/
|
Code Blue logo.jpg
|
5.6 KB
|
CODE BLUE thank you.txt
|
1.1 KB
|
/CODE BLUE 2013/
|
A Security Barrier Device Regardless of OS or Applications by Kenji Toda.mp4
|
98.3 MB
|
Fight Against Citadel in Japan by You Nakatsuru.mp4
|
98.3 MB
|
HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.mp4
|
45.7 MB
|
Intel Management Engine Secrets by Igor Skochinsky.mp4
|
99.3 MB
|
Keynote - CODE BLUE in the ICU by Jeff Moss.mp4
|
91.0 MB
|
Keynote - CODE BLUE in the ICU by Jeff Moss.srt
|
64.8 KB
|
Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.mp4
|
128.7 MB
|
libinjection - from SQLi to XSS by Nick Galbreath.mp4
|
37.9 MB
|
libinjection - from SQLi to XSS by Nick Galbreath.srt
|
22.6 KB
|
Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.mp4
|
110.1 MB
|
o-checker - Malicious document file detection tool by Yuuhei Ootsubo.mp4
|
107.2 MB
|
Preventing hard disk firmware manipulation attack and disaster recovery.mp4
|
77.4 MB
|
SCADA Software or Swiss Cheese Software by Celil UNUVER.mp4
|
64.6 MB
|
The Current State of Automotive Security by Chris Valasek.mp4
|
103.2 MB
|
various tricks for remote linux exploits by Seokha Lee (wh1ant).mp4
|
84.3 MB
|
/CODE BLUE 2014/
|
Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun.mp4
|
120.4 MB
|
Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun.srt
|
79.2 KB
|
David Jacoby - How I Hacked My Home.mp4
|
80.7 MB
|
David Jacoby - How I Hacked My Home.srt
|
62.0 KB
|
David Seidman - Microsoft Vulnerability Research - How to be a Finder as a Vendor.mp4
|
75.4 MB
|
David Seidman - Microsoft Vulnerability Research - How to be a Finder as a Vendor.srt
|
64.2 KB
|
Dongcheol Hong - Drone attack by malware and network hacking.mp4
|
100.3 MB
|
Dongcheol Hong - Drone attack by malware and network hacking.srt
|
45.9 KB
|
Hiroshi Shinotsuka - how to avoid the Detection by Malware.mp4
|
45.0 MB
|
Ilfak Guilfanov - Keynote - The story of IDA Pro.mp4
|
89.2 MB
|
Keren Elazari - Keynote - The 5 biggest problems of cyber security.mp4
|
112.1 MB
|
Keren Elazari - Keynote - The 5 biggest problems of cyber security.srt
|
77.8 KB
|
Kuniyasu Suzaki - DeviceDisEnabler.mp4
|
90.9 MB
|
Takahiro Matsuki & Dennis Kengo Oka.mp4
|
104.2 MB
|
The active use and exploitation of Microsoft s Application Compatibility Framework.mp4
|
93.3 MB
|
The active use and exploitation of Microsoft s Application Compatibility Framework.srt
|
66.3 KB
|
/CODE BLUE 2015/
|
(In)Security of Medical Devices by Florian Grunow.mp4
|
107.2 MB
|
(In)Security of Medical Devices by Florian Grunow.srt
|
76.1 KB
|
[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.mp4
|
32.5 MB
|
[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.mp4
|
57.7 MB
|
[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.mp4
|
28.7 MB
|
A new exploitation method to bypass stack canaries by Yuki Koike.mp4
|
46.4 MB
|
Abusing Adobe Reader's JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.srt
|
42.1 KB
|
Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.mp4
|
71.6 MB
|
An Abusive Relationship with AngularJS by Mario Heiderich.mp4
|
140.3 MB
|
An Abusive Relationship with AngularJS by Mario Heiderich.srt
|
55.8 KB
|
Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik.mp4
|
111.5 MB
|
Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik.srt
|
39.9 KB
|
Defeating Firefox by Muneaki Nishimura.mp4
|
78.0 MB
|
Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio.mp4
|
103.0 MB
|
Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio.srt
