SlideShare a Scribd company logo
1 of 49
Download to read offline
What does this presentation all about
• Don’t	shout	at	me	with	“cut	the	crap,	show	me	the	hack!”
• More	academic	approach	rather	than	practical	hack
• Build up the situational awareness when National	Public Key Infrastructure	(“PKI”)	fully implemented
• Encouraging netizen to understand what National	PKI	is,	without necessarily pushing the hard words,	
such as	PKCS#8	vs	PKCS#12	or PKCS#10	CSR	in	DER	vs	PEM.	
• Open	ended question:	“Friend of Foe”
IDSECCONF 2016 CFP 2 24--25 SEP 2016
/usr/bin/finger	@tintinnya
Login: @tintinnya Name: B. Noviansyah
Directory: /Freelancers/@tintinnya Shell: /bin/bash
On since 1998—2002 (ITB) on Bachelor of Informatics
On since 2002—2012 (Many Employers) on Java EE Programmer
On since 2012—2014 (CMU Heinz) on MSISPM + Cyber Forensics and Incident Handler Track
On since 2014—now (Some Bosses) on Many activities, included AFDI
No Mail.
No Plan, just an Independent IT Researcher on night shift, an employee on morning shift.
IDSECCONF 2016 CFP 3 24--25 SEP 2016
Positioning	of	National	PKI
• Digital	Signature	in	Law	of	the	Republic	of	Indonesia	No.	11	of	2008	concerning	Electronic	Information	
and	Transactions
• Article	1
• Point	9:	“Electronic		Certificate”	means	a	certificate	in	electronic	nature	that	bears	an	Electronic	Signature and	identity,	
demonstrating	a	status	of	a	legal	subject	of	parties	to		an	Electronic	Transaction	issued	by	Certification	Service	
Providers.	
• Point	10:	“Electronic		Certification		Service		Provider”	means	a	legal	entity that	acts	as	a	reliable	party,	issues	and	audits	
Electronic	Certificates.
• Point	12:	“Electronic		Signature”	means		a		signature		that	contains	Electronic	Information	that	is	attached	to,		associated		
or		linked		with		other		Electronic	Information		that	is	used	for	means	of	verification	and	authentication.	
• Point	13:	“Signatory/Signer”		means		a		legal		subject	associated		or		linked		with		an		Electronic	Signature.
https://www.bu.edu/bucflp/files/2012/01/Law-No.-11-Concerning-Electronic-Information-and-Transactions.pdf
IDSECCONF 2016 CFP 4 24--25 SEP 2016
Positioning	of	National	PKI
• Digital	Signature	in	Law	of	the	Republic	of	Indonesia	No.	11	of	2008	concerning	Electronic	Information	
and	Transactions
• Article	11 Paragraph	(1):	
Electronic	Signatures	shall	have	lawful	legal	force	and	legal	effect	to	the	extent	satisfying	the	following	requirements:
a. Electronic	Signature-creation	data	shall	be	associated	only	with	the	Signatories/Signers;	
b. Electronic	Signature-creation	data	at	the	time	the	electronic	signing	process	shall	be	only	in	the	power	of	the	
Signatories/Signers;
c. Any	alteration	in	Electronic	Signatures	that	occur	after	the	signing	time	is	knowable;
d. Any	alteration	in	Electronic	Information	associated	with	the	Electronic	Signatures	after	the	signing	time	is	knowable;
e. There	are	certain	methods	adopted	to	identify	the	identity	of	the	Signatories/Signers;	and
f. There	are	certain	methods	to	demonstrate	that	the	Signatories/Signers	have	given	consent	to	the	associated	
Electronic	Information;
https://www.bu.edu/bucflp/files/2012/01/Law-No.-11-Concerning-Electronic-Information-and-Transactions.pdf
IDSECCONF 2016 CFP 5 24--25 SEP 2016
Positioning	of	National	PKI
• Digital	Signature	in	Law	of	the	Republic	of	Indonesia	No.	11	of	2008	concerning	Electronic	Information	
and	Transactions
• Elucidation	of	Article	11	Paragraph	(1):	
This		Law		grants		recognition		definitely		that	despite		codes,		Electronic		Signatures		have		an	equal	position	to	manual	
signatures	in	general,	with	legal	force	and	legal	effect.	
