FileMood

Download CODE BLUE

CODE BLUE

Name

CODE BLUE

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

9.5 GB

Total Files

188

Hash

01A9CBAC43016E39F64FB60688560E5C8C0CE716

/CODE BLUE 2013/

CodeBlue01 A Security Barrier Device Regardless of OS or Applications by Kenji Toda.mp4

93.7 MB

CodeBlue01 Fight Against Citadel in Japan by You Nakatsuru.mp4

94.1 MB

CodeBlue01 HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.mp4

43.8 MB

CodeBlue01 Intel Management Engine Secrets by Igor Skochinsky.mp4

75.1 MB

CodeBlue01 Keynote - CODE BLUE in the ICU by Jeff Moss.mp4

104.1 MB

CodeBlue01 Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.mp4

121.3 MB

CodeBlue01 Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.mp4

104.5 MB

CodeBlue01 Preventing hard disk firmware manipulation attack and disaster recovery.mp4

65.2 MB

CodeBlue01 SCADA Software or Swiss Cheese Software by Celil UNUVER.mp4

49.6 MB

CodeBlue01 The Current State of Automotive Security by Chris Valasek.mp4

97.8 MB

CodeBlue01 libinjection from SQLi to XSS by Nick Galbreath.mp4

43.9 MB

CodeBlue01 o-checker - Malicious document file detection tool by Yuuhei Ootsubo.mp4

103.2 MB

CodeBlue01 various tricks for remote linux exploits by Seokha Lee (wh1ant).mp4

80.7 MB

/CODE BLUE 2014 (2014 12 18-19)/

CODE BLUE 2014 Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun.mp4

90.8 MB

CODE BLUE 2014 David Jacoby - How I Hacked My Home.mp4

63.1 MB

CODE BLUE 2014 David Seidman - Microsoft Vulnerability Research How to be a Finder as a Vendor.mp4

57.5 MB

CODE BLUE 2014 Dongcheol Hong - Drone attack by malware and network hacking.mp4

96.3 MB

CODE BLUE 2014 Hiroshi Shinotsuka - how to avoid the Detection by Malware.mp4

35.2 MB

CODE BLUE 2014 Ilfak Guilfanov - Keynote The story of IDA Pro.mp4

55.2 MB

CODE BLUE 2014 Keren Elazari - Keynote The 5 biggest problems of cyber security.mp4

106.3 MB

CODE BLUE 2014 Kuniyasu Suzaki - DeviceDisEnabler.mp4

69.8 MB

CODE BLUE 2014 Takahiro Matsuki & Dennis Kengo Oka.mp4

98.7 MB

CODE BLUE 2014 The active use and exploitation of Microsoft s Application Compatibility Framework.mp4

72.9 MB

/CODE BLUE 2015 (2015 10 28-29)/

(In)Security of Medical Devices by Florian Grunow - CODE BLUE 2015.mp4

93.2 MB

(In)Security of Medical Devices by Florian Grunow - CODE BLUE 2015.srt

76.1 KB

A new exploitation method to bypass stack canaries by Yuki Koike - CODE BLUE 2015.mp4

39.0 MB

Abusing Adobe Readers JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc - CODE BLUE 2015.mp4

58.3 MB

Abusing Adobe Readers JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc - CODE BLUE 2015.srt

42.1 KB

An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015.mp4

102.5 MB

An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015.srt

55.8 KB

Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik - CODE BLUE 2015.mp4

80.8 MB

Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik - CODE BLUE 2015.srt

39.9 KB

Defeating Firefox by Muneaki Nishimura - CODE BLUE 2015.mp4

59.8 MB

Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio - CODE BLUE 2015.mp4

79.9 MB

Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio - CODE BLUE 2015.srt

51.6 KB

How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim - CODE BLUE 2015.mp4

84.1 MB

How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim - CODE BLUE 2015.srt

36.2 KB

Is there an EFI monster inside your apple by Pedro Vilaca - CODE BLUE 2015.mp4

102.8 MB

Is there an EFI monster inside your apple by Pedro Vilccca - CODE BLUE 2015.srt

87.9 KB

Keynote The Singularity is Near by Takuya Matsuda - CODE BLUE 2015.mp4

68.4 MB

Making and Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio - CODE BLUE 2015.mp4