|
51.6 KB
|
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim.mp4
|
120.4 MB
|
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim.srt
|
36.2 KB
|
Is there an EFI monster inside your apple by Pedro Vilaca.mp4
|
127.5 MB
|
Is there an EFI monster inside your apple by Pedro Vilccca.srt
|
87.9 KB
|
Keynote The Singularity is Near by Takuya Matsuda.mp4
|
89.1 MB
|
Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.mp4
|
102.7 MB
|
Making and Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.srt
|
78.0 KB
|
New immune system of information security from CHINA by Xiaodun Fang.mp4
|
97.0 MB
|
Ninja Correlation of APT Binaries by Bhavna Soman.mp4
|
65.9 MB
|
Ninja Correlation of APT Binaries by Bhavna Soman.srt
|
40.3 KB
|
PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.mp4
|
48.6 MB
|
Practical network defense at scale by Travis Carelock.mp4
|
140.4 MB
|
Practical network defense at scale by Travis Carelock.srt
|
74.4 KB
|
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.mp4
|
114.6 MB
|
The Only Way to Tell the Truth is in Fiction by Richard Thieme.mp4
|
152.3 MB
|
Wireless security testing with attack by Keiichi Horiai.mp4
|
119.5 MB
|
/CODE BLUE 2016/
|
(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.mp4
|
76.7 MB
|
About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.mp4
|
68.4 MB
|
Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.mp4
|
119.2 MB
|
Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.mp4
|
65.7 MB
|
Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.mp4
|
72.9 MB
|
ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.mp4
|
70.9 MB
|
Background Story of - Operation neutralizing banking malware - by Kazuki Takada.mp4
|
68.3 MB
|
Be a Binary Rockstar by Sophia DAntoine.mp4
|
44.2 MB
|
COFI break by Ron Shina & Shlomi Oberman.mp4
|
66.3 MB
|
DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.mp4
|
52.2 MB
|
DVB-T Hacking by Amihai Neiderman.mp4
|
42.6 MB
|
Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.mp4
|
80.1 MB
|
Esoteric Web Application Vulnerabilities by Andres Riancho.mp4
|
103.1 MB
|
EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.mp4
|
104.8 MB
|
Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.mp4
|
87.7 MB
|
House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.mp4
|
54.0 MB
|
Keynote - Digital Society - e-Estonia - by Anna Piperal.mp4
|
106.5 MB
|
Keynote - How much security is too much by Karsten Nohl.mp4
|
79.5 MB
|
Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.mp4
|
94.9 MB
|
PowerShell obfuskation Techniques & How To Detect Them by Daniel Bohannon.mp4
|
98.3 MB
|
The ARMs race for kernel protection by Jonathan Levin.mp4
|
95.5 MB
|
Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.mp4
|
96.4 MB
|
Who put the backdoor in my modem by Ewerson Guimaraes.mp4
|
81.4 MB
|
WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.mp4
|
101.3 MB
|
/CODE BLUE 2017/
|
(In)Security of Japanese IT Asset Management Software.mp4
|
113.6 MB
|
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.mp4
|
71.5 MB
|
Androsia - A step ahead in securing in-memory Android application data.mp4
|
86.9 MB
|
Detection index learning based on cyber threat intelligence and its application.mp4
|
74.9 MB
|
For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.mp4
|
87.1 MB
|
Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.mp4
|
2.8 MB
|
George Hotz - Keynote - Make your car self-driving using open-source software.mp4
