CODEBLUE2020 2020 Oct. 29, 2020 to Oct. 30, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Defending Computer Criminals Andrea Monti This paper is about defending a person accused of computer crime and computer-related crime in ...
Pwning OT: Going in Through the Eyes Ta-lun Yen Two years after the release of our paper regarding SCADA HMI security , SCADA systems ...
[Parongo]Why is this port open and accessible from the outside? ~ About the big gap between Dev and Sec ~ Manabu Kondo We often come across things that are not special for people involved in security operations, ...
Law Enforcement Access to Transborder Data: Global Reach of the Proposed EU e-Evidence Regulation Anna-maria Osula The increasingly sophisticated realm of crime involves challenges related to digital evidence, and employing such ...
Reverse Engineering archeology : Reverse engineering multiple devices with multiple versions , to put together a complex puzzle Shlomi Oberman , Moshe Schön Ripple20 is a series of zero-day vulnerabilities discovered in a widely used low-level TCP/IP software ...
[CyCraft]Tracking BlackTech Activities - Attacks to What You Trust and Blind Your Defense Shih-min , Chan BlackTech is currently one of the more dangerous cyber espionage groups that continues evolves and ...
[NTT DATA INTELLILINK Corporation]How to Raise of telecommuting rate- Approaching a Zero Trust Security model with Z-Scaler - Yuichi Sato Work styles are changing rapidly, and many companies are required to move quickly to a ...
[Onward Security]The present and future of IoT Cybersecurity Daniel Liu N/A
DeClang: Anti-hacking compiler Mengyuan Wan There are various approaches in client protection technology, including packing, obfuscation, anti-decompilation and tamper detection. ...
It is a World Wide Web, but All Politics is Local: Planning to Survive a Balkanizing Internet Mei Nelson Since the birth of the World Wide Web in 1989, despite the fact that the ...
Privacy protection and Data breach incident response regulation in East Asia and Europe Joy Huang In the era of big data and privacy protection, there are many discussions on personal ...
Reflex: you give me a parser, I give you a token generator Every Memory. None
Paolo Montesel None
[PwC]Why PwC, a consulting firm, held the ICS CTF at CODE BLUE? Junichi Murakami PwC held the ICS Cyber Hacking Challenge at CODEBLUE 2019.This initiative was driven by the ...
Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing Jan Ruge Uncovering bugs in embedded closed-source firmware is challenging.Already simple tasks like attaching a debugger to ...
Life After Privacy Shield – Will Data Transfer Laws Stop the World Doing Business? Johnathan Armstrong This presentation will look at the history of the Schrems litigation and the recent ECJ ...
[Panel Discussion]CODE BLUE! Review Board Assemble! Yuji Ukai , Yosuke Hasegawa , Yoshinori Takesako Are you having fun of this year CODE BLUE? Every year we got many thanksful ...
Dissecting China’s Information Operations with Threat Intelligence Che Yeh In this talk, we will focus on Information Operations (InfoOps) on social media platforms. InfoOps ...
Is Dis-information more attractive than True-information? : Reduce the spread of Dis-information in social media Haruka Suzuki In this session, we will propose effective measures from the nature of disinformation and the ...
[NEC Corporation]Zero Trust Architecture 101 Takahiro Kakumaru There are few people who have never heard of the term "zero trust". On the ...
[Hitachi Systems,Ltd.]Hitachi Global Cyber Cafeteria "Western set meal" Mei Nelson Hitachi Systems presents the Global Cyber Cafeteria series.In our Western Meal Set episode, we invite ...
Effective Security Monitoring by SOAR and SecOps Masayoshi Mizutani In security monitoring, sensors collecting suspicious events and SIEM (Security Information & Event Manager) detecting ...
Drones' Cryptanalysis - Detecting Spying Drones Ben Nassi In an "open skies" era in which drones fly among us, a new question arises: ...