The		requirements		as		intended		by		this		Article	shall		be		the		requirements		that		minimally		any	Electronic		Signature		
must		satisfy.			This	provision		gives		as		wide		opportunities		as	possible		to		anyone		to		develop		methods,	techniques,		or		
process		for		creating		Electronic	Signatures.
https://www.bu.edu/bucflp/files/2012/01/Law-No.-11-Concerning-Electronic-Information-and-Transactions.pdf
IDSECCONF 2016 CFP 6 24--25 SEP 2016
Positioning	of	National	PKI
• Digital	Signature	is	endorsed	to	strengthen	the	positioning	of	digital	objects	in	legal	aspect
• Digital	Signature	could	be	generated	using	PGP/GPG	system,	but	Indonesia	Government	(c.q.	
Kemkominfo)	and	Republic	of	Korea	(via	Korea	International	Cooperation	Agency,	KOICA)	introduced	
National	RootCA based	on	EJBCA	as	PKI	Platform.
• Lingering	question:
• Why	choose	PKI	instead	of	PGP?
• Does	it	have	unintended	consequences?
• Does	it	protect	our	privacy?
• How	does	the	operational	site,	including	signing	request?
IDSECCONF 2016 CFP 7 24--25 SEP 2016
PKI	and	Cryptography
• PKI	is	mechanism	to	provide	Confidentiality	and	Integrity	(in	C-I-A	triangle)	using	public	key	cryptography	
or	known	as	Asymmetric-key	Cryptography
• Asymmetric-key	Cryptography	ensures	that	the	message	was	encrypted	using	public	key	(that	is	achieved	
the	confidentiality)	and	only	the	person	who	has	the	private	key	could	decrypt	the	message	(hence,	the	
integrity	also	maintained).
• Symmetric-key	Cryptography	only	guarantees	the	message	was	encrypted,	but	unable	to	verify	the	
integrity	of	the	message	since	anyone	who	knows	the	key	would	be	able	to	decrypt	the	message,	alter	
the	message,	and	encrypt	the	message	again.
IDSECCONF 2016 CFP 8 24--25 SEP 2016
Symmetric-key	Cryptography
• What	will	happen	if	C	knows	qA?
A B
qA
Plain	
TextqA
Cipher	
Text
Plain	
Text
Reply	
Text
Cipher	
Text
Reply	
Text qA qA
qAB qAB qA
IDSECCONF 2016 CFP 9 24--25 SEP 2016
N	=	3
• Key space =	{qAB,	qAC,	qBC}	
N	=	5
• Keyspace =	{qAB,	qAC,	qAD,	qAE,	qBC,	qBD,	qBE,	qCD,	
qCE,	qDE}	
Symmetric-key	Cryptography
A
B C
qBC
A
B
C
D E
qAC
qDE
IDSECCONF 2016 CFP 10 24--25 SEP 2016
Symmetric-key	Cryptography
• Problems	in	operational
• Key	revocation	process	is	cumbersome	when	one	key	is	compromised
• Size	of	keyspace in	the	system	increases	in	geometry	progression
• Key Secrecy should be conducted by both parties.	If	either party fails to keep it secret,	both parties
should never use the old key
( )
2
1-´
=
nn
K
IDSECCONF 2016 CFP 11 24--25 SEP 2016
Asymmetric-key	Cryptography
A B
pA
Plain	
TextqA
Cipher	
Text
Plain	
Text
Reply	
Text
Cipher	
Text
Reply	
Text pB qB
IDSECCONF 2016 CFP 12 24--25 SEP 2016
24--25 SEP 2016IDSECCONF 2016 CFP
Asymmetric-key	Cryptography	with	
Digital	Signature
A B
pA
Plain	
Text
qA
Cipher	
Text
Plain	
Text
Reply	
Text
Cipher	
Text
Reply	
Text
pB qB
qBSignature
Hash
SignaturepB
Hashmatch?
Hashing
hashing
qA Signature Signature
Hash
pA
Hash
Hash
Hashing
Hash
match?
Hashing
13
IDSECCONF 2016 CFP 24--25 SEP 2016
Asymmetric-key	Cryptography
• Encrypt data	with Asymmetric-key?
• Are	you nuts?!?
Algorithm
Sign
Operation/s	
Sign	[2]
Operation/s	
RSA	512 17,319.9	 18,723.5	
RSA	1024 5,856.4	 7,196.9	
RSA	2048 905.3	 1,612.9	
RSA	4096 126.4	 154.0	
Algorithm
Verify
Operation/s	
Verify	[2]
Operation/s2	
RSA	512 183,807.3	 235,756.6	
RSA	1024 77,728.0	 107,917.2	
RSA	2048 29,373.6	 35,649.9	
RSA	4096 8,307.4	 9,973.9	
Algorithm Input	in	bytes operations/s	 operations	[2]/s	
AES-128-CBC 16-bytes 7,299,678.7	 8,318,077.0	
AES-128-CBC 64-bytes 2,024,042.7	 2,330,365.0	
AES-128-CBC 256-bytes 503,996.0	 597,138.3	
AES-128-CBC 1024-bytes 129,954.0	 149,161.7	
AES-128-CBC 8192-bytes 15,797.0	 18,749.3	
Tested with OpenSSL 1.0.2g	openssl speed