|
122.2 MB
|
Industroyer - biggest threat to industrial control systems since Stuxnet.mp4
|
59.6 MB
|
Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.mp4
|
89.1 MB
|
LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.mp4
|
130.3 MB
|
National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.mp4
|
134.0 MB
|
Ory Segal - Passive Fingerprinting of HTTP 2 Clients.mp4
|
89.4 MB
|
Possibility of arbitrary code execution by Step-Oriented Programming.mp4
|
92.8 MB
|
PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.mp4
|
143.4 MB
|
Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.mp4
|
103.3 MB
|
Take a Jailbreak -Stunning Guards for iOS Jailbreak.mp4
|
123.4 MB
|
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.mp4
|
77.9 MB
|
吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.mp4
|
79.3 MB
|
確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.mp4
|
95.9 MB
|
/CODE BLUE 2018/
|
A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek & Nicolas Joly.eng.srt
|
77.5 KB
|
A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek & Nicolas Joly.mp4
|
129.1 MB
|
Are You Trading Stocks Securely by Alejandro Hernandez.eng.srt
|
60.2 KB
|
Are You Trading Stocks Securely by Alejandro Hernandez.mp4
|
114.1 MB
|
BB] CIRCO Cisco Implant Raspberry Controlled Operations by Emilio Couto.eng.srt
|
56.0 KB
|
BB] CIRCO Cisco Implant Raspberry Controlled Operations by Emilio Couto.mp4
|
50.9 MB
|
CoinMiner are Evasive by Thomas Roccia and Omri Moyal.eng.srt
|
59.3 KB
|
CoinMiner are Evasive by Thomas Roccia and Omri Moyal.mp4
|
80.8 MB
|
Crashing to root How to escape the iOS sandbox using abort() by Brandon Azad.eng.srt
|
93.0 KB
|
Crashing to root How to escape the iOS sandbox using abort() by Brandon Azad.mp4
|
93.3 MB
|
Crypto Gold Mine Is Your Environment Safe by Austin McBride.eng.srt
|
60.0 KB
|
Crypto Gold Mine Is Your Environment Safe by Austin McBride.mp4
|
85.7 MB
|
Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.mp4
|
113.3 MB
|
Dissect Android Bluetooth for Fun & Profit by Jianjun Dai, Guang Gong.eng.srt
|
40.1 KB
|
Dissect Android Bluetooth for Fun & Profit by Jianjun Dai, Guang Gong.mp4
|
85.9 MB
|
From Seoul to Tokyo - Threats for Japan and South Korea by Minseok Cha, Jaejun Heo.eng.srt
|
48.9 KB
|
From Seoul to Tokyo - Threats for Japan and South Korea by Minseok Cha, Jaejun Heo.mp4
|
85.0 MB
|
Fuzz your smartphone from 4G base station side by Tsojen Liu.eng.srt
|
47.7 KB
|
Fuzz your smartphone from 4G base station side by Tsojen Liu.mp4
|
87.7 MB
|
GLitch hammering your phone through WebGL by Pietro Frigo.eng.srt
|
68.3 KB
|
GLitch hammering your phone through WebGL by Pietro Frigo.mp4
|
96.5 MB
|
How to hack SD-WAN and keep your sanity by Sergey Goreychik.mp4
|
120.4 MB
|
INTERNATIONAL COLLABORATION A TOOL FOR COMBATING BEC by Alex Ogbole.eng.srt
|
47.8 KB
|
INTERNATIONAL COLLABORATION A TOOL FOR COMBATING BEC by Alex Ogbole.mp4
|
75.6 MB
|
Keynote Cyber Arms Race by Mikko Hyppönen.eng.srt
|
77.3 KB
|
Keynote Cyber Arms Race by Mikko Hyppönen.mp4
|
144.6 MB
|
Keynote Power, Patience, and Persistence by Kenneth Geers.eng.srt
|
55.9 KB
|
Keynote Power, Patience, and Persistence by Kenneth Geers.mp4
|
106.3 MB
|
LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.mp4
|
112.1 MB
|
Methodology for controlling connected cars remotely by Minrui Yan, Jiahao Li.eng.srt
|
51.2 KB
|
Methodology for controlling connected cars remotely by Minrui Yan, Jiahao Li.mp4
|
96.8 MB
|
