SlideShare a Scribd company logo
1 of 24
Download to read offline
HACKING OXIMETER UNTUK
MEMBANTU PASIEN COVID19 DI
INDONESIA
RYAN FABELLA
Tertinggi saat juli - agustus 2021
Relawan IT untuk provinsi jawa timur – pengolahan data
Bot WA untuk
- informasi sebaran covid19
- peningkatan ketertiban untuk laporan ke pihak keamanan
Ryan fabella
bisnis software development
omaON - IOT smarthome
LATAR BELAKANG
•Alat oximeter telemetry yang ada mahal
•Alat dipasaran presisi cukup diterima namun hanya bisa dilihat
langsung ke pasien
•Tingkat penularan COVID19 dari pasien ke tenaga kesehatan
meningkat
•karena lama waktu monitoring
•Dokumentasi tiap waktu tidak ada
•Notifikasi terhadap kondisi menurun tidak ada
•Dana untuk peralatan COVID19 terbatas
SOLUSINYA
Lebih banyak pasien yang bisa dimonitoring
Rumah sakit lapangan, pemantauan mandiri per RT/RW
ALAT – ALAT ELEKTRONIK TERKAIT PENANGAN
COVID PERSONAL
tensimeter
oximeter ventilator
OXIMETER
Oximeter (pulse oximeter) adalah alat pengukur kadar oksigen dalam
darah. Alat ini penting untuk mengukur oksigen dalam tubuh yang
apabila kurang umumnya tidak menimbulkan gejala. Padahal, kondisi
tersebut sangat berbahaya dan mengancam nyawa bila tidak segera
ditangani. Oleh karena itu, penting untuk selalu memantau kadar oksigen
dalam tubuh, terutama bagi seseorang yang dinyatakan positif COVID-
19 dan sedang menjalani isolasi mandiri.
Jenisnya
- tanpa integrasi device lain
- Bluetooth max 10 m
Dua – duanya tidak bisa kirim jarak jauh 200
-500 meter
TEARDOWN OXIMETER
pulse oximeter tipe C101H1
TEARDOWN OXIMETER
pulse oximeter tipe lk88
UART DEBUGING
USB TTL Oximeter
RX TX
TX RX
GND GND
DEBUGING
Sop2 = SpO2 ~ kadar saturasi O2.
PR = detak jantung per menit.
Syarat digunakan microcontroller
- Gak ada battrei limitation
- Menggunakan protocol mqtt
- Dimensinya kecil
https://www.researchgate.net/figure/Respective-advantages-of-Sigfox-LoRa-and-NB-
IoT-in-terms-of-IoT-factors_fig3_322018958
MICROCONTROLLER DIPASARAN
PINOUT WEMOS
Gabungin semua peralatan
ARSITEKTUR DIAGRAM
Oximeter
Internet /
intranet
MQTT broker
MQTT
subscriber
MQTT
subscriber
Gateway
Wemos D1
MQTT
subscriber
Wifi router
SOFTWARE YANG DIPAKAI
• Mqtt mosquito
• Esp8266Wifi module
• WiFiManager module
• WiFiClientSecure module
• Arduino client for MQTT
• MQTT dash
• MQTT explorer
• Arduiono editor
Code
https://github.com/natrya/oximeter-mqtt
DICOBA KIRIM PUBLISH
MENGGUNAKAN MQTT DASH UNTUK
MONITORING JARAK JAUH PASIEN
LEBIH ADVANCE MENGGUNAKAN GRAFANA -
INFLUXDB
https://www.influxdata.com/blog/monitoring-a-pulse-oximeter-with-influxdb/
LEBIH JAUH LAGI
Tidak perlu solder2 dengan oximeter Bluetooth kemudian data di kirim ke mqtt
broker
Andreas Spiess
BLE Oximeter Hack with ESP32 for COVID-19 Projects
https://www.youtube.com/watch?v=FIVIPHrAuAI
SCANNING DENGAN NRF CONNECT
ARSITEKTUR DIAGRAM OXIMETER BLUETOOTH
Oximeter
bluetooth
Internet /
intranet
MQTT broker
MQTT
subscriber
MQTT
subscriber
Gateway
esp32
bluetooth
MQTT
subscriber
Wifi router
TERIMA KASIH

More Related Content

What's hot

OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10NowSecure
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsAlan Tatourian
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASPMarco Morana
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFAndy Thompson
 
