SlideShare a Scribd company logo
HACKING OXIMETER UNTUK
MEMBANTU PASIEN COVID19 DI
INDONESIA
RYAN FABELLA
Tertinggi saat juli - agustus 2021
Relawan IT untuk provinsi jawa timur – pengolahan data
Bot WA untuk
- informasi sebaran covid19
- peningkatan ketertiban untuk laporan ke pihak keamanan
Ryan fabella
bisnis software development
omaON - IOT smarthome
LATAR BELAKANG
•Alat oximeter telemetry yang ada mahal
•Alat dipasaran presisi cukup diterima namun hanya bisa dilihat
langsung ke pasien
•Tingkat penularan COVID19 dari pasien ke tenaga kesehatan
meningkat
•karena lama waktu monitoring
•Dokumentasi tiap waktu tidak ada
•Notifikasi terhadap kondisi menurun tidak ada
•Dana untuk peralatan COVID19 terbatas
SOLUSINYA
Lebih banyak pasien yang bisa dimonitoring
Rumah sakit lapangan, pemantauan mandiri per RT/RW
ALAT – ALAT ELEKTRONIK TERKAIT PENANGAN
COVID PERSONAL
tensimeter
oximeter ventilator
OXIMETER
Oximeter (pulse oximeter) adalah alat pengukur kadar oksigen dalam
darah. Alat ini penting untuk mengukur oksigen dalam tubuh yang
apabila kurang umumnya tidak menimbulkan gejala. Padahal, kondisi
tersebut sangat berbahaya dan mengancam nyawa bila tidak segera
ditangani. Oleh karena itu, penting untuk selalu memantau kadar oksigen
dalam tubuh, terutama bagi seseorang yang dinyatakan positif COVID-
19 dan sedang menjalani isolasi mandiri.
Jenisnya
- tanpa integrasi device lain
- Bluetooth max 10 m
Dua – duanya tidak bisa kirim jarak jauh 200
-500 meter
TEARDOWN OXIMETER
pulse oximeter tipe C101H1
TEARDOWN OXIMETER
pulse oximeter tipe lk88
UART DEBUGING
USB TTL Oximeter
RX TX
TX RX
GND GND
DEBUGING
Sop2 = SpO2 ~ kadar saturasi O2.
PR = detak jantung per menit.
Syarat digunakan microcontroller
- Gak ada battrei limitation
- Menggunakan protocol mqtt
- Dimensinya kecil
https://www.researchgate.net/figure/Respective-advantages-of-Sigfox-LoRa-and-NB-
IoT-in-terms-of-IoT-factors_fig3_322018958
MICROCONTROLLER DIPASARAN
PINOUT WEMOS
Gabungin semua peralatan
ARSITEKTUR DIAGRAM
Oximeter
Internet /
intranet
MQTT broker
MQTT
subscriber
MQTT
subscriber
Gateway
Wemos D1
MQTT
subscriber
Wifi router
SOFTWARE YANG DIPAKAI
• Mqtt mosquito
• Esp8266Wifi module
• WiFiManager module
• WiFiClientSecure module
• Arduino client for MQTT
• MQTT dash
• MQTT explorer
• Arduiono editor
Code
https://github.com/natrya/oximeter-mqtt
DICOBA KIRIM PUBLISH
MENGGUNAKAN MQTT DASH UNTUK
MONITORING JARAK JAUH PASIEN
LEBIH ADVANCE MENGGUNAKAN GRAFANA -
INFLUXDB
https://www.influxdata.com/blog/monitoring-a-pulse-oximeter-with-influxdb/
LEBIH JAUH LAGI
Tidak perlu solder2 dengan oximeter Bluetooth kemudian data di kirim ke mqtt
broker
Andreas Spiess
BLE Oximeter Hack with ESP32 for COVID-19 Projects
https://www.youtube.com/watch?v=FIVIPHrAuAI
SCANNING DENGAN NRF CONNECT
ARSITEKTUR DIAGRAM OXIMETER BLUETOOTH
Oximeter
bluetooth
Internet /
intranet
MQTT broker
MQTT
subscriber
MQTT
subscriber
Gateway
esp32
bluetooth
MQTT
subscriber
Wifi router
TERIMA KASIH

More Related Content

What's hot

PRESENTASI CYBERSECURITY REKTOR
PRESENTASI CYBERSECURITY REKTORPRESENTASI CYBERSECURITY REKTOR
PRESENTASI CYBERSECURITY REKTOR
Walid Umar
 
Makalah cybercrime & cyber law
Makalah cybercrime & cyber lawMakalah cybercrime & cyber law
Makalah cybercrime & cyber lawSusyapriyani
 