Policy Options for Cyber Middle Powers against Strategic Cyber Attacks by Philipp S. Kruger.eng.srt
|
53.7 KB
|
Policy Options for Cyber Middle Powers against Strategic Cyber Attacks by Philipp S. Kruger.mp4
|
122.0 MB
|
Practical method and practice of OSINT for cyber defense by Ataru Ishii.mp4
|
109.9 MB
|
Privacy by Design Methodology by Vanessa Henri.eng.srt
|
58.2 KB
|
Privacy by Design Methodology by Vanessa Henri.mp4
|
84.9 MB
|
RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.mp4
|
39.4 MB
|
Reading the norms of cyberspace - by Koichiro Sparky Komiyama.mp4
|
90.8 MB
|
Remotely Cracking Smart Gun Safes by Austin Fletcher, Daniel Su.eng.srt
|
64.2 KB
|
Remotely Cracking Smart Gun Safes by Austin Fletcher, Daniel Su.mp4
|
94.5 MB
|
Smart Contract Honeypots for Profit (and probably Fun) by Ben Schmidt.eng.srt
|
51.9 KB
|
Smart Contract Honeypots for Profit (and probably Fun) by Ben Schmidt.mp4
|
72.4 MB
|
Smart Fuzzing XPC & XNU by Juwei Lin, Lilang Wu, Moony Li.eng.srt
|
46.9 KB
|
Smart Fuzzing XPC & XNU by Juwei Lin, Lilang Wu, Moony Li.mp4
|
93.9 MB
|
The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.mp4
|
83.5 MB
|
The Decalogue(ish) of Contractual Security Sins by Sebastian Avarvarei.eng.srt
|
79.9 KB
|
The Decalogue(ish) of Contractual Security Sins by Sebastian Avarvarei.mp4
|
143.3 MB
|
The Mystery of WannaCry Mutants - by Makoto Iwamura.mp4
|
111.8 MB
|
uclear Weapons and Cyber Risks by Julia Franziska Berghofer.eng.srt
|
61.0 KB
|
uclear Weapons and Cyber Risks by Julia Franziska Berghofer.mp4
|
101.6 MB
|
Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.eng.srt
|
50.8 KB
|
Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.mp4
|
93.2 MB
|
WHAT THE FAX by Yaniv Balmas, Eyal Itkin.eng.srt
|
69.7 KB
|
WHAT THE FAX by Yaniv Balmas, Eyal Itkin.mp4
|
105.3 MB
|
Who's guarding the gateway - by Nicole Beckwith.eng.srt
|
39.1 KB
|
Who's guarding the gateway - by Nicole Beckwith.mp4
|
70.4 MB
|
Wow, PESSR has Eroded Apple in Blink by Ju Zhu, Moony Li, Lilang Wu.eng.srt
|
39.1 KB
|
Wow, PESSR has Eroded Apple in Blink by Ju Zhu, Moony Li, Lilang Wu.mp4
|
77.8 MB
|
/CODE BLUE 2019/
|
[BB] FileInsight-plugins Decoding toolbox for malware analysis by Nobutaka Mantani.eng.srt
|
24.4 KB
|
[BB] FileInsight-plugins Decoding toolbox for malware analysis by Nobutaka Mantani.mp4
|
52.4 MB
|
[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.mp4
|
49.0 MB
|
Applicability of GDPR and APPI to international companies and the impact on IT Security.eng.srt
|
59.0 KB
|
Applicability of GDPR and APPI to international companies and the impact on IT Security.mp4
|
105.2 MB
|
Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di Shen.eng.srt
|
44.5 KB
|
Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di Shen.mp4
|
66.6 MB
|
Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.mp4
|
38.6 MB
|
Coinbase and the Firefox 0-day by Philip Martin.eng.srt
|
55.4 KB
|
Coinbase and the Firefox 0-day by Philip Martin.mp4
|
71.6 MB
|
Hardware Wallet Security by Sergei Volokitin.eng.srt
|
62.5 KB
|
Hardware Wallet Security by Sergei Volokitin.mp4
|
78.6 MB
|
Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.eng.srt
|
80.5 KB
|
Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.mp4
|
110.6 MB
|
KeynoteCyberspace - A Lawless Wild West or Orderly Chaos by Liis Vihul.eng.srt
|
54.6 KB
|
KeynoteCyberspace - A Lawless Wild West or Orderly Chaos by Liis Vihul.mp4
|
80.9 MB
|
KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.eng.srt