80.7 MB

Making and Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio - CODE BLUE 2015.srt

78.0 KB

New immune system of information security from CHINA by Xiaodun Fang - CODE BLUE 2015.mp4

80.9 MB

Ninja Correlation of APT Binaries by Bhavna Soman - CODE BLUE 2015.mp4

47.8 MB

Ninja Correlation of APT Binaries by Bhavna Soman - CODE BLUE 2015.srt

40.3 KB

PANDEMONIUM Automated Identification of Cryptographic Algorithms by Yuma Kurogome - CODE BLUE 2015.mp4

36.8 MB

Practical network defense at scale by Travis Carelock - CODE BLUE 2015.mp4

103.3 MB

Practical network defense at scale by Travis Carelock - CODE BLUE 2015.srt

74.4 KB

Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura - CODE BLUE 2015.mp4

82.6 MB

The Only Way to Tell the Truth is in Fiction by Richard Thieme - CODE BLUE 2015.mp4

93.2 MB

Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015.mp4

87.6 MB

[audio] Backdoor master key for MS Office by Shigeo Mitsunari and Yoshinori Takesako - CODE BLUE 2015.mp4

44.7 MB

[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri - CODE BLUE 2015.mp4

23.0 MB

[audio]Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa - CODE BLUE 2015.mp4

26.3 MB

/CODE BLUE 2016 (10 18-21 2016)/

[CB16] (P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.mp4

56.1 MB

[CB16] ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.mp4

57.7 MB

[CB16] About CGC the world’s first all-machine hacking tournament by Tyler Nighswander.mp4

67.0 MB

[CB16] Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici..mp4

136.7 MB

[CB16] Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.mp4

52.5 MB

[CB16] Around the Web in 80 Hours Scalable Fingerprinting with Chromium Automationby Isaac Dawson.mp4

60.9 MB

[CB16] Background Story of Operation neutralizing banking malware by Kazuki Takada.mp4

53.5 MB

[CB16] Be a Binary Rockstar by Sophia DAntoine.mp4

193.8 MB

[CB16] COFI break by Ron Shina & Shlomi Oberman.mp4

67.1 MB

[CB16] DVB-T Hacking by Amihai Neiderman.mp4

33.3 MB

[CB16] DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.mp4

139.2 MB

[CB16] EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.mp4

96.3 MB

[CB16] Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.mp4

52.2 MB

[CB16] Esoteric Web Application Vulnerabilities by Andres Riancho.mp4

75.1 MB

[CB16] Facebook Malware Tag Me If You Can by Ido Naor & Dani Goland.mp4

347.3 MB

[CB16] House of Einherjar — Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.mp4

226.1 MB

[CB16] Keynote Digital Society e-Estonia by Anna Piperal.mp4

105.3 MB

[CB16] Keynote How much security is too much by Karsten Nohl.mp4

97.5 MB

[CB16] Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.mp4

114.9 MB

[CB16] Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.mp4

68.0 MB

[CB16] Who put the backdoor in my modem by Ewerson Guimaraes.mp4

93.2 MB

[CB16] WireGuard Next Generation Abuse-Resistant Kernel Network Tunnelby Jason Donenfeld.mp4

64.7 MB

/CODE BLUE 2017 (11 8-10, 2017)/

[CB17 ](In)Security of Japanese IT Asset Management Software.mp4

53.9 MB

[CB17] A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!.mp4

43.4 MB

[CB17] Androsia A step ahead in securing in-memory Android application data.mp4

49.8 MB

[CB17] Detection index learning based on cyber threat intelligence and its application.mp4