Pertemuan09 virus,trojandanworm
Pertemuan09 virus,trojandanwormPertemuan09 virus,trojandanworm
Pertemuan09 virus,trojandanwormRoziq Bahtiar
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
idsecconf
 
OSMC 2021 | SNMP Monitoring mit Prometheus / OIDs dynamisch auswählen und im ...
OSMC 2021 | SNMP Monitoring mit Prometheus / OIDs dynamisch auswählen und im ...OSMC 2021 | SNMP Monitoring mit Prometheus / OIDs dynamisch auswählen und im ...
OSMC 2021 | SNMP Monitoring mit Prometheus / OIDs dynamisch auswählen und im ...
NETWAYS
 
Bluetooth Hacking: Cracking the PIN and Repairing Attack
Bluetooth Hacking: Cracking the PIN and Repairing AttackBluetooth Hacking: Cracking the PIN and Repairing Attack
Bluetooth Hacking: Cracking the PIN and Repairing Attack
Rajeev Chauhan
 
Jim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for CybersecurityJim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for Cybersecurity
idsecconf
 
01a pengenalan keamanan jaringan upload
01a pengenalan keamanan jaringan upload01a pengenalan keamanan jaringan upload
01a pengenalan keamanan jaringan upload
Setia Juli Irzal Ismail
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
FIDO Alliance
 
Cryptography
CryptographyCryptography
Cryptography
amiable_indian
 
Duo Security
Duo Security Duo Security
Duo Security
Amy Shah
 
HowYourAPIBeMyAPI
HowYourAPIBeMyAPIHowYourAPIBeMyAPI
HowYourAPIBeMyAPI
Jie Liau
 
Chapter 5 firewall
Chapter 5 firewallChapter 5 firewall
Chapter 5 firewall
Setia Juli Irzal Ismail
 
470529548-3-10-Konfigurasi-Ektensi-Dan-Dial-Plan-Server-Softswitch-pptx.pptx
470529548-3-10-Konfigurasi-Ektensi-Dan-Dial-Plan-Server-Softswitch-pptx.pptx470529548-3-10-Konfigurasi-Ektensi-Dan-Dial-Plan-Server-Softswitch-pptx.pptx
470529548-3-10-Konfigurasi-Ektensi-Dan-Dial-Plan-Server-Softswitch-pptx.pptx
ImamPethak
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
FIDO Alliance
 
DEF CON 23: Internet of Things: Hacking 14 Devices
DEF CON 23: Internet of Things: Hacking 14 DevicesDEF CON 23: Internet of Things: Hacking 14 Devices
DEF CON 23: Internet of Things: Hacking 14 Devices
Synack
 
Penetration Testing Report
Penetration Testing ReportPenetration Testing Report
Penetration Testing Report
Aman Srivastava
 
B wapp – bee bug – installation
B wapp – bee bug – installationB wapp – bee bug – installation
B wapp – bee bug – installation
Ronan Dunne, CEH, SSCP
 
Pentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - AbdullahPentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - Abdullah
idsecconf
 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For Authentication
Vittorio Giovara
 

What's hot (20)

PRESENTASI CYBERSECURITY REKTOR
PRESENTASI CYBERSECURITY REKTORPRESENTASI CYBERSECURITY REKTOR
PRESENTASI CYBERSECURITY REKTOR
 
Makalah cybercrime & cyber law
Makalah cybercrime & cyber lawMakalah cybercrime & cyber law
Makalah cybercrime & cyber law
 
Pertemuan09 virus,trojandanworm
Pertemuan09 virus,trojandanwormPertemuan09 virus,trojandanworm
Pertemuan09 virus,trojandanworm
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
 
OSMC 2021 | SNMP Monitoring mit Prometheus / OIDs dynamisch auswählen und im ...
OSMC 2021 | SNMP Monitoring mit Prometheus / OIDs dynamisch auswählen und im ...OSMC 2021 | SNMP Monitoring mit Prometheus / OIDs dynamisch auswählen und im ...
OSMC 2021 | SNMP Monitoring mit Prometheus / OIDs dynamisch auswählen und im ...
 