|
85.1 KB
|
KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.mp4
|
107.7 MB
|
Let's Make Windows Defender Angry Antivirus can be an oracle by Ryo Ichikawa.eng.srt
|
35.8 KB
|
Let's Make Windows Defender Angry Antivirus can be an oracle by Ryo Ichikawa.mp4
|
78.1 MB
|
Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper.eng.srt
|
43.9 KB
|
Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper.mp4
|
55.5 MB
|
MalCfgParser A Lightweight Malware Configuration Parsing Tool.eng.srt
|
17.4 KB
|
MalCfgParser A Lightweight Malware Configuration Parsing Tool.mp4
|
34.6 MB
|
Recent APT attack on crypto exchange employees by Heungsoo Kang.eng.srt
|
49.9 KB
|
Recent APT attack on crypto exchange employees by Heungsoo Kang.mp4
|
84.7 MB
|
Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.mp4
|
67.6 MB
|
Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.mp4
|
98.9 MB
|
Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarsieri.eng.srt
|
59.4 KB
|
Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarsieri.mp4
|
89.4 MB
|
tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.mp4
|
91.2 MB
|
Wifi sniffing with the WifiKraken by Mike Spicer.eng.srt
|
67.7 KB
|
Wifi sniffing with the WifiKraken by Mike Spicer.mp4
|
119.9 MB
|
/CODE BLUE 2020/
|
Keynote1 - Ms. Audrey Guinchard.eng.srt
|
40.5 KB
|
Keynote1 - Ms. Audrey Guinchard.mp4
|
38.3 MB
|
Keynote2 - Practical and Intelligent Incident Response Planning.eng.srt
|
47.5 KB
|
Keynote2 - Practical and Intelligent Incident Response Planning.mp4
|
54.2 MB
|
Alliance power for Cyber Security.eng.srt
|
23.3 KB
|
Alliance power for Cyber Security.mp4
|
27.8 MB
|
Apk-medit memory search and patch tool for APK without root & android NDK.eng.srt
|
15.1 KB
|
Apk-medit memory search and patch tool for APK without root & android NDK.mp4
|
17.7 MB
|
Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.mp4
|
33.1 MB
|
Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.mp4
|
23.9 MB
|
DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.mp4
|
24.0 MB
|
Defending Computer CriminalsPresented - Andrea Monti.eng.srt
|
38.3 KB
|
Defending Computer CriminalsPresented - Andrea Monti.mp4
|
28.2 MB
|
Dissecting China’s Information Operations with Threat Intelligence.eng.srt
|
36.2 KB
|
Dissecting China’s Information Operations with Threat Intelligence.mp4
|
46.2 MB
|
Don't Be Silly - It's Only a Lightbulb.eng.srt
|
49.2 KB
|
Don't Be Silly - It's Only a Lightbulb.mp4
|
85.1 MB
|
Drones' Cryptanalysis - Detecting Spying Drones.eng.srt
|
48.6 KB
|
Drones' Cryptanalysis - Detecting Spying Drones.mp4
|
43.8 MB
|
Ethereum 2.0のセキュリティ.mp4
|
28.6 MB
|
Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.mp4
|
36.7 MB
|
Hunting kernel exploits with filesystem fuzzer.eng.srt
|
31.6 KB
|
Hunting kernel exploits with filesystem fuzzer.mp4
|
35.4 MB
|
Illicit QQ Communities What's Being Shared.eng.srt
|
39.8 KB
|
Illicit QQ Communities What's Being Shared.mp4
|
28.1 MB
|
It is a World Wide Web, but All Politics is Local Planning to Survive a Balkanizing Internet.eng.srt
|
43.4 KB
|
It is a World Wide Web, but All Politics is Local Planning to Survive a Balkanizing Internet.mp4
|
55.8 MB
|
Kr00k Serious vulnerability affected encryption of billion Wi-Fi devices.eng.srt
|
52.9 KB
|
Kr00k Serious vulnerability affected encryption of billion Wi-Fi devices.mp4
|
51.8 MB
|
Lamphone Real-Time Passive Sound Recovery from Light Bulb Vibrations.eng.srt
|
47.7 KB
|