MacBook	Pro	10,1	Retina	Display	15"	Mid	2012
Intel	Core	i7	3720QM	@	2.6GHz	4	cores
Memory	16GB	DDR3	1600MHz
SSD	512GB	SM512E	SATA	III	6Gbps
Tested with OpenSSL 1.0.2g	openssl speed
HP	zBook 15	G2
Intel	Core	i7	4810MQ	@	2.80GHz	4	cores
Memory	16GB	DDR3	1600MHz
HDD	HGST	HTS721010A9E630	1TB	SATA	III	6Gbps	
7200rpm	32MB	Buffer
14
IDSECCONF 2016 CFP 24--25 SEP 2016
Asymmetric-key	Cryptography	with	
Digital	Signature	with	Symmetric	Key
A B
Plain	
Text
Cipher	
Text
Reply	
Text
Cipher	
Text
Reply	
Text
pB
qB
qBSignature
Hash
SignaturepB
Hashmatch?
Hashing
hashing
qA Signature Signature
Hash
pA
Hash
Hash
Hashing
Hash
match?
Hashing
pA
qA
Plain	
Text
15
Decentralized
• PGP	system allows users to distribute their key to
their correspondents,	e.g.	Distribute via	email,	or
web	page
• It could be also published on PGP	Key Server	such
as	pgp.mit.edu
• MIT	Keyserver does not	guarantee the real	owner
of public key,	it is the user obligation to trust the
ownership of public key
Centralized
• PKI	creates chain of trust,	starts from Root CA
• Once	user trusts the Root CA,	all public keys
signed by Root CA	will be automatically
trusted by user
• Public Key should only be published by
Trusted CA
Asymmetric-Key	Key	Management
IDSECCONF 2016 CFP 16 24--25 SEP 2016
A
B C
D
E
Certificattion
AuthorityA
B C
D
E
CA
CA
CA CA
CA
Asymmetric-Key	Key	Management
IDSECCONF 2016 CFP 17 24--25 SEP 2016
Decentralized Centralized
IDSECCONF 2016 CFP 24--25 SEP 2016
Asymmetric-Key	Signing	Request
• In	order	to be trusted by system in	PKI,	user’s Public Key should be signed by Certification Authority (CA)	that
is under Trusted Root CA	issuance process
• After	public key signed by CA,	it can be used by other party,	either for encryption purpose or for digital	
signature verification.	While the private key is never published and should only be in	party A possession.		
18
AqA
PKCS#10	CSR in	
PEM/DER
pA
Certification	
Authority
CER	in	X.509	format	in	ASN.1	Structure
pA
CA
CA
pCA
Target	Acquired!
• Article	1
• Point	9:	“Electronic		Certificate”	means	a	certificate	in	electronic	nature	that	bears	an	Electronic	Signature and	identity,	
demonstrating	a	status	of	a	legal	subject	of	parties	to		an	Electronic	Transaction	issued	by	
Certification	Service	Providers.	
• Point	10:	“Electronic		Certification		Service		Provider”	means	a	legal	entity that	acts	as	a	reliable	party,	issues	and	audits	
Electronic	Certificates.
• Point	12:	“Electronic		Signature”	means		a		signature		that	contains	Electronic	Information	that	is	attached	to,		associated		
or		linked		with		other		Electronic	Information		that	is	used	for	means	of	verification	and	authentication.	
• Point	13:	“Signatory/Signer”		means		a		legal		subject	associated		or		linked		with		an		Electronic	Signature.	
24--25 SEP 2016IDSECCONF 2016 CFP 19
National	PKI
National	PKI	for	Digital	Signature	only?
• Another	purposes:
• SSL	certificate	for	official	website,
• Secure	Email,	Internet	Banking,	
• e-Taxation,	e-Custom
• e-Commerce,	Cyber	Trading,	e-Banking
• IoT,	FIDO
24--25 SEP 2016IDSECCONF 2016 CFP 20
Source:	Riki Arif Gunawan,	“Digital	Signature	Roadmap,”	presented	at	the	4th
Public	Key	Infrastructure	Awareness	and	EJBCA/TOOLKIT	Seminar,	Jakarta,	Indonesia,	Feb.	29,	2016.
Gain	our	Trust!
• Update	all	Trusted	CA	list	in	OSes
• Microsoft	Trusted	Root	Certificate,	https://technet.microsoft.com/en-us/library/cc751157.aspx
• Apple	Root	Certificate	Program,	https://www.apple.com/certificateauthority/ca_program.html
• Google	Chromium	Projects	with	Root	Certificate	Policy,	https://www.chromium.org/Home/chromium-
security/root-ca-policy
• Mozilla	Firefox	Certificate	Store	with	Mozilla	CA	Certificate	Policy.	https://www.mozilla.org/en-