Bluetooth Hacking: Cracking the PIN and Repairing Attack
Bluetooth Hacking: Cracking the PIN and Repairing AttackBluetooth Hacking: Cracking the PIN and Repairing Attack
Bluetooth Hacking: Cracking the PIN and Repairing Attack
 
Jim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for CybersecurityJim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for Cybersecurity
 
01a pengenalan keamanan jaringan upload
01a pengenalan keamanan jaringan upload01a pengenalan keamanan jaringan upload
01a pengenalan keamanan jaringan upload
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Duo Security
Duo Security Duo Security
Duo Security
 
HowYourAPIBeMyAPI
HowYourAPIBeMyAPIHowYourAPIBeMyAPI
HowYourAPIBeMyAPI
 
Chapter 5 firewall
Chapter 5 firewallChapter 5 firewall
Chapter 5 firewall
 
470529548-3-10-Konfigurasi-Ektensi-Dan-Dial-Plan-Server-Softswitch-pptx.pptx
470529548-3-10-Konfigurasi-Ektensi-Dan-Dial-Plan-Server-Softswitch-pptx.pptx470529548-3-10-Konfigurasi-Ektensi-Dan-Dial-Plan-Server-Softswitch-pptx.pptx
470529548-3-10-Konfigurasi-Ektensi-Dan-Dial-Plan-Server-Softswitch-pptx.pptx
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
 
DEF CON 23: Internet of Things: Hacking 14 Devices
DEF CON 23: Internet of Things: Hacking 14 DevicesDEF CON 23: Internet of Things: Hacking 14 Devices
DEF CON 23: Internet of Things: Hacking 14 Devices
 
Penetration Testing Report
Penetration Testing ReportPenetration Testing Report
Penetration Testing Report
 
B wapp – bee bug – installation
B wapp – bee bug – installationB wapp – bee bug – installation
B wapp – bee bug – installation
 
Pentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - AbdullahPentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - Abdullah
 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For Authentication
 

Similar to Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella

Mobile Adhoc Network dan Wireless Sensor Network
Mobile Adhoc Network dan Wireless Sensor NetworkMobile Adhoc Network dan Wireless Sensor Network
Mobile Adhoc Network dan Wireless Sensor Network
Arif Setiawan
 
Publikasi 08.01.2392
Publikasi 08.01.2392Publikasi 08.01.2392
Publikasi 08.01.2392Rahman Malang
 
Makalah jarkom
Makalah jarkom Makalah jarkom
Makalah jarkom
bagusprasetyaap
 
Tugas 2
Tugas 2Tugas 2
Tugas 2
alfarezky222
 
IR THERMOMETER 62 MAX
IR THERMOMETER 62 MAXIR THERMOMETER 62 MAX
IR THERMOMETER 62 MAX
Prizla MarethaSaputri
 
Sistem Kendali suhu ruangan dengan pid backward difference berbasis arduino, ...
Sistem Kendali suhu ruangan dengan pid backward difference berbasis arduino, ...Sistem Kendali suhu ruangan dengan pid backward difference berbasis arduino, ...
Sistem Kendali suhu ruangan dengan pid backward difference berbasis arduino, ...
kun_aldi
 
Tugas jurnal basindo rian
Tugas jurnal basindo rianTugas jurnal basindo rian
Tugas jurnal basindo rianMuhamad Iqbal
 
16809 kelompok 4
16809 kelompok 416809 kelompok 4
16809 kelompok 4
IhsanSalman4
 
16809 kelompok 4
16809 kelompok 416809 kelompok 4
16809 kelompok 4
Nanda Fauzi P
 
Mengukur Ketinggian dan suhu Pada akuarium Berbasis Arduino
Mengukur Ketinggian dan suhu Pada akuarium Berbasis ArduinoMengukur Ketinggian dan suhu Pada akuarium Berbasis Arduino
Mengukur Ketinggian dan suhu Pada akuarium Berbasis Arduino
fitri pratiwi
 
Kelompok 4- Alat ukur temperatur dan ketinggian air berbasis arduino
Kelompok 4- Alat ukur temperatur dan ketinggian air berbasis arduinoKelompok 4- Alat ukur temperatur dan ketinggian air berbasis arduino
Kelompok 4- Alat ukur temperatur dan ketinggian air berbasis arduino
SyifaHayat
 
Revitalia Purba
Revitalia PurbaRevitalia Purba
Revitalia Purba
Revitalia Purba
 
SMART WASTE (hospital safety box monitoring) di RSU HERMINA ARCAMANIK
SMART WASTE (hospital safety box monitoring) di RSU HERMINA ARCAMANIKSMART WASTE (hospital safety box monitoring) di RSU HERMINA ARCAMANIK
SMART WASTE (hospital safety box monitoring) di RSU HERMINA ARCAMANIK
Gani Amanda Abdulah
 
