Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.

Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.

    SlideShare
  • Slideshare-64x64 Home
  • Explore
  • Search
    • You
  • Upload
  • Login
  • Signup
  • Home
  • Explore
×
×
×
×
×
×

CODE BLUE

CODE BLUE
  • Following Follow   Processing…
  • 237 SlideShares
  • 277 Followers
  • 0 Clipboards

Modal header

One fine body…

    • Japan
  • Industry Presentations / Communications
  • Website www.codeblue.jp/
  • About - International Security Conference in Tokyo - World leading security researchers will come together for this unique international conference in Tokyo. At this conference, CODE BLUE plan to aggregate a wide range of innovative and creative research topics and presentations all aspects of information security. CODE BLUE look forward on this conference activities that will bring together domestic and international researchers, bridge research with industry and cultivate information security personnel who can take an active role on a global scale.
TwitterFacebook
Followers (277)
  • NISHIHARA Shota
  • Seonghwan Jeon
  • ssuser7f1970
  • ryslefqh
  • WEICHEKAO2
  • Meir Yedidia
Following (0)

Not following anyone yet

Tags (199)

apt automotive security binary analysis cb16 cb19 code blue code blue 2017 codeblue dalvik embedded exploits forensic fuzzing hardware iot kernel malware national security network osx reverse engineering security u24 vulnerability web security xss more…

0day adobe ai amsi android android kernel anti-malware api appsec apt atm auto exploit auto security system auto vul scan automation automotive security backdoor binaly analysis binary binary analysis bluetooth bot botnet buffer overflow bug bounty bug hunter cb16 cb18 cb19 celil unuver china chris eagle chris valasek citadel client fingerprinting code blue code blue 2017 codeblue cryptanalysis crypto ctf current status cyber grand challenge (cgc) dai shimogaito dalvik data-flow analysis debug stub debugger devops digital forensics investigation distoributed distributed dns e-estonia e-state education efi embedded espionage european union europen union exploit exploit development exploits fifefox firefox forensic forensics future countermeasure future countermeasures fuzzing fuzzy hash gc root hacking hacking tool hardware hardware control hdd disaster recovery html5 http/2 ida pro ids igor skochinsky immune system immunesystem incident response industrial security information security innovation intel management engine internet security ios iot jailbreak javascript jeff moss kenji toda kernel keynote libinjection linux linux security live variable analysis local priviledge escalating mac machine learning malware masaaki chida master key medical devices memory leak mitm mobile monitor attackers activity msoffice national security network network security networked home appliances networking with home electronics neutralize nfc nick galbreath o-checker obfuscation osx phishing police power shell protocol smuggling public health security public private relationship public-private relationship remote debug remote exploits reverse engineering risk management root exploit rootkit sandbox sbd scada scanner security security barrier device security evaluation seok ha lee seok-ha lee sf side channel attack singularity singurarity smart auto mobile smart tv smartgrid sns software protection software testing sqli ssrf static analysis static code analysis targeted attack tomoyuki shigemori u20 u24 u25 ukraine virtualization vmware vpn vulnerability vulnerability detection vulnerability hunt vulnerability research web web application security web security webos forensics wh1ant whitebox cryptography windows windows 10 wireless xss yoshihiro horibe you nakatsuru yuhei ootsubo yuhei otsubo yukihisa horibe yuu nakatsuru zero-day market ニック・ガルブレス ネットワーク家電 堀部千壽 大坪雄平 標的型攻撃 自動車セキュリティ 重森友行 …less

Tweets
  • English
  • Español
  • Português
  • Français
  • Deutsch
  • About
  • Developers & API
  • Blog
  • Terms
  • Privacy
  • Copyright
  • Support
RSS Feeds