37.5 MB

[CB17] For the Greater Good Leveraging VMware's RPC Interface for fun and profit.mp4

63.1 MB

[CB17] Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.mp4

1.9 MB

[CB17] George Hotz - Keynote Make your car self-driving using open-source software.mp4

71.6 MB

[CB17] Industroyer biggest threat to industrial control systems since Stuxnet.mp4

31.4 MB

[CB17] LG vs. Samsung Smart TV Which Is Better for Tracking You by Sangmin Lee.mp4

74.4 MB

[CB17] Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.mp4

65.6 MB

[CB17] National Security and Public-Private Partnership for Cybersecurity Strengths and Challenges.mp4

81.7 MB

[CB17] Ory Segal - Passive Fingerprinting of HTTP 2 Clients..mp4

70.6 MB

[CB17] Possibility of arbitrary code execution by Step-Oriented Programming.mp4

44.9 MB

[CB17] PowerShell Inside Out Applied .NET Hacking for Enhanced Visibility.mp4

63.3 MB

[CB17] Pursue the Attackers – Identify and Investigate Lateral Movement Based on Behavior Pattern –.mp4

46.1 MB

[CB17] Take a Jailbreak -Stunning Guards for iOS Jailbreak-.mp4

54.4 MB

[CB17] The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel - YouTube.mp4

41.5 MB

[CB17] 吉村 孝広, 吉村 賢哉 - Trueseeing Effective Dataflow Analysis over Dalvik Opcodes.mp4

70.2 MB

[CB17][確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.mp4

45.1 MB

/CODE BLUE 2018/

[CB18] A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek & Nicolas Joly.en(transcribed).srt

77.5 KB

[CB18] A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek & Nicolas Joly.mp4

92.4 MB

[CB18] Are You Trading Stocks Securely by Alejandro Hernandez.en(transcribed).srt

60.2 KB

[CB18] Are You Trading Stocks Securely by Alejandro Hernandez.mp4

68.0 MB

[CB18] CoinMiner are Evasive by Thomas Roccia and Omri Moyal.en(transcribed).srt

59.3 KB

[CB18] CoinMiner are Evasive by Thomas Roccia and Omri Moyal.mp4

41.8 MB

[CB18] Crashing to root How to escape the iOS sandbox using abort() by Brandon Azad.en(transcribed).srt

93.0 KB

[CB18] Crashing to root How to escape the iOS sandbox using abort() by Brandon Azad.mp4

58.8 MB

[CB18] Crypto Gold Mine Is Your Environment Safe by Austin McBride.en(transcribed).srt

60.0 KB

[CB18] Crypto Gold Mine Is Your Environment Safe by Austin McBride.mp4

39.2 MB

[CB18] Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.mp4

67.0 MB

[CB18] Dissect Android Bluetooth for Fun & Profit by Jianjun Dai, Guang Gong.en(transcribed).srt

40.1 KB

[CB18] Dissect Android Bluetooth for Fun & Profit by Jianjun Dai, Guang Gong.mp4

50.1 MB

[CB18] From Seoul to Tokyo Threats for Japan and South Korea by Minseok Cha, Jaejun Heo.en(transcribed).srt

48.9 KB

[CB18] From Seoul to Tokyo Threats for Japan and South Korea by Minseok Cha, Jaejun Heo.mp4

37.5 MB

[CB18] Fuzz your smartphone from 4G base station side by Tsojen Liu.en(transcribed).srt

47.7 KB

[CB18] Fuzz your smartphone from 4G base station side by Tsojen Liu.mp4

53.9 MB

[CB18] GLitch hammering your phone through WebGL by Pietro Frigo.en(transcribed).srt

68.3 KB

[CB18] GLitch hammering your phone through WebGL by Pietro Frigo.mp4

58.4 MB

[CB18] How to hack SD-WAN and keep your sanity by Sergey Goreychik.mp4

71.0 MB

[CB18] INTERNATIONAL COLLABORATION A TOOL FOR COMBATING BEC by Alex Ogbole.en(transcribed).srt

47.8 KB

[CB18] INTERNATIONAL COLLABORATION A TOOL FOR COMBATING BEC by Alex Ogbole.mp4

32.0 MB

[CB18] Keynote Cyber Arms Race by Mikko Hyppönen.en(transcribed).srt

77.3 KB

[CB18] Keynote Cyber Arms Race by Mikko Hyppönen.mp4

91.7 MB

[CB18] Keynote Power, Patience, and Persistence by Kenneth Geers.en(transcribed).srt

55.9 KB

[CB18] Keynote Power, Patience, and Persistence by Kenneth Geers.mp4

62.4 MB

[CB18] LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.mp4

62.4 MB

[CB18] Methodology for controlling connected cars remotely by Minrui Yan, Jiahao Li.en(transcribed).srt

51.2 KB

[CB18] Methodology for controlling connected cars remotely by Minrui Yan, Jiahao Li.mp4

53.5 MB

[CB18] Policy Options for Cyber Middle Powers against Strategic Cyber Attacks by Philipp S. Kruger.en(transcribed).srt

53.7 KB

[CB18] Policy Options for Cyber Middle Powers against Strategic Cyber Attacks by Philipp S. Kruger.mp4

56.8 MB

[CB18] Practical method and practice of OSINT for cyber defense by Ataru Ishii.mp4

63.7 MB

[CB18] Privacy by Design Methodology by Vanessa Henri.en(transcribed).srt

58.2 KB

[CB18] Privacy by Design Methodology by Vanessa Henri.mp4

36.4 MB

[CB18] RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.mp4

23.9 MB

[CB18] Reading the norms of cyberspace - by Koichiro Sparky Komiyama.mp4

37.7 MB

[CB18] Remotely Cracking Smart Gun Safes by Austin Fletcher, Daniel Su.en(transcribed).srt

64.2 KB

[CB18] Remotely Cracking Smart Gun Safes by Austin Fletcher, Daniel Su.mp4

58.7 MB

[CB18] Smart Contract Honeypots for Profit (and probably Fun) by Ben Schmidt.en(transcribed).srt

51.9 KB

[CB18] Smart Contract Honeypots for Profit (and probably Fun) by Ben Schmidt.mp4

38.1 MB

[CB18] Smart Fuzzing XPC & XNU by Juwei Lin, Lilang Wu, Moony Li.en(transcribed).srt

46.9 KB

[CB18] Smart Fuzzing XPC & XNU by Juwei Lin, Lilang Wu, Moony Li.mp4

57.0 MB

[CB18] The Decalogue(ish) of Contractual Security Sins by Sebastian Avarvarei.en(transcribed).srt

79.9 KB

[CB18] The Decalogue(ish) of Contractual Security Sins by Sebastian Avarvarei.mp4

92.9 MB

[CB18] The Mystery of WannaCry Mutants - by Makoto Iwamura.mp4

65.1 MB

[CB18] The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.mp4

39.0 MB

[CB18] WHAT THE FAX! by Yaniv Balmas, Eyal Itkin.en(transcribed).srt

69.7 KB

[CB18] WHAT THE FAX! by Yaniv Balmas, Eyal Itkin.mp4

66.9 MB

[CB18] Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.en(transcribed).srt

50.8 KB

[CB18] Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.mp4

54.8 MB

[CB18] Who's guarding the gateway by Nicole Beckwith.en(transcribed).srt

39.1 KB

[CB18] Who's guarding the gateway by Nicole Beckwith.mp4

29.1 MB

[CB18] Wow, PESSR has Eroded Apple in Blink by Ju Zhu, Moony Li, Lilang Wu.en(transcribed).srt