Who stole My 100,000 Dollars’ Worth Bitcoin Wallets - Catch Them All With New Deceptive Bait Tan Kean Siong Millions of malicious Internet-wide scanning are happening on a daily basis, looking for exposed sensitive ...
Hunting kernel exploits with filesystem fuzzer Donghee Kim , Seungpyo Hong , Wonyoung Jung , Heoungjin Jo We found 16 unique vulnerabilities in three filesystems using a filesystem fuzzer called JANUS(which developed ...
[MS&AD InterRisk Research & Consulting,Inc.]Elevating Cybersecurity Within The Enterprise ~Using Security Ratings to enhance business, reduce risk, and achieve operational efficiency.~ Mathew Cherian , Soichiro Saito , Takeshi Doi "Security scoring" is a service that conducts security assessments via the Internet and provides a ...
[TeamT5]Cyber Cold War and Tensions – The Critical Infrastructures Are Under Attack. Sung-ting Tsai Recently we have observed actors started to target critical infrastructures, such as energy, transportation, and ...
Ethereum 2.0 Security Naoya Okanami Ethereum 2.0 is a major upgrade to improve the performance of Ethereum. It will increase ...
Cleaning up the mess: discovery, monitoring, analysis, and notification of infected/insecure IoT devices Katsunari Yoshioka Tons of insecure IoT devices are out there and ready to be compromised to join ...
Alliance power for Cyber Security Kenneth Geers There is only one Internet, and it is fragile. In this new global domain, nation-states ...
Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM Sai Cheng , Yongqing He , Zhimin Wang There may be some logic bugs in the COM and RPC servers built in Windows ...
[pwn.colledge]pwn.college: The Cybersecurity Dojo for Binary Analysis Yan "zardus" Shoshitaishvili Imagine that you are just starting out in cybersecurity. You know C, you might even ...
Cryfind : A Static Tool to Identify Cryptographic Algorithm in Binary Wei Chieh Chao We present an automatic static tool CryFind to identify cryptographic algorithms in a binary executable. ...
[Panel Discussion]Why organize a CTF -This is the way- Ryo Ichikawa , Yuki Koike , Takashi Yoneuchi CTF seems to have become firmly established as a place for technical study of security, ...
[null - The Open Security Community]Building Local Communities for Learning Infosec Together! Sandeep Singh null - the Open security community is one of the most active and vibrant security ...
Apk-medit: memory search and patch tool for APK without root & android NDK Taichi Kotake Apk-medit is a memory search and patch tool for debuggable APK without root & android ...
Operation Chimera - APT Operation Targets Semiconductor Vendors Inndy Lin , Shang-de Jiang , Chung Kuan Chen This presentation provides an analysis of the advanced persistent threat (APT) attacks that have occurred ...
LogonTracer v1.5 + Elasticsearch = Real-time AD Log Analysis System Shusei Kino LogonTracer is a tool to investigate malicious logons by visualizing and analyzing Windows Active Directory ...
Operation I am Tom: How APT actors move laterally in corporate networks Aragorn Li TeamT5 has helped many cyber-attack victims defending against APT actors for years. We see enormous ...
Kr00k: Serious vulnerability affected encryption of billion+ Wi-Fi devices Robert Lipovsky We identified Kr00k (CVE-2019-15126) – a previously unknown vulnerability in chips used by a significant ...
Don't Be Silly - It's Only a Lightbulb Eyal Itkin A few years ago, a team of academic researchers showed how they can take over ...
Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations Ben Nassi Recent studies have suggested various side-channel attacks for eavesdropping sound by analyzing the side effects ...
We aim to enable SOC operators to reduce tasks related to explanations for alerts. Tsuyoshi Taniguchi We have developed a method for identifying attack types with explainable diagnosis by taking advantage ...
[Allsafe]Introduction of enlightenment activities for reverse engineering technology Shota Hara Allsafe is engaged in various community activities by members whose livelihood is reverse engineering. Since ...