Cyber Security (Emerging Threats)
Cyber Security (Emerging Threats)Cyber Security (Emerging Threats)
Cyber Security (Emerging Threats)Kaufman & Canoles
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in CybersecurityTeri Radichel
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
BSidesAugusta 2022 - The Power of the OT Security Playbook
BSidesAugusta 2022 - The Power of the OT Security PlaybookBSidesAugusta 2022 - The Power of the OT Security Playbook
BSidesAugusta 2022 - The Power of the OT Security PlaybookChris Sistrunk
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...idsecconf
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
Malware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineeringMalware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineeringbartblaze
 
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made SimplePaul Melson
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
Hacking ATM machines for fun and profit!
Hacking ATM machines for fun and profit!Hacking ATM machines for fun and profit!
Hacking ATM machines for fun and profit!Zigoo0
 
HSM (Hardware Security Module)
HSM (Hardware Security Module)HSM (Hardware Security Module)
HSM (Hardware Security Module)Umesh Kolhe
 

What's hot (20)

A Threat Hunter Himself
A Threat Hunter HimselfA Threat Hunter Himself
A Threat Hunter Himself
 
Sandbox
SandboxSandbox
Sandbox
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
Ctf del upload
Ctf del uploadCtf del upload
Ctf del upload
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
 
Cyber Security (Emerging Threats)
Cyber Security (Emerging Threats)Cyber Security (Emerging Threats)
Cyber Security (Emerging Threats)
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
BSidesAugusta 2022 - The Power of the OT Security Playbook
BSidesAugusta 2022 - The Power of the OT Security PlaybookBSidesAugusta 2022 - The Power of the OT Security Playbook
BSidesAugusta 2022 - The Power of the OT Security Playbook
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Phishing Incident Response Playbook
Phishing Incident Response PlaybookPhishing Incident Response Playbook
Phishing Incident Response Playbook
 
Malware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineeringMalware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineering
 
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made Simple
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Ransomware: Wannacry
Ransomware: WannacryRansomware: Wannacry
Ransomware: Wannacry
 
Hacking ATM machines for fun and profit!
Hacking ATM machines for fun and profit!Hacking ATM machines for fun and profit!
Hacking ATM machines for fun and profit!
 
HSM (Hardware Security Module)
HSM (Hardware Security Module)HSM (Hardware Security Module)
HSM (Hardware Security Module)
 

Similar to MONITORING PASIEN COVID19

Mobile Adhoc Network dan Wireless Sensor Network
Mobile Adhoc Network dan Wireless Sensor NetworkMobile Adhoc Network dan Wireless Sensor Network
Mobile Adhoc Network dan Wireless Sensor NetworkArif Setiawan
 
Publikasi 08.01.2392
Publikasi 08.01.2392Publikasi 08.01.2392
Publikasi 08.01.2392Rahman Malang
 
Sistem Kendali suhu ruangan dengan pid backward difference berbasis arduino, ...
Sistem Kendali suhu ruangan dengan pid backward difference berbasis arduino, ...Sistem Kendali suhu ruangan dengan pid backward difference berbasis arduino, ...
Sistem Kendali suhu ruangan dengan pid backward difference berbasis arduino, ...kun_aldi
 
Tugas jurnal basindo rian
Tugas jurnal basindo rianTugas jurnal basindo rian
Tugas jurnal basindo rianMuhamad Iqbal
 
Mengukur Ketinggian dan suhu Pada akuarium Berbasis Arduino
Mengukur Ketinggian dan suhu Pada akuarium Berbasis ArduinoMengukur Ketinggian dan suhu Pada akuarium Berbasis Arduino
Mengukur Ketinggian dan suhu Pada akuarium Berbasis Arduinofitri pratiwi
 
Kelompok 4- Alat ukur temperatur dan ketinggian air berbasis arduino
Kelompok 4- Alat ukur temperatur dan ketinggian air berbasis arduinoKelompok 4- Alat ukur temperatur dan ketinggian air berbasis arduino
Kelompok 4- Alat ukur temperatur dan ketinggian air berbasis arduinoSyifaHayat
 
SMART WASTE (hospital safety box monitoring) di RSU HERMINA ARCAMANIK
SMART WASTE (hospital safety box monitoring) di RSU HERMINA ARCAMANIKSMART WASTE (hospital safety box monitoring) di RSU HERMINA ARCAMANIK
SMART WASTE (hospital safety box monitoring) di RSU HERMINA ARCAMANIKGani Amanda Abdulah
 
MAKALAH_SCADA.docx
MAKALAH_SCADA.docxMAKALAH_SCADA.docx
MAKALAH_SCADA.docxsintia65
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5ryanshardyanto
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Ulfah Hasanah
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5asepsuher
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Annisa Pramudhita
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5ryanshardyanto
 

Similar to MONITORING PASIEN COVID19 (20)

Mobile Adhoc Network dan Wireless Sensor Network
Mobile Adhoc Network dan Wireless Sensor NetworkMobile Adhoc Network dan Wireless Sensor Network
Mobile Adhoc Network dan Wireless Sensor Network
 
Publikasi 08.01.2392
Publikasi 08.01.2392Publikasi 08.01.2392
Publikasi 08.01.2392
 
Makalah jarkom
Makalah jarkom Makalah jarkom
Makalah jarkom
 
Tugas 2
Tugas 2Tugas 2
Tugas 2
 
IR THERMOMETER 62 MAX
IR THERMOMETER 62 MAXIR THERMOMETER 62 MAX
IR THERMOMETER 62 MAX
 
Sistem Kendali suhu ruangan dengan pid backward difference berbasis arduino, ...
Sistem Kendali suhu ruangan dengan pid backward difference berbasis arduino, ...Sistem Kendali suhu ruangan dengan pid backward difference berbasis arduino, ...
Sistem Kendali suhu ruangan dengan pid backward difference berbasis arduino, ...
 
Tugas jurnal basindo rian
Tugas jurnal basindo rianTugas jurnal basindo rian
Tugas jurnal basindo rian
 
IoT Pertemuan 1.pptx
IoT Pertemuan 1.pptxIoT Pertemuan 1.pptx
IoT Pertemuan 1.pptx
 
16809 kelompok 4
16809 kelompok 416809 kelompok 4
16809 kelompok 4
 
Mengukur Ketinggian dan suhu Pada akuarium Berbasis Arduino
Mengukur Ketinggian dan suhu Pada akuarium Berbasis ArduinoMengukur Ketinggian dan suhu Pada akuarium Berbasis Arduino
Mengukur Ketinggian dan suhu Pada akuarium Berbasis Arduino
 
16809 kelompok 4
16809 kelompok 416809 kelompok 4
16809 kelompok 4
 
Kelompok 4- Alat ukur temperatur dan ketinggian air berbasis arduino
Kelompok 4- Alat ukur temperatur dan ketinggian air berbasis arduinoKelompok 4- Alat ukur temperatur dan ketinggian air berbasis arduino
Kelompok 4- Alat ukur temperatur dan ketinggian air berbasis arduino
 
Revitalia Purba
Revitalia PurbaRevitalia Purba
Revitalia Purba
 
SMART WASTE (hospital safety box monitoring) di RSU HERMINA ARCAMANIK
SMART WASTE (hospital safety box monitoring) di RSU HERMINA ARCAMANIKSMART WASTE (hospital safety box monitoring) di RSU HERMINA ARCAMANIK
SMART WASTE (hospital safety box monitoring) di RSU HERMINA ARCAMANIK
 
MAKALAH_SCADA.docx
MAKALAH_SCADA.docxMAKALAH_SCADA.docx
MAKALAH_SCADA.docx
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5
 

More from idsecconf

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfidsecconf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...idsecconf
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfidsecconf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...idsecconf
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfidsecconf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...idsecconf
 
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika TriwidadaPerkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidadaidsecconf
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...idsecconf
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwiantoidsecconf
 
Stream crime
Stream crime Stream crime
Stream crime idsecconf
 
(Paper) Mips botnet worm with open wrt sdk toolchains
(Paper) Mips botnet worm with open wrt sdk toolchains(Paper) Mips botnet worm with open wrt sdk toolchains
(Paper) Mips botnet worm with open wrt sdk toolchainsidsecconf
 
Mips router targeted worm botnet
Mips router targeted worm botnetMips router targeted worm botnet
Mips router targeted worm botnetidsecconf
 
The achilles heel of GPN Card implementation
The achilles heel of GPN Card implementationThe achilles heel of GPN Card implementation
The achilles heel of GPN Card implementationidsecconf
 

More from idsecconf (20)

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika TriwidadaPerkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
 
Stream crime
Stream crime Stream crime
Stream crime
 
(Paper) Mips botnet worm with open wrt sdk toolchains
(Paper) Mips botnet worm with open wrt sdk toolchains(Paper) Mips botnet worm with open wrt sdk toolchains
(Paper) Mips botnet worm with open wrt sdk toolchains
 
Mips router targeted worm botnet
Mips router targeted worm botnetMips router targeted worm botnet
Mips router targeted worm botnet
 
The achilles heel of GPN Card implementation
The achilles heel of GPN Card implementationThe achilles heel of GPN Card implementation
The achilles heel of GPN Card implementation
 

MONITORING PASIEN COVID19