39.1 KB

[CB18] Wow, PESSR has Eroded Apple in Blink by Ju Zhu, Moony Li, Lilang Wu.mp4

48.1 MB

[CB18]Nuclear Weapons and Cyber Risks by Julia Franziska Berghofer.en(transcribed).srt

61.0 KB

[CB18]Nuclear Weapons and Cyber Risks by Julia Franziska Berghofer.mp4

42.4 MB

[CB19][BB] CIRCO Cisco Implant Raspberry Controlled Operations by Emilio Couto.en(transcribed).srt

56.0 KB

[CB19][BB] CIRCO Cisco Implant Raspberry Controlled Operations by Emilio Couto.mp4

107.9 MB

/CODE BLUE 2019/

[CB19] Applicability of GDPR and APPI to international companies and the impact on IT Security.en(transcribed).srt

59.0 KB

[CB19] Applicability of GDPR and APPI to international companies and the impact on IT Security.mp4

50.8 MB

[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di Shen.en(transcribed).srt

44.5 KB

[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di Shen.mp4

41.8 MB

[CB19] Coinbase and the Firefox 0-day by Philip Martin.en(transcribed).srt

55.4 KB

[CB19] Coinbase and the Firefox 0-day by Philip Martin.mp4

47.1 MB

[CB19] Hardware Wallet Security by Sergei Volokitin.en(transcribed).srt

62.5 KB

[CB19] Hardware Wallet Security by Sergei Volokitin.mp4

47.3 MB

[CB19] Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.en(transcribed).srt

80.5 KB

[CB19] Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.mp4

72.9 MB

[CB19] KeynoteCyberspace - A Lawless Wild West or Orderly Chaos by Liis Vihul.en(transcribed).srt

54.6 KB

[CB19] KeynoteCyberspace - A Lawless Wild West or Orderly Chaos by Liis Vihul.mp4

54.3 MB

[CB19] KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.en(transcribed).srt

85.1 KB

[CB19] KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.mp4

76.7 MB

[CB19] Let's Make Windows Defender Angry Antivirus can be an oracle! by Ryo Ichikawa.en(transcribed).srt

35.8 KB

[CB19] Let's Make Windows Defender Angry Antivirus can be an oracle! by Ryo Ichikawa.mp4

50.5 MB

[CB19] Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper.en(transcribed).srt

43.9 KB

[CB19] Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper.mp4

36.2 MB

[CB19] Recent APT attack on crypto exchange employees by Heungsoo Kang.en(transcribed).srt

49.9 KB

[CB19] Recent APT attack on crypto exchange employees by Heungsoo Kang.mp4

46.7 MB

[CB19] Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.mp4

66.2 MB

[CB19] Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarsieri.en(transcribed).srt

59.4 KB

[CB19] Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarsieri.mp4

58.6 MB

[CB19] [BB] FileInsight-plugins Decoding toolbox for malware analysis by Nobutaka Mantani.en(transcribed).srt

24.4 KB

[CB19] [BB] FileInsight-plugins Decoding toolbox for malware analysis by Nobutaka Mantani.mp4

26.6 MB

[CB19] [BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.mp4

33.7 MB

[CB19][BB] Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.mp4

28.4 MB

[CB19][BB] MalCfgParser A Lightweight Malware Configuration Parsing Tool.en(transcribed).srt

17.4 KB

[CB19][BB] MalCfgParser A Lightweight Malware Configuration Parsing Tool.mp4

16.0 MB

[CB19][BB] Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.mp4

84.5 MB

[CB19][BB] Wifi sniffing with the WifiKraken by Mike Spicer.en(transcribed).srt

67.7 KB

[CB19][BB] Wifi sniffing with the WifiKraken by Mike Spicer.mp4

67.7 MB

[CB19][BB] tknk_scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.mp4

196.5 MB

/

CODE BLUE thank you.txt

1.1 KB

Code Blue logo.jpg

5.6 KB

 

Total files 188


Copyright © 2025 FileMood.com