Lamphone Real-Time Passive Sound Recovery from Light Bulb Vibrations.mp4
|
42.2 MB
|
Law Enforcement Access to Transborder.eng.srt
|
49.1 KB
|
Law Enforcement Access to Transborder.mp4
|
53.1 MB
|
Life After Privacy Shield - Will Data Transfer Laws Stop the World Doing Business.eng.srt
|
41.4 KB
|
Life After Privacy Shield - Will Data Transfer Laws Stop the World Doing Business.mp4
|
43.5 MB
|
LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.mp4
|
40.8 MB
|
Operation Chimera - APT Operation Targets Semiconductor Vendors.mp4
|
57.2 MB
|
Operation I am Tom How APT actors move laterally in corporate networks.eng.srt
|
43.1 KB
|
Operation I am Tom How APT actors move laterally in corporate networks.mp4
|
51.6 MB
|
Privacy protection and Data breach incident response regulation in East Asia and Europe.eng.srt
|
38.6 KB
|
Privacy protection and Data breach incident response regulation in East Asia and Europe.mp4
|
42.7 MB
|
Reflex you give me a parser, I give you a token generator.eng.srt
|
44.1 KB
|
Reflex you give me a parser, I give you a token generator.mp4
|
35.8 MB
|
Reverse Engineering archeology.mp4
|
67.6 MB
|
SOARによるセキュリティ監視業務の効率化とSecOps.mp4
|
33.2 MB
|
Speccial Session - Digital Social Innovation.eng.srt
|
44.5 KB
|
Speccial Session - Digital Social Innovation.mp4
|
82.8 MB
|
Vulnerabilities of Machine Learning Infrastructure.mp4
|
45.0 MB
|
Who stole My 100,000 Dollars’ Worth Bitcoin Wallets - Catch Them All With New Deceptive Bait.eng.srt
|
46.5 KB
|
Who stole My 100,000 Dollars’ Worth Bitcoin Wallets - Catch Them All With New Deceptive Bait.mp4
|
51.9 MB
|
サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.mp4
|
38.4 MB
|
虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.mp4
|
36.6 MB
|
説明可能な悪性ドメイン診断.mp4
|
49.4 MB
|
/CODE BLUE 2021/
|
Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.mp4
|
48.2 MB
|
Day1 Closing.mp4
|
4.5 MB
|
Day1 Opening.mp4
|
6.7 MB
|
Day2 Event Closing.mp4
|
27.2 MB
|
Day2 Online Closing.mp4
|
9.6 MB
|
Day2 Opening.mp4
|
14.1 MB
|
Hacking the Code Blue Seas Maritime Community Building Across the Pacific.eng.srt
|
41.5 KB
|
Hacking the Code Blue Seas Maritime Community Building Across the Pacific.mp4
|
35.8 MB
|
Keynote1 - Shaking the Cybersecurity Kaleidoscope - An Immersive Look into Human Behaviour.eng.srt
|
51.8 KB
|
Keynote1 - Shaking the Cybersecurity Kaleidoscope - An Immersive Look into Human Behaviour.mp4
|
40.8 MB
|
Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.mp4
|
31.2 MB
|
MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.mp4
|
34.8 MB
|
NAS as Not As Secure.eng.srt
|
51.6 KB
|
NAS as Not As Secure.mp4
|
28.2 MB
|
Non-Private Chat Police investigation legislation in the flat world.eng.srt
|
49.4 KB
|
Non-Private Chat Police investigation legislation in the flat world.mp4
|
40.6 MB
|
Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.mp4
|
30.4 MB
|
ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.srt
|
58.5 KB
|
ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.mp4
|
42.4 MB
|
The Lazarus Group's Attack Operations Targeting Japan.mp4
|
50.2 MB
|
The security thing - Knowledge, skills, and two more things.mp4
|
95.8 MB
|
Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.mp4
|
48.4 MB
|
/CODE BLUE 2022/
|
[U25]Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded ..mp4
|
19.7 MB
|
[U25]Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embeddedeng.srt
|
29.3 KB
|
[U25]Under the hood of Wslink’s multilayered virtual machine.eng.srt
|