US/about/governance/policies/security-group/certs/policy/
• Get	audited	based	on	Chartered	Professional	Accountants	of	Canada	(previously:	AICPA/CICA)	WebTrust
Program	for	Certification	Authorities	http://www.webtrust.org/item64428.aspx
24--25 SEP 2016IDSECCONF 2016 CFP 21
Alternate	use	of	National	PKI
• Code	Signing
• Application	Signing
• Library	Signing
• Not	Mobile	App	Signing,	it’s	their	money	J
• SSL/TLS	Certificate
• HTTPS
• FTPS
• VPN	over	SSL/TLS
24--25 SEP 2016IDSECCONF 2016 CFP 22
Friend	or	Foe:	Code	Signing	(1)
• Prevent	unauthorized	modification	of	critical	applications
• Application	Signing
• This	certificate	is	intended	to	protect	applications	being	tampered	in	application	distribution	process.	These	applications	
could	be	application	for	National	ID	(KTP)	registration	process	in	Municipal	Office	(Kantor	Walikota)	or	District	Office	
(Kantor	Kelurahan)	
• Driver/Library	Signing
• This	certificate	is	intended	to	protect	applications	being	tampered	in	application	while	in	operational	routines.	Case	of	
Bangladesh	Heist,	SWIFT	Alliance	Access	has	been	tampered	in	library/driver	level.
24--25 SEP 2016IDSECCONF 2016 CFP 23
Friend	or	Foe:	Code	Signing	(2)
24--25 SEP 2016IDSECCONF 2016 CFP 24
Friend	or	Foe:	Code	Signing	(3)
24--25 SEP 2016IDSECCONF 2016 CFP 25
Friend	or	Foe:	Code	Signing	(4)
24--25 SEP 2016IDSECCONF 2016 CFP 26
Friend	or	Foe:	Code	Signing	(5)
24--25 SEP 2016IDSECCONF 2016 CFP 27
Friend	or	Foe:	SSL/TLS	Certificate
• Alignment	with	PANDI’s	campaign:	“Proud	using	.ID	domain”
• All	.ID	domains	validated,	hence	the	visitors	are	protected	from	visiting	fraudulent	website
• National	Sovereignty,	no	dollar	will	be	sent	out	to	non-Indonesia	Company	overseas
• Another	extra	layer	could	be	added	with	Domain	Validation	(DV)	
24--25 SEP 2016IDSECCONF 2016 CFP 28
Friend	or	Foe:	SSL/TLS	Interceptor	(1)
• HTTPS	inspection	by	intercepting	SSL/TLS	layer
• DPI,	DLP,	IDS/IPS,	Content	Filtering	(!)
• Implements	Transparent	Web	Proxy	in	Network	Access	Point	(NAP)
• Enforces	all	web	browsers	to	use	National	Root	CA	by	applying	HTTP	Strict	Transport	Security	(HSTS)
• Generic	encrypted	traffic	via	SSL/TLS,	no	information	could	be	seen	unless	the	information	below:	
• (i)	source	IP,	(ii)	source	port,	(iii)	destination	IP,	(iv)	destination	port,	and	(v)	protocol	
• Using	SSL/TLS	Interceptor,	more	information	are	visible:	
• (i)	hostname,	(ii)	URI,	(iii)	POST/GET	data
• Will	not	be	working	if	all	clients	or	web	apps	using	Certificate	Pinning
• Think	of	“MITM”	in	National	Scale,	not	just	in	simulated	network,	or	medium	enterprise	network
• Burpsuite in	national	Internet,	if	you	are	on	“proxy”	level
• Dissecting	SSL/TLS	using	wireshark with	National	Private	Key,	for	network	forensics	investigation
24--25 SEP 2016IDSECCONF 2016 CFP 29
24--25 SEP 2016IDSECCONF 2016 CFP 30
Friend	or	Foe:	SSL/TLS	Interceptor	(2)
24--25 SEP 2016IDSECCONF 2016 CFP 31
Friend	or	Foe:	SSL/TLS	Interceptor	(3)
24--25 SEP 2016IDSECCONF 2016 CFP 32
Friend	or	Foe:	SSL/TLS	Interceptor	(4)
24--25 SEP 2016IDSECCONF 2016 CFP 33
Friend	or	Foe:	SSL/TLS	Interceptor	(5)
24--25 SEP 2016IDSECCONF 2016 CFP 34
Friend	or	Foe:	SSL/TLS	Interceptor	(6)
24--25 SEP 2016IDSECCONF 2016 CFP 35
Friend	or	Foe:	SSL/TLS	Interceptor	(7)
24--25 SEP 2016IDSECCONF 2016 CFP 36
Friend	or	Foe:	SSL/TLS	Interceptor	(8)
24--25 SEP 2016IDSECCONF 2016 CFP 37
Friend	or	Foe:	SSL/TLS	Interceptor	(9)
24--25 SEP 2016IDSECCONF 2016 CFP 38
Friend	or	Foe:	SSL/TLS	Interceptor	(10)
24--25 SEP 2016IDSECCONF 2016 CFP 39
Friend	or	Foe:	SSL/TLS	Interceptor	(11)
Friend	or	Foe:	No	Protection	of	Private	key?	(1)
• Great	power	comes	with	the	great	responsibility.	Are	you	responsible	enough	to	handle	it?
