak -Stunning Guards for iOS Jailbreak- Kaoru Otsuka In this talk, I investigate several exploiting ideas for iOS kernel jailbreak using recently exposed ...