Personal Information
Organization / Workplace
Tokyo Japan
Industry
Presentations / Communications
Website
www.codeblue.jp/
About
- International Security Conference in Tokyo -
World leading security researchers will come together for this unique international conference in Tokyo.
At this conference, CODE BLUE plan to aggregate a wide range of innovative and creative research topics and presentations all aspects of information security.
CODE BLUE look forward on this conference activities that will bring together domestic and international researchers, bridge research with industry and cultivate information security personnel who can take an active role on a global scale.
Tags
code blue
cb16
security
code blue 2017
codeblue
cb19
web security
malware
iot
apt
reverse engineering
binary analysis
xss
vulnerability
kernel
forensic
hardware
network
embedded
automotive security
dalvik
u24
fuzzing
exploits
national security
osx
machine learning
javascript
backdoor
sf
binary
bug bounty
remote exploits
scada
u25
exploit development
android kernel
education
keynote
dns
cb18
static analysis
hacking
appsec
industrial security
vulnerability research
vmware
anti-malware
amsi
power shell
webos forensics
digital forensics investigation
smart tv
software protection
side channel attack
cryptanalysis
whitebox cryptography
android
gc root
memory leak
debug stub
debugger
remote debug
forensics
web application security
client fingerprinting
http/2
vulnerability hunt
windows
auto exploit
buffer overflow
atm
neutralize
bot
police
crypto
vpn
root exploit
scanner
current status
innovation
risk management
botnet
phishing
sns
incident response
hardware control
exploit
bluetooth
smart auto mobile
auto vul scan
web
software testing
security evaluation
automation
vulnerability detection
cyber grand challenge (cgc)
auto security system
efi
rootkit
devops
zero-day market
ids
fuzzy hash
api
adobe
targeted attack
windows 10
smartgrid
wireless
china
master key
msoffice
medical devices
ai
bug hunter
mac
sbd
security barrier device
kenji toda
masaaki chida
ida pro
libinjection
sqli
nick galbreath
linux security
tomoyuki shigemori
html5
citadel
celil unuver
ctf
chris eagle
chris valasek
intel management engine
igor skochinsky
ukraine
sandbox
jailbreak
ios
u20
live variable analysis
data-flow analysis
static code analysis
local priviledge escalating
0day
europen union
public-private relationship
european union
public private relationship
protocol smuggling
ssrf
mitm
hacking tool
nfc
monitor attackers activity
obfuscation
mobile
binaly analysis
network security
distributed
distoributed
future countermeasure
future countermeasures
e-state
e-estonia
immune system
immunesystem
espionage
fifefox
firefox
information security
singularity
singurarity
virtualization
public health security
internet security
yukihisa horibe
networked home appliances
ニック・ガルブレス
seok-ha lee
wh1ant
seok ha lee
linux
重森友行
you nakatsuru
yuu nakatsuru
networking with home electronics
yoshihiro horibe
堀部千壽
ネットワーク家電
yuhei otsubo
yuhei ootsubo
大坪雄平
標的型攻撃
o-checker
自動車セキュリティ
hdd disaster recovery
dai shimogaito
jeff moss
See more
Presentations
(264)
See all
Presentations
(264)
See all
Personal Information
Organization / Workplace
Tokyo Japan
Industry
Presentations / Communications
Website
www.codeblue.jp/
About
- International Security Conference in Tokyo -
World leading security researchers will come together for this unique international conference in Tokyo.
At this conference, CODE BLUE plan to aggregate a wide range of innovative and creative research topics and presentations all aspects of information security.
CODE BLUE look forward on this conference activities that will bring together domestic and international researchers, bridge research with industry and cultivate information security personnel who can take an active role on a global scale.
Tags
code blue
cb16
security
code blue 2017
codeblue
cb19
web security
malware
iot
apt
reverse engineering
binary analysis
xss
vulnerability
kernel
forensic
hardware
network
embedded
automotive security
dalvik
u24
fuzzing
exploits
national security
osx
machine learning
javascript
backdoor
sf
binary
bug bounty
remote exploits
scada
u25
exploit development
android kernel
education
keynote
dns
cb18
static analysis
hacking
appsec
industrial security
vulnerability research
vmware
anti-malware
amsi
power shell
webos forensics
digital forensics investigation
smart tv
software protection
side channel attack
cryptanalysis
whitebox cryptography
android
gc root
memory leak
debug stub
debugger
remote debug
forensics
web application security
client fingerprinting
http/2
vulnerability hunt
windows
auto exploit
buffer overflow
atm
neutralize
bot
police
crypto
vpn
root exploit
scanner
current status
innovation
risk management
botnet
phishing
sns
incident response
hardware control
exploit
bluetooth
smart auto mobile
auto vul scan
web
software testing
security evaluation
automation
vulnerability detection
cyber grand challenge (cgc)
auto security system
efi
rootkit
devops
zero-day market
ids
fuzzy hash
api
adobe
targeted attack
windows 10
smartgrid
wireless
china
master key
msoffice
medical devices
ai
bug hunter
mac
sbd
security barrier device
kenji toda
masaaki chida
ida pro
libinjection
sqli
nick galbreath
linux security
tomoyuki shigemori
html5
citadel
celil unuver
ctf
chris eagle
chris valasek
intel management engine
igor skochinsky
ukraine
sandbox
jailbreak
ios
u20
live variable analysis
data-flow analysis
static code analysis
local priviledge escalating
0day
europen union
public-private relationship
european union
public private relationship
protocol smuggling
ssrf
mitm
hacking tool
nfc
monitor attackers activity
obfuscation
mobile
binaly analysis
network security
distributed
distoributed
future countermeasure
future countermeasures
e-state
e-estonia
immune system
immunesystem
espionage
fifefox
firefox
information security
singularity
singurarity
virtualization
public health security
internet security
yukihisa horibe
networked home appliances
ニック・ガルブレス
seok-ha lee
wh1ant
seok ha lee
linux
重森友行
you nakatsuru
yuu nakatsuru
networking with home electronics
yoshihiro horibe
堀部千壽
ネットワーク家電
yuhei otsubo
yuhei ootsubo
大坪雄平
標的型攻撃
o-checker
自動車セキュリティ
hdd disaster recovery
dai shimogaito
jeff moss
See more