• Choosing	of	private	key
• Algorithm	and	Keylength:	RSA	4096?	What	about	cryptographic	power	of	embedded	system?	Yubico YubiKey USB	
perhaps?
• RSA	1024?	SRSLY?	Haven’t	you	play	any	CTF	that	crack	RSA	1024?
• Storage	Security	of	private	key
• Filesystem	only?	Yeah,	right!	Lay	it	on	drive	C:TEMP so	that	everyone	can	access	it.
• PFX	or	P12	format	password	protected?	Prone	to	be	bruteforce,	with	no	limitation	of	trial.
• Don’t	ended	in	Documentary	movie	like	Zero	Days:	“Olympic	Games”	Stuxnet with	Realtek Digital	Signature
• Think	about	things	like	Hardware	Security	Module	(HSM)
24--25 SEP 2016IDSECCONF 2016 CFP 40
Friend	or	Foe:	No	Protection	of	Private	key?	(2)
• HSM
• Personal	and	low	computing	power:	USB
• Private	Key	is	stored	in	specific	partition	of	storage,	equipped	with	low	cryptographic	processor	but	limited	in	USB	Bus	
Speed.
• Requires	password	to	access	the	partition
• Directly	supported	with	Cryptography	API	using	PKCS#11	or	using	specific	driver	for	older	OSes
• Limits	bruteforce.	Locked	after	10	times	consecutive	trial	with	wrong	password
• Dedicated	processor	to	offloading	cryptographic	calculation:	PCI-e	Card
• Similar	with	USB,	but	high	bandwidth	from	Card	to	CPU
• More	powerfull (and	of	course	more	Benjamins):	Network-based	HSM
24--25 SEP 2016IDSECCONF 2016 CFP 41
Friend	or	Foe:	No	Protection	of	Private	key?	(3)
• HSM
• More	powerful	(and	of	course	more	Benjamins):	Network-based	HSM
• Multiple	Layers	of	Access	List
• Requires	HSM	activation	using	specific	USB	token	and	PIN	activation	before	HSM	can	be	accessed	via	network	
• Requires	Certificate	exchange	between	server	and	HSM	to	setup	Network	Trusted	Link	(NTL)	Service,	hence	the	communication	
channel	is	encrypted	with	asymmetric-key	cryptography
• Has	multiple	partitions.	Hence,	requires	PIN	or	password	to	access	intended	partitions
• Has	multiple	key	objects	in	single	partitions.	Hence,	requires	specific	password	to	access	different	key	objects
• Could	offload	the	cryptographic	processing	to	HSM’s	processor	using	provided	API	from	manufacturers,	hence	lowering	
down	the	CPU	load	in	Server	side.	
24--25 SEP 2016IDSECCONF 2016 CFP 42
24--25 SEP 2016IDSECCONF 2016 CFP 43
Friend	or	Foe:	No	Protection	of	Private	key?	(3)
24--25 SEP 2016IDSECCONF 2016 CFP 44
Friend	or	Foe:	No	Protection	of	Private	key?	(4)
24--25 SEP 2016IDSECCONF 2016 CFP 45
Friend	or	Foe:	No	Protection	of	Private	key?	(5)
SafeNet HSM	Network	Based,
24--25 SEP 2016IDSECCONF 2016 CFP 46
Friend	or	Foe:	No	Protection	of	Private	key?	(6)
Questions	that	remain	unanswered
• CA	Hierarchy
• Root	CA	is	maintained	by	Kemkominfo,	while	SubCA is	maintained	by	respective	Ministry
• But,	How	deep	the	level	of	CA?	Too	deep	will	slowing	down	the	process.	Too	shallow	will	jeopardizing	all	chain	
of	trust,	when	SubCA or	even	RootCA’s private	key	is	compromised
• CA	requires	Directory	Services	to	attach	user	information	in	certificate.	
• What	will	the	directory	services	be?	LDAP,	Microsoft	ADDS,	Oracle	Internet	Directory,	Apache	Directory	Server,	
Sun	Java	System	Directory	Server?
• Replicate	or	query	to	http://dukcapil.kemendagri.go.id/ceknik
• What	will	the	private	key	be	for	end-user/citizen?	
• Media?	Don’t	tell	me	the	e-KTP	card.
24--25 SEP 2016IDSECCONF 2016 CFP 47
What Next?
• Strengthen the Implementation and the operational site,	do not	ended up with case like
DigiNortar
• New PKI	with Fast	IDentification Online	(FIDO)	and Enhanced	Privacy	ID	(EPID)
• Blockchain in	PKI	to	enhance	the	chain	of	trust
IDSECCONF 2016 CFP 48 24--25 SEP 2016
“
”
National	Public	Key	Infrastructure:
Friend	or	Foe?
Hand-in-hand	to	make	it	friendly…
24--25 SEP 2016IDSECCONF 2016 CFP 49

More Related Content

What's hot

Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption Razi Rais
 
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...SecuRing
 
Federated and legal identities in industrial and financial applications
Federated and legal identities in industrial and financial applicationsFederated and legal identities in industrial and financial applications
Federated and legal identities in industrial and financial applicationsPeter Waher
 
Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...Peter Waher
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layerdwitigajab
 
Java script and web cryptography (cf.objective)
Java script and web cryptography (cf.objective)Java script and web cryptography (cf.objective)
Java script and web cryptography (cf.objective)ColdFusionConference
 
Deploy a blockchain web-app with Hyperledger Fabric 1.4 - Concepts & Code
Deploy a blockchain web-app with Hyperledger Fabric 1.4 - Concepts & CodeDeploy a blockchain web-app with Hyperledger Fabric 1.4 - Concepts & Code
Deploy a blockchain web-app with Hyperledger Fabric 1.4 - Concepts & CodeHorea Porutiu
 
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment Sergey Gordeychik
 
Cryptography In The Browser Using JavaScript
Cryptography In The Browser Using JavaScriptCryptography In The Browser Using JavaScript
Cryptography In The Browser Using JavaScriptbarysteyn
 
Practical Cryptography and Security Concepts for Developers
Practical Cryptography and Security Concepts for DevelopersPractical Cryptography and Security Concepts for Developers
Practical Cryptography and Security Concepts for DevelopersGökhan Şengün
 
Hyperledger fabric 20180528
Hyperledger fabric 20180528Hyperledger fabric 20180528
Hyperledger fabric 20180528Arnaud Le Hors
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...Peter Waher
 
Smart contracts for certification of smart devices
Smart contracts for certification of smart devicesSmart contracts for certification of smart devices
Smart contracts for certification of smart devicesPeter Waher
 
Bitmark and Hyperledger Workshop: the Digital Assets and Property
Bitmark and Hyperledger Workshop: the Digital Assets and PropertyBitmark and Hyperledger Workshop: the Digital Assets and Property
Bitmark and Hyperledger Workshop: the Digital Assets and PropertyJollen Chen
 
Privacy-preserving techniques using zero knowledge proof in public Ethereum
Privacy-preserving techniques using zero knowledge proof in public EthereumPrivacy-preserving techniques using zero knowledge proof in public Ethereum
Privacy-preserving techniques using zero knowledge proof in public EthereumNagib Aouini
 
Hyperledger Fabric & Composer
Hyperledger Fabric & Composer Hyperledger Fabric & Composer
Hyperledger Fabric & Composer Dr. Ketan Parmar
 
FIWARE Wednesday Webinars - Short Term History within Smart Systems
FIWARE Wednesday Webinars - Short Term History within Smart SystemsFIWARE Wednesday Webinars - Short Term History within Smart Systems
FIWARE Wednesday Webinars - Short Term History within Smart SystemsFIWARE
 
Securing TodoMVC Using the Web Cryptography API
Securing TodoMVC Using the Web Cryptography APISecuring TodoMVC Using the Web Cryptography API
Securing TodoMVC Using the Web Cryptography APIKevin Hakanson
 

What's hot (20)

Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption
 
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
 
Federated and legal identities in industrial and financial applications
Federated and legal identities in industrial and financial applicationsFederated and legal identities in industrial and financial applications
Federated and legal identities in industrial and financial applications
 
Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Java script and web cryptography (cf.objective)
Java script and web cryptography (cf.objective)Java script and web cryptography (cf.objective)
Java script and web cryptography (cf.objective)
 
Deploy a blockchain web-app with Hyperledger Fabric 1.4 - Concepts & Code
Deploy a blockchain web-app with Hyperledger Fabric 1.4 - Concepts & CodeDeploy a blockchain web-app with Hyperledger Fabric 1.4 - Concepts & Code
Deploy a blockchain web-app with Hyperledger Fabric 1.4 - Concepts & Code
 
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
 
Cryptography In The Browser Using JavaScript
Cryptography In The Browser Using JavaScriptCryptography In The Browser Using JavaScript
Cryptography In The Browser Using JavaScript
 
JWTs and JOSE in a flash
JWTs and JOSE in a flashJWTs and JOSE in a flash
JWTs and JOSE in a flash
 
Ppsp icassp17v10
Ppsp icassp17v10Ppsp icassp17v10
Ppsp icassp17v10
 
Practical Cryptography and Security Concepts for Developers
Practical Cryptography and Security Concepts for DevelopersPractical Cryptography and Security Concepts for Developers
Practical Cryptography and Security Concepts for Developers
 
Hyperledger fabric 20180528
Hyperledger fabric 20180528Hyperledger fabric 20180528
Hyperledger fabric 20180528
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
 
Smart contracts for certification of smart devices
Smart contracts for certification of smart devicesSmart contracts for certification of smart devices
Smart contracts for certification of smart devices
 
Bitmark and Hyperledger Workshop: the Digital Assets and Property
Bitmark and Hyperledger Workshop: the Digital Assets and PropertyBitmark and Hyperledger Workshop: the Digital Assets and Property
Bitmark and Hyperledger Workshop: the Digital Assets and Property
 
Privacy-preserving techniques using zero knowledge proof in public Ethereum
Privacy-preserving techniques using zero knowledge proof in public EthereumPrivacy-preserving techniques using zero knowledge proof in public Ethereum
Privacy-preserving techniques using zero knowledge proof in public Ethereum
 
Hyperledger Fabric & Composer
Hyperledger Fabric & Composer Hyperledger Fabric & Composer
Hyperledger Fabric & Composer
 
FIWARE Wednesday Webinars - Short Term History within Smart Systems
FIWARE Wednesday Webinars - Short Term History within Smart SystemsFIWARE Wednesday Webinars - Short Term History within Smart Systems
FIWARE Wednesday Webinars - Short Term History within Smart Systems
 
Securing TodoMVC Using the Web Cryptography API
Securing TodoMVC Using the Web Cryptography APISecuring TodoMVC Using the Web Cryptography API
Securing TodoMVC Using the Web Cryptography API
 

Viewers also liked

Keaslian Dokumen Digital
Keaslian Dokumen DigitalKeaslian Dokumen Digital
Keaslian Dokumen Digitalbudi rahardjo
 
Introduction to Social Engineering
Introduction to Social EngineeringIntroduction to Social Engineering
Introduction to Social EngineeringMuhammad Ridwan
 
Keynote - Jim Geovedi - professional-hackers
Keynote - Jim Geovedi - professional-hackersKeynote - Jim Geovedi - professional-hackers
Keynote - Jim Geovedi - professional-hackersidsecconf
 
Hacking a Bird in the Sky: Hijacking VSAT Connection
Hacking a Bird in the Sky: Hijacking VSAT ConnectionHacking a Bird in the Sky: Hijacking VSAT Connection
Hacking a Bird in the Sky: Hijacking VSAT ConnectionJim Geovedi
 
Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...
Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...
Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...idsecconf
 
Agung Nugraha - “Layanan Certification Authority (CA), Document Signing and V...
Agung Nugraha - “Layanan Certification Authority (CA), Document Signing and V...Agung Nugraha - “Layanan Certification Authority (CA), Document Signing and V...
Agung Nugraha - “Layanan Certification Authority (CA), Document Signing and V...idsecconf
 
theday, windows hacking with commandline
theday, windows hacking with commandlinetheday, windows hacking with commandline
theday, windows hacking with commandlineidsecconf
 
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"idsecconf
 
Muhammad Abrar Istiadi - “How to hack #IDSECCONF2016 ctf online challenge"
Muhammad Abrar Istiadi - “How to hack #IDSECCONF2016 ctf online challenge"Muhammad Abrar Istiadi - “How to hack #IDSECCONF2016 ctf online challenge"
Muhammad Abrar Istiadi - “How to hack #IDSECCONF2016 ctf online challenge"idsecconf
 

Viewers also liked (11)

Keaslian Dokumen Digital
Keaslian Dokumen DigitalKeaslian Dokumen Digital
Keaslian Dokumen Digital
 
Introduction to Social Engineering
Introduction to Social EngineeringIntroduction to Social Engineering
Introduction to Social Engineering
 
Keynote - Jim Geovedi - professional-hackers
Keynote - Jim Geovedi - professional-hackersKeynote - Jim Geovedi - professional-hackers
Keynote - Jim Geovedi - professional-hackers
 
Hacking a Bird in the Sky: Hijacking VSAT Connection
Hacking a Bird in the Sky: Hijacking VSAT ConnectionHacking a Bird in the Sky: Hijacking VSAT Connection
Hacking a Bird in the Sky: Hijacking VSAT Connection
 
Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...
Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...
Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...
 
Agung Nugraha - “Layanan Certification Authority (CA), Document Signing and V...
Agung Nugraha - “Layanan Certification Authority (CA), Document Signing and V...Agung Nugraha - “Layanan Certification Authority (CA), Document Signing and V...
Agung Nugraha - “Layanan Certification Authority (CA), Document Signing and V...
 
theday, windows hacking with commandline
theday, windows hacking with commandlinetheday, windows hacking with commandline
theday, windows hacking with commandline
 
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
 
Mikrotik metarouter
Mikrotik metarouterMikrotik metarouter
Mikrotik metarouter
 
Muhammad Abrar Istiadi - “How to hack #IDSECCONF2016 ctf online challenge"
Muhammad Abrar Istiadi - “How to hack #IDSECCONF2016 ctf online challenge"Muhammad Abrar Istiadi - “How to hack #IDSECCONF2016 ctf online challenge"
Muhammad Abrar Istiadi - “How to hack #IDSECCONF2016 ctf online challenge"
 
IPv6 on Mikrotik
IPv6 on MikrotikIPv6 on Mikrotik
IPv6 on Mikrotik
 

Similar to B.Noviansyah - National Public Key Infrastructure: Friend or Foe?

Analyzing 1.2 Million Network Packets per Second in Real-time
Analyzing 1.2 Million Network Packets per Second in Real-timeAnalyzing 1.2 Million Network Packets per Second in Real-time
Analyzing 1.2 Million Network Packets per Second in Real-timeDataWorks Summit
 
Serverless survival kit
Serverless survival kitServerless survival kit
Serverless survival kitSteve Houël
 
DevOps and Regulatory Compliance—Like Oil and Water or Peanut Butter and Jelly?
DevOps and Regulatory Compliance—Like Oil and Water or Peanut Butter and Jelly?DevOps and Regulatory Compliance—Like Oil and Water or Peanut Butter and Jelly?
DevOps and Regulatory Compliance—Like Oil and Water or Peanut Butter and Jelly?TechWell
 
Open Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan QuayleOpen Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan QuayleAlan Quayle
 
Digitální transformace: zabezpečení agilních prostředí
Digitální transformace: zabezpečení agilních prostředíDigitální transformace: zabezpečení agilních prostředí
Digitální transformace: zabezpečení agilních prostředíMarketingArrowECS_CZ
 
Portland Splunk User Group May 2020
Portland Splunk User Group May 2020 Portland Splunk User Group May 2020
Portland Splunk User Group May 2020 Amanda Richardson
 
NodeJS Serverless backends for your frontends
NodeJS Serverless backends for your frontendsNodeJS Serverless backends for your frontends
NodeJS Serverless backends for your frontendsCarlos Santana
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
MongoDB.local Dallas 2019: MongoDB and Spark
MongoDB.local Dallas 2019: MongoDB and SparkMongoDB.local Dallas 2019: MongoDB and Spark
MongoDB.local Dallas 2019: MongoDB and SparkMongoDB
 
Building powerful apps with ArangoDB & KeyLines
Building powerful apps with ArangoDB & KeyLinesBuilding powerful apps with ArangoDB & KeyLines
Building powerful apps with ArangoDB & KeyLinesCambridge Intelligence
 
DevSecOps - Colocando segurança na esteira
DevSecOps - Colocando segurança na esteiraDevSecOps - Colocando segurança na esteira
DevSecOps - Colocando segurança na esteiraDiego Gabriel Cardoso
 
R, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
R, Spark, Tensorflow, H20.ai Applied to Streaming AnalyticsR, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
R, Spark, Tensorflow, H20.ai Applied to Streaming AnalyticsKai Wähner
 
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...Codemotion
 

Similar to B.Noviansyah - National Public Key Infrastructure: Friend or Foe? (20)

Analyzing 1.2 Million Network Packets per Second in Real-time
Analyzing 1.2 Million Network Packets per Second in Real-timeAnalyzing 1.2 Million Network Packets per Second in Real-time
Analyzing 1.2 Million Network Packets per Second in Real-time
 
6 Myths about IPv6
6 Myths about IPv66 Myths about IPv6
6 Myths about IPv6
 
Serverless survival kit
Serverless survival kitServerless survival kit
Serverless survival kit
 
How Hadoop Makes the Natixis Pack More Efficient
How Hadoop Makes the Natixis Pack More Efficient How Hadoop Makes the Natixis Pack More Efficient
How Hadoop Makes the Natixis Pack More Efficient
 
Secure Code Review 101
Secure Code Review 101Secure Code Review 101
Secure Code Review 101
 
Tech w22
Tech w22Tech w22
Tech w22
 
DevOps and Regulatory Compliance—Like Oil and Water or Peanut Butter and Jelly?
DevOps and Regulatory Compliance—Like Oil and Water or Peanut Butter and Jelly?DevOps and Regulatory Compliance—Like Oil and Water or Peanut Butter and Jelly?
DevOps and Regulatory Compliance—Like Oil and Water or Peanut Butter and Jelly?
 
CV | Michele Spagnuolo
CV | Michele SpagnuoloCV | Michele Spagnuolo
CV | Michele Spagnuolo
 
Open Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan QuayleOpen Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan Quayle
 
Digitální transformace: zabezpečení agilních prostředí
Digitální transformace: zabezpečení agilních prostředíDigitální transformace: zabezpečení agilních prostředí
Digitální transformace: zabezpečení agilních prostředí
 
Portland Splunk User Group May 2020
Portland Splunk User Group May 2020 Portland Splunk User Group May 2020
Portland Splunk User Group May 2020
 
NodeJS Serverless backends for your frontends
NodeJS Serverless backends for your frontendsNodeJS Serverless backends for your frontends
NodeJS Serverless backends for your frontends
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
MongoDB and Spark
MongoDB and SparkMongoDB and Spark
MongoDB and Spark
 
MongoDB.local Dallas 2019: MongoDB and Spark
MongoDB.local Dallas 2019: MongoDB and SparkMongoDB.local Dallas 2019: MongoDB and Spark
MongoDB.local Dallas 2019: MongoDB and Spark
 
Building powerful apps with ArangoDB & KeyLines
Building powerful apps with ArangoDB & KeyLinesBuilding powerful apps with ArangoDB & KeyLines
Building powerful apps with ArangoDB & KeyLines
 
Cisco Learning Pathway
Cisco Learning PathwayCisco Learning Pathway
Cisco Learning Pathway
 
DevSecOps - Colocando segurança na esteira
DevSecOps - Colocando segurança na esteiraDevSecOps - Colocando segurança na esteira
DevSecOps - Colocando segurança na esteira
 
R, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
R, Spark, Tensorflow, H20.ai Applied to Streaming AnalyticsR, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
R, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
 
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
How to Leverage Machine Learning (R, Hadoop, Spark, H2O) for Real Time Proces...
 

More from idsecconf

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfidsecconf
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...idsecconf
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfRama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfidsecconf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...idsecconf
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfidsecconf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...idsecconf
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfidsecconf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...idsecconf
 
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika TriwidadaPerkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidadaidsecconf
 
Pentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - AbdullahPentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - Abdullahidsecconf
 
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaHacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaidsecconf
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...idsecconf
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwiantoidsecconf
 

More from idsecconf (20)

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfRama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika TriwidadaPerkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
 
Pentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - AbdullahPentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - Abdullah
 
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaHacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
 

Recently uploaded

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 

B.Noviansyah - National Public Key Infrastructure: Friend or Foe?