43.9 KB
|
[U25]Under the hood of Wslink’s multilayered virtual machine.mp4
|
33.4 MB
|
Closing adddress.eng.srt
|
34.4 KB
|
Closing adddress.mp4
|
48.3 MB
|
CloudDragon’s Credential Factory is Powering Up Its Espionage Activities Against All the.eng.srt
|
41.8 KB
|
CloudDragon’s Credential Factory is Powering Up Its Espionage Activities Against All the.mp4
|
35.9 MB
|
Fight Against Malware Development Life Cycle.eng.srt
|
56.6 KB
|
Fight Against Malware Development Life Cycle.mp4
|
44.7 MB
|
From Parroting to Echoing The Evolution of China’s Bots-Driven InfoOps targeting Taiwan.eng.srt
|
54.1 KB
|
From Parroting to Echoing The Evolution of China’s Bots-Driven InfoOps targeting Taiwan.mp4
|
46.4 MB
|
Hayabusa - Threat Hunting and Fast Forensics in Windows environments for free.eng.srt
|
40.9 KB
|
Hayabusa - Threat Hunting and Fast Forensics in Windows environments for free.mp4
|
40.2 MB
|
Ipa-medit Memory modification tool for iOS apps without Jailbreaking.eng.srt
|
23.9 KB
|
Ipa-medit Memory modification tool for iOS apps without Jailbreaking.mp4
|
21.8 MB
|
KeynoteUnderwhelmed Making Sense of the Overwhelming Challenge of Cybersecurity.eng.srt
|
81.6 KB
|
KeynoteUnderwhelmed Making Sense of the Overwhelming Challenge of Cybersecurity.mp4
|
52.5 MB
|
Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.mp4
|
42.1 MB
|
Opening.eng.srt
|
14.1 KB
|
Opening.mp4
|
22.6 MB
|
Red light in the factory - From 0 to 100 OT adversary emulation.eng.srt
|
40.3 KB
|
Red light in the factory - From 0 to 100 OT adversary emulation.mp4
|
33.5 MB
|
Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All.eng.srt
|
74.5 KB
|
Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All.mp4
|
44.1 MB
|
Sisyphus and the CVE Feed Vulnerability Management at Scale.eng.srt
|
77.0 KB
|
Sisyphus and the CVE Feed Vulnerability Management at Scale.mp4
|
42.9 MB
|
SMARTIAN Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses.eng.srt
|
50.5 KB
|
SMARTIAN Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses.mp4
|
36.3 MB
|
Tales of 5G hacking.eng.srt
|
67.9 KB
|
Tales of 5G hacking.mp4
|
55.6 MB
|
The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss..mp4
|
91.3 MB
|
The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discusseng.srt
|
85.5 KB
|
Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulation and Scanning.eng.srt
|
48.0 KB
|
Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulation and Scanning.mp4
|
42.2 MB
|
What I learned from the direct confrontation with the adversaries who hid C&C server.eng.srt
|
66.0 KB
|
What I learned from the direct confrontation with the adversaries who hid C&C server.mp4
|
44.5 MB
|
Who is the Mal-Gopher - Implementation and Evaluation of gimpfuzzy for Go Malware Class.eng.srt
|
61.4 KB
|
Who is the Mal-Gopher - Implementation and Evaluation of gimpfuzzy for Go Malware Class.mp4
|
36.3 MB
|
Your Printer is not your Printer - Hacking Printers at Pwn2Own.mp4
|
34.0 MB
|
「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション.eng.srt
|
86.2 KB
|
「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション.mp4
|
91.4 MB
|
/CODE BLUE 2023/
|
A 3-Year Tale of Hacking a Pwn2Own Target The Attacks, Vendor Evolution, and Lesson Learneds.eng.srt
|
55.2 KB
|
A 3-Year Tale of Hacking a Pwn2Own Target The Attacks, Vendor Evolution, and Lesson Learneds.mp4
|
52.2 MB
|
BSides Tokyo 2024.eng.srt
|
42.2 KB
|
BSides Tokyo 2024.mp4
|
55.3 MB
|
Bypassing macOS Security and Privacy Mechanisms From Gatekeeper to System Integrity Protectio.eng.srt
|
69.3 KB
|
Bypassing macOS Security and Privacy Mechanisms From Gatekeeper to System Integrity Protectio.mp4
|
47.7 MB
|
Closing Keynote Cyber and Security in Times of War.eng.srt
|
57.0 KB
|
Closing Keynote Cyber and Security in Times of War.mp4
|
37.5 MB
|
Deep-Kernel Treasure Hunt Finding exploitable structures in the Linux kernel.eng.srt
|
52.3 KB
|
Deep-Kernel Treasure Hunt Finding exploitable structures in the Linux kernel.mp4
|
29.9 MB
|
Digital sovereignty - shaping regulatory responses to technological dominance.eng.srt
|
61.8 KB
|
Digital sovereignty - shaping regulatory responses to technological dominance.mp4
|
46.1 MB
|
Enhanced Vulnerability Hunting in WDM Drivers with Symbolic Execution and Taint Analysis.eng.srt
|
42.7 KB
|
Enhanced Vulnerability Hunting in WDM Drivers with Symbolic Execution and Taint Analysis.mp4
|
29.8 MB
|
filename - in Content-Disposition is a landmine - vulnerability caused by ambiguous requiremen.eng.srt
|
50.0 KB
|
filename - in Content-Disposition is a landmine - vulnerability caused by ambiguous requiremen.mp4
|
38.9 MB
|
Hi My Name Is [What] Abusing DHCP To Spoof DNS Records.eng.srt
|
61.7 KB
|
Hi My Name Is [What] Abusing DHCP To Spoof DNS Records.mp4
|
44.7 MB
|
International Panel Discussion on 'A Comprehensive Study of Active Cyber Defence'.eng.srt
|
62.7 KB
|
International Panel Discussion on 'A Comprehensive Study of Active Cyber Defence'.mp4
|
73.0 MB
|
KeynoteIf It's Smart, It's Vulnerable.eng.srt
|
66.5 KB
|
KeynoteIf It's Smart, It's Vulnerable.mp4
|
63.0 MB
|
Modems (and telecoms) are also not as secure - 6 0-days to 4 million modems within a week.eng.srt
|
56.5 KB
|
Modems (and telecoms) are also not as secure - 6 0-days to 4 million modems within a week.mp4
|
45.4 MB
|
Open Sesame The full story behind opening a smart lock.eng.srt
|
47.9 KB
|
Open Sesame The full story behind opening a smart lock.mp4
|
43.2 MB
|
OSBT OpenID Connect Scenario-Based Tester.eng.srt
|
55.0 KB
|
OSBT OpenID Connect Scenario-Based Tester.mp4
|
50.6 MB
|
Pennywise - Invisible privacy risk in the new AI era.eng.srt
|
53.9 KB
|
Pennywise - Invisible privacy risk in the new AI era.mp4
|
44.8 MB
|
Power Automate C2 Stealth Living-Off-the-Cloud C2 Framework.eng.srt
|
68.1 KB
|
Power Automate C2 Stealth Living-Off-the-Cloud C2 Framework.mp4
|
44.5 MB
|
Pwning Electron Application - Analysis and Defense of Vulnerabilities in Electron Applications.eng.srt
|
34.1 KB
|
Pwning Electron Application - Analysis and Defense of Vulnerabilities in Electron Applications.mp4
|
21.6 MB
|
stelftools cross-architecture static library detector for IoT malware.eng.srt
|
64.6 KB
|
stelftools cross-architecture static library detector for IoT malware.mp4
|
61.7 MB
|
The Dark Side of Cloud Computing How Threat Actors Abuse Millions of Dollars of Cloud Compute.eng.srt
|
55.8 KB
|
The Dark Side of Cloud Computing How Threat Actors Abuse Millions of Dollars of Cloud Compute.mp4
|
31.7 MB
|
The Renaissance of Cyber Physical Offensive Capabilities.eng.srt
|
75.0 KB
|
The Renaissance of Cyber Physical Offensive Capabilities.mp4
|
41.4 MB
|
Unlocking the Drive Exploiting Tesla Model 3.eng.srt
|
47.9 KB
|
Unlocking the Drive Exploiting Tesla Model 3.mp4
|
47.4 MB
|
Windows Event Log Internals Understanding the Core Mechanisms for Enhanced Security.eng.srt
|
60.5 KB
|
Windows Event Log Internals Understanding the Core Mechanisms for Enhanced Security.mp4
|
61.2 MB
|
Total files 359
|