MAKALAH_SCADA.docx
MAKALAH_SCADA.docxMAKALAH_SCADA.docx
MAKALAH_SCADA.docx
sintia65
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5
ryanshardyanto
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5
Ulfah Hasanah
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5
Annisa Pramudhita
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5
ryanshardyanto
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5
asepsuher
 

Similar to Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella (20)

Mobile Adhoc Network dan Wireless Sensor Network
Mobile Adhoc Network dan Wireless Sensor NetworkMobile Adhoc Network dan Wireless Sensor Network
Mobile Adhoc Network dan Wireless Sensor Network
 
Publikasi 08.01.2392
Publikasi 08.01.2392Publikasi 08.01.2392
Publikasi 08.01.2392
 
Makalah jarkom
Makalah jarkom Makalah jarkom
Makalah jarkom
 
Tugas 2
Tugas 2Tugas 2
Tugas 2
 
IR THERMOMETER 62 MAX
IR THERMOMETER 62 MAXIR THERMOMETER 62 MAX
IR THERMOMETER 62 MAX
 
Sistem Kendali suhu ruangan dengan pid backward difference berbasis arduino, ...
Sistem Kendali suhu ruangan dengan pid backward difference berbasis arduino, ...Sistem Kendali suhu ruangan dengan pid backward difference berbasis arduino, ...
Sistem Kendali suhu ruangan dengan pid backward difference berbasis arduino, ...
 
Tugas jurnal basindo rian
Tugas jurnal basindo rianTugas jurnal basindo rian
Tugas jurnal basindo rian
 
IoT Pertemuan 1.pptx
IoT Pertemuan 1.pptxIoT Pertemuan 1.pptx
IoT Pertemuan 1.pptx
 
16809 kelompok 4
16809 kelompok 416809 kelompok 4
16809 kelompok 4
 
16809 kelompok 4
16809 kelompok 416809 kelompok 4
16809 kelompok 4
 
Mengukur Ketinggian dan suhu Pada akuarium Berbasis Arduino
Mengukur Ketinggian dan suhu Pada akuarium Berbasis ArduinoMengukur Ketinggian dan suhu Pada akuarium Berbasis Arduino
Mengukur Ketinggian dan suhu Pada akuarium Berbasis Arduino
 
Kelompok 4- Alat ukur temperatur dan ketinggian air berbasis arduino
Kelompok 4- Alat ukur temperatur dan ketinggian air berbasis arduinoKelompok 4- Alat ukur temperatur dan ketinggian air berbasis arduino
Kelompok 4- Alat ukur temperatur dan ketinggian air berbasis arduino
 
Revitalia Purba
Revitalia PurbaRevitalia Purba
Revitalia Purba
 
SMART WASTE (hospital safety box monitoring) di RSU HERMINA ARCAMANIK
SMART WASTE (hospital safety box monitoring) di RSU HERMINA ARCAMANIKSMART WASTE (hospital safety box monitoring) di RSU HERMINA ARCAMANIK
SMART WASTE (hospital safety box monitoring) di RSU HERMINA ARCAMANIK
 
MAKALAH_SCADA.docx
MAKALAH_SCADA.docxMAKALAH_SCADA.docx
MAKALAH_SCADA.docx
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5
 
Presentasi instumen kelompok 5
Presentasi instumen kelompok 5Presentasi instumen kelompok 5
Presentasi instumen kelompok 5
 

More from idsecconf

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
idsecconf
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfRama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
idsecconf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
idsecconf
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
idsecconf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
idsecconf
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdf
idsecconf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
idsecconf
 
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika TriwidadaPerkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
idsecconf
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
idsecconf
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
idsecconf
 
Stream crime
Stream crime Stream crime
Stream crime
idsecconf
 
(Paper) Mips botnet worm with open wrt sdk toolchains
(Paper) Mips botnet worm with open wrt sdk toolchains(Paper) Mips botnet worm with open wrt sdk toolchains
(Paper) Mips botnet worm with open wrt sdk toolchains
idsecconf
 
Mips router targeted worm botnet
Mips router targeted worm botnetMips router targeted worm botnet
Mips router targeted worm botnet
idsecconf
 

More from idsecconf (20)

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfRama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika TriwidadaPerkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
 
Stream crime
Stream crime Stream crime
Stream crime
 
(Paper) Mips botnet worm with open wrt sdk toolchains
(Paper) Mips botnet worm with open wrt sdk toolchains(Paper) Mips botnet worm with open wrt sdk toolchains
(Paper) Mips botnet worm with open wrt sdk toolchains
 
Mips router targeted worm botnet
Mips router targeted worm botnetMips router targeted worm botnet
Mips router targeted worm botnet
 

Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella