CODE BLUE
File List
- CODE BLUE 2020/Don't Be Silly - It's Only a Lightbulb.mp4 124.1 MB
- CODE BLUE 2022/「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション.mp4 118.8 MB
- CODE BLUE 2022/The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.mp4 118.7 MB
- CODE BLUE 2022/Closing adddress.mp4 98.2 MB
- CODE BLUE 2021/The security thing - Knowledge, skills, and two more things.mp4 88.3 MB
- CODE BLUE 2018/Keynote Cyber Arms Race by Mikko Hyppönen.mp4 85.7 MB
- CODE BLUE 2018/The Decalogue(ish) of Contractual Security Sins by Sebastian Avarvarei.mp4 82.2 MB
- CODE BLUE 2018/A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek & Nicolas Joly.mp4 79.1 MB
- CODE BLUE 2016/Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.mp4 77.9 MB
- CODE BLUE 2022/Tales of 5G hacking.mp4 74.2 MB
- CODE BLUE 2023/KeynoteIf It's Smart, It's Vulnerable.mp4 72.0 MB
- CODE BLUE 2015/Practical network defense at scale by Travis Carelock.mp4 71.4 MB
- CODE BLUE 2019/Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.mp4 66.9 MB
- CODE BLUE 2015/Is there an EFI monster inside your apple by Pedro Vilaca.mp4 65.7 MB
- CODE BLUE 2019/KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.mp4 65.6 MB
- CODE BLUE 2015/The Only Way to Tell the Truth is in Fiction by Richard Thieme.mp4 65.5 MB
- CODE BLUE 2018/How to hack SD-WAN and keep your sanity by Sergey Goreychik.mp4 64.4 MB
- CODE BLUE 2023/International Panel Discussion on 'A Comprehensive Study of Active Cyber Defence'.mp4 63.8 MB
- CODE BLUE 2017/George Hotz - Keynote - Make your car self-driving using open-source software.mp4 63.7 MB
- CODE BLUE 2018/Are You Trading Stocks Securely by Alejandro Hernandez.mp4 63.2 MB
- CODE BLUE 2017/National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.mp4 63.2 MB
- CODE BLUE 2016/PowerShell obfuskation Techniques & How To Detect Them by Daniel Bohannon.mp4 63.2 MB
- CODE BLUE 2017/PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.mp4 62.1 MB
- CODE BLUE 2015/(In)Security of Medical Devices by Florian Grunow.mp4 60.6 MB
- CODE BLUE 2015/How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim.mp4 60.5 MB
- CODE BLUE 2018/Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.mp4 60.3 MB
- CODE BLUE 2015/Wireless security testing with attack by Keiichi Horiai.mp4 59.9 MB
- CODE BLUE 2019/Wifi sniffing with the WifiKraken by Mike Spicer.mp4 59.4 MB
- CODE BLUE 2024/BullyRAGA Multi-Perspective RAG Robustness Evaluation Framework.mp4 58.6 MB
- CODE BLUE 2016/The ARMs race for kernel protection by Jonathan Levin.mp4 58.4 MB
- CODE BLUE 2022/Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All.mp4 58.1 MB
- CODE BLUE 2024/Event Tracing for Windows Internals.mp4 58.0 MB
- CODE BLUE 2018/The Mystery of WannaCry Mutants - by Makoto Iwamura.mp4 58.0 MB
- CODE BLUE 2018/Practical method and practice of OSINT for cyber defense by Ataru Ishii.mp4 57.9 MB
- CODE BLUE 2024/Keynote AI for formal verification - formal verification for AI.mp4 57.9 MB
- CODE BLUE 2018/WHAT THE FAX by Yaniv Balmas, Eyal Itkin.mp4 57.6 MB
- CODE BLUE 2018/Policy Options for Cyber Middle Powers against Strategic Cyber Attacks by Philipp S. Kruger.mp4 57.1 MB
- CODE BLUE 2016/Esoteric Web Application Vulnerabilities by Andres Riancho.mp4 56.4 MB
- CODE BLUE 2023/stelftools cross-architecture static library detector for IoT malware.mp4 56.1 MB
- CODE BLUE 2015/Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik.mp4 56.1 MB
- CODE BLUE 2018/LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.mp4 55.6 MB
- CODE BLUE 2017/LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.mp4 55.4 MB
- CODE BLUE 2015/Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.mp4 55.4 MB
- CODE BLUE 2018/Keynote Power, Patience, and Persistence by Kenneth Geers.mp4 55.0 MB
- CODE BLUE 2016/Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.mp4 54.8 MB
- CODE BLUE 2015/An Abusive Relationship with AngularJS by Mario Heiderich.mp4 54.1 MB
- CODE BLUE 2020/Speccial Session - Digital Social Innovation.mp4 54.0 MB
- CODE BLUE 2019/Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarsieri.mp4 54.0 MB
- CODE BLUE 2023/BSides Tokyo 2024.mp4 53.8 MB
- CODE BLUE 2017/Take a Jailbreak -Stunning Guards for iOS Jailbreak.mp4 53.6 MB
- CODE BLUE 2015/Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.mp4 53.3 MB
- CODE BLUE 2019/tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.mp4 53.1 MB
- CODE BLUE 2015/New immune system of information security from CHINA by Xiaodun Fang.mp4 52.8 MB
- CODE BLUE 2016/Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.mp4 52.5 MB
- CODE BLUE 2023/A 3-Year Tale of Hacking a Pwn2Own Target The Attacks, Vendor Evolution, and Lesson Learneds.mp4 52.4 MB
- CODE BLUE 2015/Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio.mp4 52.3 MB
- CODE BLUE 2016/Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.mp4 51.8 MB
- CODE BLUE 2023/Windows Event Log Internals Understanding the Core Mechanisms for Enhanced Security.mp4 51.5 MB
- CODE BLUE 2017/(In)Security of Japanese IT Asset Management Software.mp4 51.3 MB
- CODE BLUE 2022/KeynoteUnderwhelmed Making Sense of the Overwhelming Challenge of Cybersecurity.mp4 51.1 MB
- CODE BLUE 2022/Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.mp4 50.7 MB
- CODE BLUE 2016/Keynote - Digital Society - e-Estonia - by Anna Piperal.mp4 50.3 MB
- CODE BLUE 2018/Remotely Cracking Smart Gun Safes by Austin Fletcher, Daniel Su.mp4 50.2 MB
- CODE BLUE 2017/Ory Segal - Passive Fingerprinting of HTTP 2 Clients.mp4 50.0 MB
- CODE BLUE 2018/GLitch hammering your phone through WebGL by Pietro Frigo.mp4 49.8 MB
- CODE BLUE 2016/EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.mp4 48.8 MB
- CODE BLUE 2016/WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.mp4 48.4 MB
- CODE BLUE 2017/Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.mp4 48.1 MB
- CODE BLUE 2018/Crashing to root How to escape the iOS sandbox using abort() by Brandon Azad.mp4 48.0 MB
- CODE BLUE 2017/Androsia - A step ahead in securing in-memory Android application data.mp4 47.8 MB
- CODE BLUE 2024/Attention Is All You Need for Semantics DetectionA Novel Transformer on Neural.mp4 47.7 MB
- CODE BLUE 2018/Fuzz your smartphone from 4G base station side by Tsojen Liu.mp4 47.6 MB
- CODE BLUE 2019/Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.mp4 47.5 MB
- CODE BLUE 2022/From Parroting to Echoing The Evolution of China’s Bots-Driven InfoOps targeting Taiwan.mp4 47.4 MB
- CODE BLUE 2017/Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.mp4 47.4 MB
- CODE BLUE 2022/Sisyphus and the CVE Feed Vulnerability Management at Scale.mp4 47.3 MB
- CODE BLUE 2016/Keynote - How much security is too much by Karsten Nohl.mp4 47.2 MB
- CODE BLUE 2018/Smart Fuzzing XPC & XNU by Juwei Lin, Lilang Wu, Moony Li.mp4 46.9 MB
- CODE BLUE 2017/確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.mp4 46.8 MB
- CODE BLUE 2018/Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.mp4 46.7 MB
- CODE BLUE 2016/Who put the backdoor in my modem by Ewerson Guimaraes.mp4 46.2 MB
- CODE BLUE 2017/Possibility of arbitrary code execution by Step-Oriented Programming.mp4 45.9 MB
- CODE BLUE 2016/About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.mp4 45.7 MB
- CODE BLUE 2019/KeynoteCyberspace - A Lawless Wild West or Orderly Chaos by Liis Vihul.mp4 45.7 MB
- CODE BLUE 2023/OSBT OpenID Connect Scenario-Based Tester.mp4 45.6 MB
- CODE BLUE 2021/Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.mp4 45.4 MB
- CODE BLUE 2022/Fight Against Malware Development Life Cycle.mp4 45.4 MB
- CODE BLUE 2019/Applicability of GDPR and APPI to international companies and the impact on IT Security.mp4 45.0 MB
- CODE BLUE 2023/Hi My Name Is [What] Abusing DHCP To Spoof DNS Records.mp4 44.9 MB
- CODE BLUE 2015/Keynote The Singularity is Near by Takuya Matsuda.mp4 44.8 MB
- CODE BLUE 2018/Methodology for controlling connected cars remotely by Minrui Yan, Jiahao Li.mp4 44.7 MB
- CODE BLUE 2017/For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.mp4 44.6 MB
- CODE BLUE 2021/The Lazarus Group's Attack Operations Targeting Japan.mp4 44.5 MB
- CODE BLUE 2024/NTLMv1 reversion to NTLM with hashcat and the NTLMv1-multi tool.mp4 44.5 MB
- CODE BLUE 2019/Let's Make Windows Defender Angry Antivirus can be an oracle by Ryo Ichikawa.mp4 44.2 MB
- CODE BLUE 2018/Nuclear Weapons and Cyber Risks by Julia Franziska Berghofer.mp4 44.0 MB
- CODE BLUE 2016/Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.mp4 43.9 MB
- CODE BLUE 2018/Dissect Android Bluetooth for Fun & Profit by Jianjun Dai, Guang Gong.mp4 43.6 MB
- CODE BLUE 2023/Power Automate C2 Stealth Living-Off-the-Cloud C2 Framework.mp4 43.3 MB
- CODE BLUE 2022/Hayabusa - Threat Hunting and Fast Forensics in Windows environments for free.mp4 42.7 MB
- CODE BLUE 2024/Modern SOCLess Than One and More Than Infinity.mp4 42.6 MB
- CODE BLUE 2022/What I learned from the direct confrontation with the adversaries who hid C&C server.mp4 42.6 MB
- CODE BLUE 2022/Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulation and Scanning.mp4 42.2 MB
- CODE BLUE 2016/(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.mp4 41.8 MB
- CODE BLUE 2021/Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.mp4 41.8 MB
- CODE BLUE 2017/A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.mp4 41.7 MB
- CODE BLUE 2018/Wow, PESSR has Eroded Apple in Blink by Ju Zhu, Moony Li, Lilang Wu.mp4 41.6 MB
- CODE BLUE 2023/Bypassing macOS Security and Privacy Mechanisms From Gatekeeper to System Integrity Protectio.mp4 40.9 MB
- CODE BLUE 2016/ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.mp4 40.9 MB
- CODE BLUE 2019/Recent APT attack on crypto exchange employees by Heungsoo Kang.mp4 40.5 MB
- CODE BLUE 2021/Day2 Event Closing.mp4 40.4 MB
- CODE BLUE 2022/Your Printer is not your Printer - Hacking Printers at Pwn2Own.mp4 40.4 MB
- CODE BLUE 2021/ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.mp4 40.3 MB
- CODE BLUE 2024/IDA - Ghidraによるアンチデバッグの自動検出とサポート機能によるデバッグプロセスの効率化.mp4 40.2 MB
- CODE BLUE 2022/CloudDragon’s Credential Factory is Powering Up Its Espionage Activities Against All the.mp4 40.0 MB
- CODE BLUE 2016/Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.mp4 40.0 MB
- CODE BLUE 2023/Digital sovereignty - shaping regulatory responses to technological dominance.mp4 40.0 MB
- CODE BLUE 2019/Coinbase and the Firefox 0-day by Philip Martin.mp4 39.9 MB
- CODE BLUE 2017/The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.mp4 39.6 MB
- CODE BLUE 2018/The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.mp4 39.6 MB
- CODE BLUE 2023/Unlocking the Drive Exploiting Tesla Model 3.mp4 39.5 MB
- CODE BLUE 2024/WebAssembly Is All You NeedExploiting Chrome and the V8 Sandbox 10 times with WASM.mp4 39.4 MB
- CODE BLUE 2023/Modems (and telecoms) are also not as secure - 6 0-days to 4 million modems within a week.mp4 39.1 MB
- CODE BLUE 2015/Defeating Firefox by Muneaki Nishimura.mp4 39.0 MB
- CODE BLUE 2017/Detection index learning based on cyber threat intelligence and its application.mp4 39.0 MB
- CODE BLUE 2019/Hardware Wallet Security by Sergei Volokitin.mp4 39.0 MB
- CODE BLUE 2023/The Renaissance of Cyber Physical Offensive Capabilities.mp4 38.7 MB
- CODE BLUE 2018/Reading the norms of cyberspace - by Koichiro Sparky Komiyama.mp4 38.6 MB
- CODE BLUE 2023/Open Sesame The full story behind opening a smart lock.mp4 38.6 MB
- CODE BLUE 2022/SMARTIAN Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses.mp4 38.3 MB
- CODE BLUE 2021/Keynote1 - Shaking the Cybersecurity Kaleidoscope - An Immersive Look into Human Behaviour.mp4 38.2 MB
- CODE BLUE 2016/Background Story of - Operation neutralizing banking malware - by Kazuki Takada.mp4 37.9 MB
- CODE BLUE 2018/From Seoul to Tokyo - Threats for Japan and South Korea by Minseok Cha, Jaejun Heo.mp4 37.9 MB
- CODE BLUE 2023/Pennywise - Invisible privacy risk in the new AI era.mp4 37.9 MB
- CODE BLUE 2015/Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.mp4 37.8 MB
- CODE BLUE 2018/CoinMiner are Evasive by Thomas Roccia and Omri Moyal.mp4 37.7 MB
- CODE BLUE 2018/Privacy by Design Methodology by Vanessa Henri.mp4 37.6 MB
- CODE BLUE 2024/Did Subdomain Abuse by BlackTech Evolve.mp4 37.5 MB
- CODE BLUE 2016/Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.mp4 37.4 MB
- CODE BLUE 2017/吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.mp4 37.3 MB
- CODE BLUE 2018/Crypto Gold Mine Is Your Environment Safe by Austin McBride.mp4 37.1 MB
- CODE BLUE 2024/PkgFuzzプロジェクト オープンソースソフトウェアのための新たな継続的ファジング.mp4 37.1 MB
- CODE BLUE 2016/DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.mp4 36.7 MB
- CODE BLUE 2013/Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.mp4 36.4 MB
- CODE BLUE 2019/Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.mp4 36.4 MB
- CODE BLUE 2021/MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.mp4 36.1 MB
- CODE BLUE 2013/The Current State of Automotive Security by Chris Valasek.mp4 35.9 MB
- CODE BLUE 2019/Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di Shen.mp4 35.8 MB
- CODE BLUE 2024/EchidnaTermApp: ペネトレーションテスト支援・学習ツール.mp4 35.3 MB
- CODE BLUE 2021/Non-Private Chat Police investigation legislation in the flat world.mp4 34.8 MB
- CODE BLUE 2016/House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.mp4 34.6 MB
- CODE BLUE 2023/Closing Keynote Cyber and Security in Times of War.mp4 34.6 MB
- CODE BLUE 2021/Hacking the Code Blue Seas Maritime Community Building Across the Pacific.mp4 34.2 MB
- CODE BLUE 2022/Red light in the factory - From 0 to 100 OT adversary emulation.mp4 34.1 MB
- CODE BLUE 2018/Smart Contract Honeypots for Profit (and probably Fun) by Ben Schmidt.mp4 33.8 MB
- CODE BLUE 2023/filename - in Content-Disposition is a landmine - vulnerability caused by ambiguous requiremen.mp4 33.4 MB
- CODE BLUE 2014/Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun.mp4 33.1 MB
- CODE BLUE 2016/COFI break by Ron Shina & Shlomi Oberman.mp4 33.1 MB
- CODE BLUE 2014/Keren Elazari - Keynote - The 5 biggest problems of cyber security.mp4 32.9 MB
- CODE BLUE 2020/Law Enforcement Access to Transborder.mp4 32.7 MB
- CODE BLUE 2024/V for VendettaDissecting a Global Phishing Platform After Being Phished.mp4 32.6 MB
- CODE BLUE 2024/Abusing legacy railroad signaling systems.mp4 32.0 MB
- CODE BLUE 2016/Be a Binary Rockstar by Sophia DAntoine.mp4 31.9 MB
- CODE BLUE 2024/Hacking Google - Lessons learned running and growing an internal red team.mp4 31.8 MB
- CODE BLUE 2018/INTERNATIONAL COLLABORATION A TOOL FOR COMBATING BEC by Alex Ogbole.mp4 31.8 MB
- CODE BLUE 2017/Industroyer - biggest threat to industrial control systems since Stuxnet.mp4 31.7 MB
- CODE BLUE 2019/Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper.mp4 31.2 MB
- CODE BLUE 2020/Reverse Engineering archeology.mp4 30.9 MB
- CODE BLUE 2015/Ninja Correlation of APT Binaries by Bhavna Soman.mp4 30.7 MB
- CODE BLUE 2024/From Snowflake to SnowstormNavigating Breaches and Detections.mp4 30.6 MB
- CODE BLUE 2024/Proxying to KernelStreaming vulnerabilities from Windows Kernel.mp4 30.4 MB
- CODE BLUE 2022/Under the hood of Wslink’s multilayered virtual machine.mp4 30.3 MB
- CODE BLUE 2024/Defeating PlayStation 5 network encryption.mp4 30.2 MB
- CODE BLUE 2020/Kr00k Serious vulnerability affected encryption of billion Wi-Fi devices.mp4 30.1 MB
- CODE BLUE 2021/Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.mp4 30.0 MB
- CODE BLUE 2024/1-Click-Fuzz:Systematically Fuzzing the Windows Kernel Driver with Symbolic Execution.mp4 29.8 MB
- CODE BLUE 2023/The Dark Side of Cloud Computing How Threat Actors Abuse Millions of Dollars of Cloud Compute.mp4 29.5 MB
- CODE BLUE 2022/Opening.mp4 29.2 MB
- CODE BLUE 2014/Dongcheol Hong - Drone attack by malware and network hacking.mp4 28.9 MB
- CODE BLUE 2018/Who's guarding the gateway - by Nicole Beckwith.mp4 28.8 MB
- CODE BLUE 2022/Who is the Mal-Gopher - Implementation and Evaluation of gimpfuzzy for Go Malware Class.mp4 28.8 MB
- CODE BLUE 2020/Who stole My 100,000 Dollars’ Worth Bitcoin Wallets - Catch Them All With New Deceptive Bait.mp4 28.8 MB
- CODE BLUE 2014/Takahiro Matsuki & Dennis Kengo Oka.mp4 28.3 MB
- CODE BLUE 2024/Behind Enemy LinesEngaging and Disrupting Ransomware Web Panels.mp4 28.2 MB
- CODE BLUE 2020/It is a World Wide Web, but All Politics is Local Planning to Survive a Balkanizing Internet.mp4 27.8 MB
- CODE BLUE 2020/Keynote2 - Practical and Intelligent Incident Response Planning.mp4 27.7 MB
- CODE BLUE 2013/Keynote - CODE BLUE in the ICU by Jeff Moss.mp4 27.4 MB
- CODE BLUE 2013/o-checker - Malicious document file detection tool by Yuuhei Ootsubo.mp4 27.1 MB
- CODE BLUE 2024/Piloting Edge Copilot.mp4 26.6 MB
- CODE BLUE 2020/説明可能な悪性ドメイン診断.mp4 26.5 MB
- CODE BLUE 2013/Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.mp4 26.4 MB
- CODE BLUE 2013/A Security Barrier Device Regardless of OS or Applications by Kenji Toda.mp4 26.2 MB
- CODE BLUE 2023/Deep-Kernel Treasure Hunt Finding exploitable structures in the Linux kernel.mp4 26.1 MB
- CODE BLUE 2020/Operation I am Tom How APT actors move laterally in corporate networks.mp4 26.0 MB
- CODE BLUE 2020/Operation Chimera - APT Operation Targets Semiconductor Vendors.mp4 26.0 MB
- CODE BLUE 2015/A new exploitation method to bypass stack canaries by Yuki Koike.mp4 25.5 MB
- CODE BLUE 2020/LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.mp4 25.4 MB
- CODE BLUE 2014/Ilfak Guilfanov - Keynote - The story of IDA Pro.mp4 24.9 MB
- CODE BLUE 2014/The active use and exploitation of Microsoft s Application Compatibility Framework.mp4 24.5 MB
- CODE BLUE 2019/[BB] FileInsight-plugins Decoding toolbox for malware analysis by Nobutaka Mantani.mp4 24.4 MB
- CODE BLUE 2020/Life After Privacy Shield - Will Data Transfer Laws Stop the World Doing Business.mp4 24.3 MB
- CODE BLUE 2013/Intel Management Engine Secrets by Igor Skochinsky.mp4 24.2 MB
- CODE BLUE 2014/Kuniyasu Suzaki - DeviceDisEnabler.mp4 24.1 MB
- CODE BLUE 2013/Fight Against Citadel in Japan by You Nakatsuru.mp4 24.0 MB
- CODE BLUE 2021/Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.mp4 23.9 MB
- CODE BLUE 2015/PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.mp4 23.8 MB
- CODE BLUE 2023/Enhanced Vulnerability Hunting in WDM Drivers with Symbolic Execution and Taint Analysis.mp4 23.8 MB
- CODE BLUE 2024/NGateNovel Android malware for unauthorized ATM withdrawals via NFC relay.mp4 23.7 MB
- CODE BLUE 2020/Privacy protection and Data breach incident response regulation in East Asia and Europe.mp4 23.7 MB
- CODE BLUE 2016/DVB-T Hacking by Amihai Neiderman.mp4 23.4 MB
- CODE BLUE 2020/Drones' Cryptanalysis - Detecting Spying Drones.mp4 23.3 MB
- CODE BLUE 2014/David Jacoby - How I Hacked My Home.mp4 23.1 MB
- CODE BLUE 2024/SBOM and Security Transparency - How it all fits together.mp4 23.0 MB
- CODE BLUE 2020/Vulnerabilities of Machine Learning Infrastructure.mp4 23.0 MB
- CODE BLUE 2021/Day2 Opening.mp4 22.6 MB
- CODE BLUE 2020/Dissecting China’s Information Operations with Threat Intelligence.mp4 22.4 MB
- CODE BLUE 2020/サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.mp4 22.1 MB
- CODE BLUE 2021/NAS as Not As Secure.mp4 22.0 MB
- CODE BLUE 2020/Lamphone Real-Time Passive Sound Recovery from Light Bulb Vibrations.mp4 21.9 MB
- CODE BLUE 2020/Reflex you give me a parser, I give you a token generator.mp4 21.8 MB
- CODE BLUE 2019/[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.mp4 21.7 MB
- CODE BLUE 2023/Pwning Electron Application - Analysis and Defense of Vulnerabilities in Electron Applications.mp4 21.4 MB
- CODE BLUE 2018/RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.mp4 21.0 MB
- CODE BLUE 2020/Keynote1 - Ms. Audrey Guinchard.mp4 20.9 MB
- CODE BLUE 2020/虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.mp4 20.7 MB
- CODE BLUE 2020/Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.mp4 20.5 MB
- CODE BLUE 2013/Preventing hard disk firmware manipulation attack and disaster recovery.mp4 20.3 MB
- CODE BLUE 2013/various tricks for remote linux exploits by Seokha Lee (wh1ant).mp4 20.3 MB
- CODE BLUE 2020/SOARによるセキュリティ監視業務の効率化とSecOps.mp4 19.4 MB
- CODE BLUE 2014/David Seidman - Microsoft Vulnerability Research - How to be a Finder as a Vendor.mp4 19.1 MB
- CODE BLUE 2020/Hunting kernel exploits with filesystem fuzzer.mp4 18.7 MB
- CODE BLUE 2022/Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.mp4 18.7 MB
- CODE BLUE 2022/Ipa-medit Memory modification tool for iOS apps without Jailbreaking.mp4 17.4 MB
- CODE BLUE 2020/Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.mp4 17.0 MB
- CODE BLUE 2019/Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.mp4 16.9 MB
- CODE BLUE 2020/Ethereum 2.0のセキュリティ.mp4 16.6 MB
- CODE BLUE 2013/SCADA Software or Swiss Cheese Software by Celil UNUVER.mp4 15.9 MB
- CODE BLUE 2020/Illicit QQ Communities What's Being Shared.mp4 15.7 MB
- CODE BLUE 2020/Defending Computer CriminalsPresented - Andrea Monti.mp4 15.2 MB
- CODE BLUE 2020/Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.mp4 15.0 MB
- CODE BLUE 2019/MalCfgParser A Lightweight Malware Configuration Parsing Tool.mp4 14.9 MB
- CODE BLUE 2020/DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.mp4 14.7 MB
- CODE BLUE 2020/Alliance power for Cyber Security.mp4 14.1 MB
- CODE BLUE 2018/BB] CIRCO Cisco Implant Raspberry Controlled Operations by Emilio Couto.mp4 13.2 MB
- CODE BLUE 2013/libinjection - from SQLi to XSS by Nick Galbreath.mp4 12.1 MB
- CODE BLUE 2015/[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.mp4 12.1 MB
- CODE BLUE 2014/Hiroshi Shinotsuka - how to avoid the Detection by Malware.mp4 11.1 MB
- CODE BLUE 2013/HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.mp4 10.9 MB
- CODE BLUE 2020/Apk-medit memory search and patch tool for APK without root & android NDK.mp4 9.3 MB
- CODE BLUE 2021/Day2 Online Closing.mp4 7.5 MB
- CODE BLUE 2021/Day1 Opening.mp4 7.4 MB
- CODE BLUE 2015/[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.mp4 6.5 MB
- CODE BLUE 2015/[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.mp4 5.8 MB
- CODE BLUE 2021/Day1 Closing.mp4 5.6 MB
- CODE BLUE 2015/CODE BLUE 2015 captions/Is there an EFI monster inside your apple by Pedro Vilaca.eng.json 3.3 MB
- CODE BLUE 2013/CODE BLUE 2013 captions/Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.json 3.1 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.json 2.8 MB
- CODE BLUE 2021/CODE BLUE 2021 captions/The security thing - Knowledge, skills, and two more things.eng.json 2.7 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.json 2.7 MB
- CODE BLUE 2015/CODE BLUE 2015 captions/Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.json 2.6 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/The ARMs race for kernel protection by Jonathan Levin.eng.json 2.6 MB
- CODE BLUE 2015/CODE BLUE 2015 captions/The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.json 2.5 MB
- CODE BLUE 2015/CODE BLUE 2015 captions/New immune system of information security from CHINA by Xiaodun Fang.eng.json 2.4 MB
- CODE BLUE 2013/CODE BLUE 2013 captions/The Current State of Automotive Security by Chris Valasek.eng.json 2.3 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.json 2.2 MB
- CODE BLUE 2018/CODE BLUE 2018 captions/Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.json 2.1 MB
- CODE BLUE 2013/CODE BLUE 2013 captions/Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.json 2.1 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/PowerShell obfuskation Techniques & How To Detect Them by Daniel Bohannon.eng.json 2.1 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.json 2.1 MB
- CODE BLUE 2017/CODE BLUE 2017 captions/For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.json 2.1 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.json 2.1 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.json 2.1 MB
- CODE BLUE 2013/CODE BLUE 2013 captions/o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.json 2.1 MB
- CODE BLUE 2015/CODE BLUE 2015 captions/Keynote The Singularity is Near by Takuya Matsuda.eng.json 2.1 MB
- CODE BLUE 2015/CODE BLUE 2015 captions/Wireless security testing with attack by Keiichi Horiai.eng.json 2.0 MB
- CODE BLUE 2013/CODE BLUE 2013 captions/A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.json 2.0 MB
- CODE BLUE 2017/CODE BLUE 2017 captions/George Hotz - Keynote - Make your car self-driving using open-source software.eng.json 2.0 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.json 2.0 MB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.json 2.0 MB
- CODE BLUE 2013/CODE BLUE 2013 captions/Intel Management Engine Secrets by Igor Skochinsky.eng.json 1.9 MB
- CODE BLUE 2017/CODE BLUE 2017 captions/National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.json 1.9 MB
- CODE BLUE 2022/CODE BLUE 2022 captions/The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.json 1.9 MB
- CODE BLUE 2017/CODE BLUE 2017 captions/(In)Security of Japanese IT Asset Management Software.eng.json 1.8 MB
- CODE BLUE 2017/CODE BLUE 2017 captions/Possibility of arbitrary code execution by Step-Oriented Programming.eng.json 1.8 MB
- CODE BLUE 2013/CODE BLUE 2013 captions/Preventing hard disk firmware manipulation attack and disaster recovery.eng.json 1.8 MB
- CODE BLUE 2015/CODE BLUE 2015 captions/Defeating Firefox by Muneaki Nishimura.eng.json 1.8 MB
- CODE BLUE 2017/CODE BLUE 2017 captions/Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.json 1.8 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/Keynote - How much security is too much by Karsten Nohl.eng.json 1.8 MB
- CODE BLUE 2021/CODE BLUE 2021 captions/Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.json 1.8 MB
- CODE BLUE 2017/CODE BLUE 2017 captions/Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.json 1.8 MB
- CODE BLUE 2017/CODE BLUE 2017 captions/Androsia - A step ahead in securing in-memory Android application data.eng.json 1.8 MB
- CODE BLUE 2015/CODE BLUE 2015 captions/Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.json 1.7 MB
- CODE BLUE 2018/CODE BLUE 2018 captions/The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.json 1.7 MB
- CODE BLUE 2014/CODE BLUE 2014 captions/Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.json 1.7 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.json 1.7 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.json 1.7 MB
- CODE BLUE 2013/CODE BLUE 2013 captions/various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.json 1.7 MB
- CODE BLUE 2017/CODE BLUE 2017 captions/吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.json 1.7 MB
- CODE BLUE 2017/Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.mp4 1.7 MB
- CODE BLUE 2018/CODE BLUE 2018 captions/Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.json 1.6 MB
- CODE BLUE 2021/CODE BLUE 2021 captions/Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.json 1.6 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.json 1.6 MB
- CODE BLUE 2017/CODE BLUE 2017 captions/PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.json 1.6 MB
- CODE BLUE 2018/CODE BLUE 2018 captions/How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.json 1.6 MB
- CODE BLUE 2014/CODE BLUE 2014 captions/Kuniyasu Suzaki - DeviceDisEnabler.eng.json 1.6 MB
- CODE BLUE 2018/CODE BLUE 2018 captions/LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.json 1.5 MB
- CODE BLUE 2017/CODE BLUE 2017 captions/確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.json 1.5 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/Esoteric Web Application Vulnerabilities by Andres Riancho.eng.json 1.5 MB
- CODE BLUE 2017/CODE BLUE 2017 captions/Detection index learning based on cyber threat intelligence and its application.eng.json 1.5 MB
- CODE BLUE 2017/CODE BLUE 2017 captions/Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.json 1.5 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.json 1.5 MB
- CODE BLUE 2021/CODE BLUE 2021 captions/The Lazarus Group's Attack Operations Targeting Japan.eng.json 1.4 MB
- CODE BLUE 2017/CODE BLUE 2017 captions/The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.json 1.4 MB
- CODE BLUE 2017/CODE BLUE 2017 captions/Industroyer - biggest threat to industrial control systems since Stuxnet.eng.json 1.4 MB
- CODE BLUE 2014/CODE BLUE 2014 captions/Takahiro Matsuki & Dennis Kengo Oka.eng.json 1.4 MB
- CODE BLUE 2017/CODE BLUE 2017 captions/LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.json 1.4 MB
- CODE BLUE 2017/CODE BLUE 2017 captions/A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.json 1.4 MB
- CODE BLUE 2015/CODE BLUE 2015 captions/Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.json 1.4 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.json 1.3 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/Who put the backdoor in my modem by Ewerson Guimaraes.eng.json 1.3 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.json 1.3 MB
- CODE BLUE 2017/CODE BLUE 2017 captions/Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.json 1.3 MB
- CODE BLUE 2019/CODE BLUE 2019 captions/Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.json 1.3 MB
- CODE BLUE 2020/CODE BLUE 2020 captions/Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.json 1.3 MB
- CODE BLUE 2018/CODE BLUE 2018 captions/The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.json 1.3 MB
- CODE BLUE 2020/CODE BLUE 2020 captions/説明可能な悪性ドメイン診断.eng.json 1.2 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.json 1.2 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/Be a Binary Rockstar by Sophia DAntoine.eng.json 1.2 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.json 1.2 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/DVB-T Hacking by Amihai Neiderman.eng.json 1.2 MB
- CODE BLUE 2018/CODE BLUE 2018 captions/Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.json 1.2 MB
- CODE BLUE 2013/CODE BLUE 2013 captions/Fight Against Citadel in Japan by You Nakatsuru.eng.json 1.2 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.json 1.1 MB
- CODE BLUE 2021/CODE BLUE 2021 captions/MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.json 1.1 MB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.json 1.1 MB
- CODE BLUE 2020/CODE BLUE 2020 captions/Reverse Engineering archeology.eng.json 1.1 MB
- CODE BLUE 2019/CODE BLUE 2019 captions/Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.json 1.1 MB
- CODE BLUE 2022/CODE BLUE 2022 captions/Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.json 1.1 MB
- CODE BLUE 2016/CODE BLUE 2016 captions/COFI break by Ron Shina & Shlomi Oberman.eng.json 1.1 MB
- CODE BLUE 2021/CODE BLUE 2021 captions/Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.json 1.1 MB
- CODE BLUE 2022/CODE BLUE 2022 captions/Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.json 1.0 MB
- CODE BLUE 2013/CODE BLUE 2013 captions/SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.json 1.0 MB
- CODE BLUE 2021/CODE BLUE 2021 captions/Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.json 1.0 MB
- CODE BLUE 2020/CODE BLUE 2020 captions/Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.json 1.0 MB
- CODE BLUE 2015/CODE BLUE 2015 captions/A new exploitation method to bypass stack canaries by Yuki Koike.eng.json 1004.1 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/SOARによるセキュリティ監視業務の効率化とSecOps.eng.json 999.3 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.json 992.9 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.json 984.2 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.json 980.7 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.json 976.2 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.json 975.2 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.json 972.6 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.json 971.2 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.json 944.6 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.json 923.0 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.json 919.0 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Vulnerabilities of Machine Learning Infrastructure.eng.json 909.4 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Ethereum 2.0のセキュリティ.eng.json 821.2 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.json 722.1 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.json 722.1 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.json 690.3 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.json 565.0 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.json 523.4 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Event Closing.eng.json 400.8 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day1 Opening.eng.json 283.6 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Opening.eng.json 236.0 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Online Closing.eng.json 197.4 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Is there an EFI monster inside your apple by Pedro Vilaca.eng.srt 92.3 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Crashing to root How to escape the iOS sandbox using abort() by Brandon Azad.eng.srt 90.8 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.srt 88.0 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Is there an EFI monster inside your apple by Pedro Vilccca.eng.srt 85.8 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション.eng.srt 84.2 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Is there an EFI monster inside your apple by Pedro Vilaca.eng.vtt 83.7 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Is there an EFI monster inside your apple by Pedro Vilaca.eng.txt 83.7 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/Keynote AI for formal verification - formal verification for AI.eng.srt 83.5 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discusseng.srt 83.5 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.eng.srt 83.1 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Is there an EFI monster inside your apple by Pedro Vilaca.eng.lrc 82.8 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.srt 82.7 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.vtt 80.5 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.txt 80.5 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.lrc 79.8 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/KeynoteUnderwhelmed Making Sense of the Overwhelming Challenge of Cybersecurity.eng.srt 79.7 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.eng.srt 78.6 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/The Decalogue(ish) of Contractual Security Sins by Sebastian Avarvarei.eng.srt 78.0 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun.eng.srt 77.4 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Making and Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.srt 76.1 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Keren Elazari - Keynote - The 5 biggest problems of cyber security.eng.srt 76.0 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek & Nicolas Joly.eng.srt 75.7 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Keynote Cyber Arms Race by Mikko Hyppönen.eng.srt 75.5 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Sisyphus and the CVE Feed Vulnerability Management at Scale.eng.srt 75.2 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day1 Closing.eng.json 75.0 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.vtt 74.8 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.txt 74.8 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/(In)Security of Medical Devices by Florian Grunow.eng.srt 74.3 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.lrc 74.1 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/The Renaissance of Cyber Physical Offensive Capabilities.eng.srt 73.2 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All.eng.srt 72.7 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Practical network defense at scale by Travis Carelock.eng.srt 72.7 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Is there an EFI monster inside your apple by Pedro Vilaca.eng.tsv 72.5 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/WebAssembly Is All You NeedExploiting Chrome and the V8 Sandbox 10 times with WASM.eng.srt 72.4 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.srt 71.7 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.tsv 71.4 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/BullyRAGA Multi-Perspective RAG Robustness Evaluation Framework.eng.srt 70.8 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/From Snowflake to SnowstormNavigating Breaches and Detections.eng.srt 69.6 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/The security thing - Knowledge, skills, and two more things.eng.srt 69.2 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.srt 68.7 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/WHAT THE FAX by Yaniv Balmas, Eyal Itkin.eng.srt 68.1 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Keynote The Singularity is Near by Takuya Matsuda.eng.srt 67.9 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/Bypassing macOS Security and Privacy Mechanisms From Gatekeeper to System Integrity Protectio.eng.srt 67.7 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/GLitch hammering your phone through WebGL by Pietro Frigo.eng.srt 66.7 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/Power Automate C2 Stealth Living-Off-the-Cloud C2 Framework.eng.srt 66.5 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.tsv 66.3 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Tales of 5G hacking.eng.srt 66.3 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Wifi sniffing with the WifiKraken by Mike Spicer.eng.srt 66.1 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.vtt 66.1 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.txt 66.1 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.lrc 65.6 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/The ARMs race for kernel protection by Jonathan Levin.eng.srt 65.1 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/KeynoteIf It's Smart, It's Vulnerable.eng.srt 64.9 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/The active use and exploitation of Microsoft s Application Compatibility Framework.eng.srt 64.8 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/What I learned from the direct confrontation with the adversaries who hid C&C server.eng.srt 64.4 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/The Current State of Automotive Security by Chris Valasek.eng.srt 64.3 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.vtt 64.0 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.txt 64.0 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.lrc 63.5 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Keynote - CODE BLUE in the ICU by Jeff Moss.eng.srt 63.3 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/New immune system of information security from CHINA by Xiaodun Fang.eng.srt 63.2 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/stelftools cross-architecture static library detector for IoT malware.eng.srt 63.1 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Remotely Cracking Smart Gun Safes by Austin Fletcher, Daniel Su.eng.srt 62.7 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/David Seidman - Microsoft Vulnerability Research - How to be a Finder as a Vendor.eng.srt 62.7 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/The security thing - Knowledge, skills, and two more things.eng.vtt 61.5 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/The security thing - Knowledge, skills, and two more things.eng.txt 61.5 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/International Panel Discussion on 'A Comprehensive Study of Active Cyber Defence'.eng.srt 61.3 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Hardware Wallet Security by Sergei Volokitin.eng.srt 61.1 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/George Hotz - Keynote - Make your car self-driving using open-source software.eng.srt 60.8 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/The security thing - Knowledge, skills, and two more things.eng.lrc 60.7 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/David Jacoby - How I Hacked My Home.eng.srt 60.5 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/Digital sovereignty - shaping regulatory responses to technological dominance.eng.srt 60.4 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/The ARMs race for kernel protection by Jonathan Levin.eng.vtt 60.3 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/The ARMs race for kernel protection by Jonathan Levin.eng.txt 60.2 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/Hi My Name Is [What] Abusing DHCP To Spoof DNS Records.eng.srt 60.2 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/PowerShell obfuskation Techniques & How To Detect Them by Daniel Bohannon.eng.srt 60.1 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.tsv 60.0 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Who is the Mal-Gopher - Implementation and Evaluation of gimpfuzzy for Go Malware Class.eng.srt 59.9 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.text 59.9 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/The ARMs race for kernel protection by Jonathan Levin.eng.lrc 59.8 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Nuclear Weapons and Cyber Risks by Julia Franziska Berghofer.eng.srt 59.6 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/Hacking Google - Lessons learned running and growing an internal red team.eng.srt 59.3 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/Attention Is All You Need for Semantics DetectionA Novel Transformer on Neural.eng.srt 59.2 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/Windows Event Log Internals Understanding the Core Mechanisms for Enhanced Security.eng.srt 59.1 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Keynote The Singularity is Near by Takuya Matsuda.eng.vtt 59.0 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Keynote The Singularity is Near by Takuya Matsuda.eng.txt 59.0 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/PkgFuzzプロジェクト オープンソースソフトウェアのための新たな継続的ファジング.eng.srt 58.8 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Are You Trading Stocks Securely by Alejandro Hernandez.eng.srt 58.8 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Is there an EFI monster inside your apple by Pedro Vilaca.eng.text 58.7 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Crypto Gold Mine Is Your Environment Safe by Austin McBride.eng.srt 58.6 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Keynote The Singularity is Near by Takuya Matsuda.eng.lrc 58.2 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/The Current State of Automotive Security by Chris Valasek.eng.vtt 58.1 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/The Current State of Automotive Security by Chris Valasek.eng.txt 58.1 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarsieri.eng.srt 58.1 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/CoinMiner are Evasive by Thomas Roccia and Omri Moyal.eng.srt 57.9 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Applicability of GDPR and APPI to international companies and the impact on IT Security.eng.srt 57.6 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.tsv 57.6 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/The Current State of Automotive Security by Chris Valasek.eng.lrc 57.6 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.srt 57.2 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.srt 57.0 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Privacy by Design Methodology by Vanessa Henri.eng.srt 56.8 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/Event Tracing for Windows Internals.eng.srt 56.8 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.srt 56.0 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/Defeating PlayStation 5 network encryption.eng.srt 56.0 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/New immune system of information security from CHINA by Xiaodun Fang.eng.vtt 55.8 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/New immune system of information security from CHINA by Xiaodun Fang.eng.txt 55.8 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/Closing Keynote Cyber and Security in Times of War.eng.srt 55.6 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.srt 55.6 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.text 55.3 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Fight Against Malware Development Life Cycle.eng.srt 55.2 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/Modems (and telecoms) are also not as secure - 6 0-days to 4 million modems within a week.eng.srt 55.2 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/New immune system of information security from CHINA by Xiaodun Fang.eng.lrc 55.1 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/The ARMs race for kernel protection by Jonathan Levin.eng.tsv 55.0 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.srt 54.8 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.srt 54.8 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/BB] CIRCO Cisco Implant Raspberry Controlled Operations by Emilio Couto.eng.srt 54.7 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/PowerShell obfuskation Techniques & How To Detect Them by Daniel Bohannon.eng.vtt 54.6 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/PowerShell obfuskation Techniques & How To Detect Them by Daniel Bohannon.eng.txt 54.6 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Keynote Power, Patience, and Persistence by Kenneth Geers.eng.srt 54.5 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/The Dark Side of Cloud Computing How Threat Actors Abuse Millions of Dollars of Cloud Compute.eng.srt 54.5 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/An Abusive Relationship with AngularJS by Mario Heiderich.eng.srt 54.5 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.srt 54.2 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/PowerShell obfuskation Techniques & How To Detect Them by Daniel Bohannon.eng.lrc 54.1 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Coinbase and the Firefox 0-day by Philip Martin.eng.srt 54.1 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/A 3-Year Tale of Hacking a Pwn2Own Target The Attacks, Vendor Evolution, and Lesson Learneds.eng.srt 53.9 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/OSBT OpenID Connect Scenario-Based Tester.eng.srt 53.7 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/Proxying to KernelStreaming vulnerabilities from Windows Kernel.eng.srt 53.5 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/George Hotz - Keynote - Make your car self-driving using open-source software.eng.vtt 53.3 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/George Hotz - Keynote - Make your car self-driving using open-source software.eng.txt 53.3 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.srt 53.3 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/KeynoteCyberspace - A Lawless Wild West or Orderly Chaos by Liis Vihul.eng.srt 53.3 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/From Parroting to Echoing The Evolution of China’s Bots-Driven InfoOps targeting Taiwan.eng.srt 52.8 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/The security thing - Knowledge, skills, and two more things.eng.tsv 52.8 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/Pennywise - Invisible privacy risk in the new AI era.eng.srt 52.7 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/George Hotz - Keynote - Make your car self-driving using open-source software.eng.lrc 52.7 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Policy Options for Cyber Middle Powers against Strategic Cyber Attacks by Philipp S. Kruger.eng.srt 52.4 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.vtt 52.3 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.txt 52.3 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.text 51.9 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.lrc 51.9 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.srt 51.8 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.srt 51.8 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Kr00k Serious vulnerability affected encryption of billion Wi-Fi devices.eng.srt 51.7 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Wireless security testing with attack by Keiichi Horiai.eng.srt 51.7 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/The Current State of Automotive Security by Chris Valasek.eng.tsv 51.5 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Preventing hard disk firmware manipulation attack and disaster recovery.eng.srt 51.2 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.vtt 51.1 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.txt 51.1 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.vtt 51.1 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.txt 51.0 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/Deep-Kernel Treasure Hunt Finding exploitable structures in the Linux kernel.eng.srt 51.0 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.lrc 50.7 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Smart Contract Honeypots for Profit (and probably Fun) by Ben Schmidt.eng.srt 50.7 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.vtt 50.7 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.txt 50.7 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.lrc 50.6 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Keynote1 - Shaking the Cybersecurity Kaleidoscope - An Immersive Look into Human Behaviour.eng.srt 50.6 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio.eng.srt 50.4 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/NAS as Not As Secure.eng.srt 50.4 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.srt 50.4 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.lrc 50.3 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Methodology for controlling connected cars remotely by Minrui Yan, Jiahao Li.eng.srt 50.0 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.vtt 49.9 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.txt 49.9 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.text 49.8 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.eng.srt 49.6 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.lrc 49.4 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Keynote The Singularity is Near by Takuya Matsuda.eng.tsv 49.4 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.srt 49.4 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/Behind Enemy LinesEngaging and Disrupting Ransomware Web Panels.eng.srt 49.3 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.srt 49.3 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/SMARTIAN Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses.eng.srt 49.3 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/Did Subdomain Abuse by BlackTech Evolve.eng.srt 49.3 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/filename - in Content-Disposition is a landmine - vulnerability caused by ambiguous requiremen.eng.srt 48.8 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Keynote - How much security is too much by Karsten Nohl.eng.srt 48.7 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Recent APT attack on crypto exchange employees by Heungsoo Kang.eng.srt 48.7 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Androsia - A step ahead in securing in-memory Android application data.eng.srt 48.7 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.srt 48.6 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/PowerShell obfuskation Techniques & How To Detect Them by Daniel Bohannon.eng.tsv 48.6 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.vtt 48.5 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.txt 48.5 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.vtt 48.4 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.txt 48.3 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Non-Private Chat Police investigation legislation in the flat world.eng.srt 48.3 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.srt 48.3 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/IDA - Ghidraによるアンチデバッグの自動検出とサポート機能によるデバッグプロセスの効率化.eng.srt 48.2 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/V for VendettaDissecting a Global Phishing Platform After Being Phished.eng.srt 48.1 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.lrc 48.1 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/The ARMs race for kernel protection by Jonathan Levin.eng.text 48.1 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.vtt 48.1 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.txt 48.1 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Don't Be Silly - It's Only a Lightbulb.eng.srt 48.0 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Law Enforcement Access to Transborder.eng.srt 47.9 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/New immune system of information security from CHINA by Xiaodun Fang.eng.tsv 47.9 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.srt 47.8 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.lrc 47.8 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.lrc 47.7 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/From Seoul to Tokyo - Threats for Japan and South Korea by Minseok Cha, Jaejun Heo.eng.srt 47.7 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Drones' Cryptanalysis - Detecting Spying Drones.eng.srt 47.5 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.vtt 47.3 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.txt 47.3 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.srt 47.3 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.tsv 47.2 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulation and Scanning.eng.srt 46.9 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/Unlocking the Drive Exploiting Tesla Model 3.eng.srt 46.8 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/Open Sesame The full story behind opening a smart lock.eng.srt 46.8 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.lrc 46.7 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/INTERNATIONAL COLLABORATION A TOOL FOR COMBATING BEC by Alex Ogbole.eng.srt 46.6 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Lamphone Real-Time Passive Sound Recovery from Light Bulb Vibrations.eng.srt 46.6 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Fuzz your smartphone from 4G base station side by Tsojen Liu.eng.srt 46.5 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Keynote2 - Practical and Intelligent Incident Response Planning.eng.srt 46.4 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.tsv 46.2 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.tsv 46.2 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/NTLMv1 reversion to NTLM with hashcat and the NTLMv1-multi tool.eng.srt 46.1 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Wireless security testing with attack by Keiichi Horiai.eng.vtt 45.9 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Wireless security testing with attack by Keiichi Horiai.eng.txt 45.9 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Intel Management Engine Secrets by Igor Skochinsky.eng.srt 45.8 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Smart Fuzzing XPC & XNU by Juwei Lin, Lilang Wu, Moony Li.eng.srt 45.8 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/(In)Security of Japanese IT Asset Management Software.eng.srt 45.7 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.vtt 45.6 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.txt 45.6 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.tsv 45.6 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/Piloting Edge Copilot.eng.srt 45.5 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Defeating Firefox by Muneaki Nishimura.eng.srt 45.4 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.srt 45.4 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Who stole My 100,000 Dollars’ Worth Bitcoin Wallets - Catch Them All With New Deceptive Bait.eng.srt 45.4 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Wireless security testing with attack by Keiichi Horiai.eng.lrc 45.3 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/George Hotz - Keynote - Make your car self-driving using open-source software.eng.tsv 45.2 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.srt 45.2 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.lrc 45.2 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Preventing hard disk firmware manipulation attack and disaster recovery.eng.vtt 45.0 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Preventing hard disk firmware manipulation attack and disaster recovery.eng.txt 45.0 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Dongcheol Hong - Drone attack by malware and network hacking.eng.srt 44.9 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.tsv 44.8 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.srt 44.8 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.vtt 44.8 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.txt 44.8 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Keynote - How much security is too much by Karsten Nohl.eng.vtt 44.6 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Keynote - How much security is too much by Karsten Nohl.eng.txt 44.6 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.tsv 44.6 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Androsia - A step ahead in securing in-memory Android application data.eng.vtt 44.5 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Androsia - A step ahead in securing in-memory Android application data.eng.txt 44.5 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/1-Click-Fuzz:Systematically Fuzzing the Windows Kernel Driver with Symbolic Execution.eng.srt 44.5 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Preventing hard disk firmware manipulation attack and disaster recovery.eng.lrc 44.4 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.srt 44.4 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.lrc 44.4 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.srt 44.4 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.srt 44.3 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Keynote - How much security is too much by Karsten Nohl.eng.lrc 44.2 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Androsia - A step ahead in securing in-memory Android application data.eng.lrc 44.1 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.vtt 44.1 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.txt 44.1 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.tsv 44.0 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.vtt 43.7 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.txt 43.7 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.lrc 43.7 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Speccial Session - Digital Social Innovation.eng.srt 43.4 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di Shen.eng.srt 43.4 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.lrc 43.3 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.srt 43.3 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.vtt 43.2 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.srt 43.1 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.txt 43.1 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.vtt 43.1 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.txt 43.1 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Reflex you give me a parser, I give you a token generator.eng.srt 43.0 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.vtt 43.0 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.txt 43.0 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper.eng.srt 42.9 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Under the hood of Wslink’s multilayered virtual machine.eng.srt 42.9 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.lrc 42.8 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/The Current State of Automotive Security by Chris Valasek.eng.text 42.7 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.lrc 42.6 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.srt 42.5 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Possibility of arbitrary code execution by Step-Oriented Programming.eng.srt 42.5 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.lrc 42.4 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/It is a World Wide Web, but All Politics is Local Planning to Survive a Balkanizing Internet.eng.srt 42.4 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Intel Management Engine Secrets by Igor Skochinsky.eng.vtt 42.2 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Intel Management Engine Secrets by Igor Skochinsky.eng.txt 42.2 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.srt 42.2 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.srt 42.2 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Operation I am Tom How APT actors move laterally in corporate networks.eng.srt 42.1 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.srt 42.1 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.srt 42.0 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Esoteric Web Application Vulnerabilities by Andres Riancho.eng.srt 41.9 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.tsv 41.9 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Intel Management Engine Secrets by Igor Skochinsky.eng.lrc 41.9 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.vtt 41.8 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.txt 41.8 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/Enhanced Vulnerability Hunting in WDM Drivers with Symbolic Execution and Taint Analysis.eng.srt 41.7 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/EchidnaTermApp: ペネトレーションテスト支援・学習ツール.eng.srt 41.6 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/The security thing - Knowledge, skills, and two more things.eng.text 41.6 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/(In)Security of Japanese IT Asset Management Software.eng.vtt 41.5 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/(In)Security of Japanese IT Asset Management Software.eng.txt 41.5 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.lrc 41.5 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Defeating Firefox by Muneaki Nishimura.eng.vtt 41.3 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Defeating Firefox by Muneaki Nishimura.eng.txt 41.3 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/BSides Tokyo 2024.eng.srt 41.2 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.srt 41.2 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/(In)Security of Japanese IT Asset Management Software.eng.lrc 41.1 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Abusing Adobe Reader's JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.srt 41.1 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.vtt 41.0 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.txt 41.0 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.srt 41.0 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Kuniyasu Suzaki - DeviceDisEnabler.eng.srt 41.0 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Defeating Firefox by Muneaki Nishimura.eng.lrc 40.9 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.tsv 40.9 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.vtt 40.8 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.txt 40.8 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/CloudDragon’s Credential Factory is Powering Up Its Espionage Activities Against All the.eng.srt 40.8 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/PowerShell obfuskation Techniques & How To Detect Them by Daniel Bohannon.eng.text 40.8 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.srt 40.8 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.text 40.6 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.lrc 40.6 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.vtt 40.6 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.txt 40.6 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Hacking the Code Blue Seas Maritime Community Building Across the Pacific.eng.srt 40.5 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.lrc 40.5 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.tsv 40.4 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Life After Privacy Shield - Will Data Transfer Laws Stop the World Doing Business.eng.srt 40.4 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.text 40.4 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Who put the backdoor in my modem by Ewerson Guimaraes.eng.srt 40.3 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.vtt 40.2 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.txt 40.2 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.lrc 40.2 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Keynote - How much security is too much by Karsten Nohl.eng.tsv 40.1 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.text 39.9 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Androsia - A step ahead in securing in-memory Android application data.eng.tsv 39.9 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Hayabusa - Threat Hunting and Fast Forensics in Windows environments for free.eng.srt 39.9 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.text 39.9 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.srt 39.8 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.tsv 39.8 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.lrc 39.8 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.vtt 39.8 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.txt 39.8 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.srt 39.7 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Wireless security testing with attack by Keiichi Horiai.eng.tsv 39.7 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.vtt 39.6 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.txt 39.6 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Keynote1 - Ms. Audrey Guinchard.eng.srt 39.6 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Ninja Correlation of APT Binaries by Bhavna Soman.eng.srt 39.4 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Red light in the factory - From 0 to 100 OT adversary emulation.eng.srt 39.4 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.lrc 39.3 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.lrc 39.3 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.tsv 39.2 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Dissect Android Bluetooth for Fun & Profit by Jianjun Dai, Guang Gong.eng.srt 39.2 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.vtt 39.2 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.txt 39.1 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.vtt 39.1 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.txt 39.1 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Possibility of arbitrary code execution by Step-Oriented Programming.eng.vtt 39.0 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Possibility of arbitrary code execution by Step-Oriented Programming.eng.txt 39.0 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik.eng.srt 39.0 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.lrc 38.8 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Illicit QQ Communities What's Being Shared.eng.srt 38.8 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.tsv 38.8 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.text 38.7 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Possibility of arbitrary code execution by Step-Oriented Programming.eng.lrc 38.7 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.lrc 38.7 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.tsv 38.6 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.vtt 38.6 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.txt 38.6 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.text 38.5 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Takahiro Matsuki & Dennis Kengo Oka.eng.srt 38.5 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.srt 38.4 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.vtt 38.3 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.txt 38.3 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Preventing hard disk firmware manipulation attack and disaster recovery.eng.tsv 38.3 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.srt 38.3 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.lrc 38.3 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Intel Management Engine Secrets by Igor Skochinsky.eng.tsv 38.2 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.srt 38.2 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Who's guarding the gateway - by Nicole Beckwith.eng.srt 38.2 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.vtt 38.2 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.txt 38.2 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Wow, PESSR has Eroded Apple in Blink by Ju Zhu, Moony Li, Lilang Wu.eng.srt 38.2 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/Abusing legacy railroad signaling systems.eng.srt 38.2 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Esoteric Web Application Vulnerabilities by Andres Riancho.eng.vtt 38.1 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Esoteric Web Application Vulnerabilities by Andres Riancho.eng.txt 38.0 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.srt 38.0 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.tsv 38.0 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.lrc 38.0 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/The Lazarus Group's Attack Operations Targeting Japan.eng.srt 38.0 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.vtt 37.9 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.txt 37.9 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.tsv 37.9 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.lrc 37.8 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Privacy protection and Data breach incident response regulation in East Asia and Europe.eng.srt 37.7 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Esoteric Web Application Vulnerabilities by Andres Riancho.eng.lrc 37.7 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.text 37.5 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.lrc 37.5 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Defending Computer CriminalsPresented - Andrea Monti.eng.srt 37.4 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/New immune system of information security from CHINA by Xiaodun Fang.eng.text 37.3 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/(In)Security of Japanese IT Asset Management Software.eng.tsv 36.9 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Keynote The Singularity is Near by Takuya Matsuda.eng.text 36.9 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.vtt 36.8 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.txt 36.8 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.tsv 36.8 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Defeating Firefox by Muneaki Nishimura.eng.tsv 36.8 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.vtt 36.6 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.txt 36.6 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.vtt 36.5 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.txt 36.5 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.lrc 36.4 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.vtt 36.4 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.txt 36.4 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Fight Against Citadel in Japan by You Nakatsuru.eng.srt 36.4 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/DVB-T Hacking by Amihai Neiderman.eng.srt 36.3 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Be a Binary Rockstar by Sophia DAntoine.eng.srt 36.2 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.lrc 36.2 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.tsv 36.2 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.lrc 36.2 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.tsv 36.1 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.srt 36.1 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/SBOM and Security Transparency - How it all fits together.eng.srt 36.0 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.lrc 36.0 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Kuniyasu Suzaki - DeviceDisEnabler.eng.vtt 36.0 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Kuniyasu Suzaki - DeviceDisEnabler.eng.txt 36.0 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.tsv 36.0 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.vtt 35.6 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.tsv 35.6 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.txt 35.6 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Who put the backdoor in my modem by Ewerson Guimaraes.eng.vtt 35.6 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Who put the backdoor in my modem by Ewerson Guimaraes.eng.txt 35.6 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.tsv 35.6 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Kuniyasu Suzaki - DeviceDisEnabler.eng.lrc 35.5 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.srt 35.5 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.tsv 35.4 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim.eng.srt 35.3 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Dissecting China’s Information Operations with Threat Intelligence.eng.srt 35.3 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.lrc 35.2 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.srt 35.2 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.vtt 35.2 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Possibility of arbitrary code execution by Step-Oriented Programming.eng.tsv 35.2 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.txt 35.2 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Who put the backdoor in my modem by Ewerson Guimaraes.eng.lrc 35.1 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Let's Make Windows Defender Angry Antivirus can be an oracle by Ryo Ichikawa.eng.srt 34.9 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.lrc 34.9 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.tsv 34.9 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.vtt 34.9 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/George Hotz - Keynote - Make your car self-driving using open-source software.eng.text 34.9 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.txt 34.9 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/The Lazarus Group's Attack Operations Targeting Japan.eng.vtt 34.8 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/The Lazarus Group's Attack Operations Targeting Japan.eng.txt 34.8 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/NGateNovel Android malware for unauthorized ATM withdrawals via NFC relay.eng.srt 34.8 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.tsv 34.6 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.tsv 34.6 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/The Lazarus Group's Attack Operations Targeting Japan.eng.lrc 34.5 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.lrc 34.5 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Takahiro Matsuki & Dennis Kengo Oka.eng.vtt 34.5 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Takahiro Matsuki & Dennis Kengo Oka.eng.txt 34.5 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.vtt 34.4 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.txt 34.4 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.tsv 34.3 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Keynote - How much security is too much by Karsten Nohl.eng.text 34.3 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.lrc 34.1 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Takahiro Matsuki & Dennis Kengo Oka.eng.lrc 34.1 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Androsia - A step ahead in securing in-memory Android application data.eng.text 34.0 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.srt 34.0 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.tsv 33.9 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Detection index learning based on cyber threat intelligence and its application.eng.srt 33.8 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.text 33.8 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Esoteric Web Application Vulnerabilities by Andres Riancho.eng.tsv 33.8 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.text 33.7 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Closing adddress.eng.srt 33.6 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.text 33.3 KB
- CODE BLUE 2023/CODE BLUE 20123 captions/Pwning Electron Application - Analysis and Defense of Vulnerabilities in Electron Applications.eng.srt 33.3 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.tsv 33.2 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.vtt 33.2 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.txt 33.1 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.text 33.1 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Intel Management Engine Secrets by Igor Skochinsky.eng.text 33.0 KB
- CODE BLUE 2024/CODE BLUE 2024 captions/Modern SOCLess Than One and More Than Infinity.eng.srt 33.0 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.tsv 32.9 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Be a Binary Rockstar by Sophia DAntoine.eng.vtt 32.8 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Be a Binary Rockstar by Sophia DAntoine.eng.txt 32.8 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.text 32.7 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.lrc 32.7 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.text 32.7 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/DVB-T Hacking by Amihai Neiderman.eng.vtt 32.5 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/DVB-T Hacking by Amihai Neiderman.eng.txt 32.5 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Be a Binary Rockstar by Sophia DAntoine.eng.lrc 32.5 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Reverse Engineering archeology.eng.srt 32.5 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.text 32.3 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.text 32.3 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.tsv 32.3 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.vtt 32.3 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.txt 32.3 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Fight Against Citadel in Japan by You Nakatsuru.eng.vtt 32.2 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Fight Against Citadel in Japan by You Nakatsuru.eng.txt 32.2 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/DVB-T Hacking by Amihai Neiderman.eng.lrc 32.2 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.srt 32.1 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.vtt 32.0 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.lrc 32.0 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.txt 32.0 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.srt 31.9 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.srt 31.9 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.vtt 31.9 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.txt 31.9 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.srt 31.9 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Fight Against Citadel in Japan by You Nakatsuru.eng.lrc 31.8 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.text 31.8 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.tsv 31.8 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.lrc 31.7 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.tsv 31.7 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.tsv 31.6 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.lrc 31.5 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Wireless security testing with attack by Keiichi Horiai.eng.text 31.4 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/The Lazarus Group's Attack Operations Targeting Japan.eng.tsv 31.3 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.srt 31.2 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.text 31.1 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.tsv 31.0 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/(In)Security of Japanese IT Asset Management Software.eng.text 30.9 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Defeating Firefox by Muneaki Nishimura.eng.text 30.9 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Hunting kernel exploits with filesystem fuzzer.eng.srt 30.9 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.tsv 30.8 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.text 30.7 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.srt 30.6 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Kuniyasu Suzaki - DeviceDisEnabler.eng.tsv 30.5 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.tsv 30.5 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.srt 30.4 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.vtt 30.4 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.txt 30.4 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.text 30.4 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Who put the backdoor in my modem by Ewerson Guimaraes.eng.tsv 30.4 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Possibility of arbitrary code execution by Step-Oriented Programming.eng.text 30.3 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/説明可能な悪性ドメイン診断.eng.srt 30.1 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Detection index learning based on cyber threat intelligence and its application.eng.vtt 30.1 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Takahiro Matsuki & Dennis Kengo Oka.eng.tsv 30.1 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Detection index learning based on cyber threat intelligence and its application.eng.txt 30.1 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.lrc 30.1 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.srt 30.1 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Industroyer - biggest threat to industrial control systems since Stuxnet.eng.srt 30.0 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.text 29.9 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Reverse Engineering archeology.eng.vtt 29.8 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Reverse Engineering archeology.eng.txt 29.8 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.text 29.8 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Detection index learning based on cyber threat intelligence and its application.eng.lrc 29.8 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.srt 29.6 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.text 29.6 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Reverse Engineering archeology.eng.lrc 29.6 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.text 29.5 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Preventing hard disk firmware manipulation attack and disaster recovery.eng.text 29.4 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.text 29.1 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.vtt 29.1 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.txt 29.1 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Be a Binary Rockstar by Sophia DAntoine.eng.tsv 29.0 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.tsv 29.0 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.vtt 29.0 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.txt 29.0 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.vtt 29.0 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.txt 29.0 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.lrc 28.8 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.text 28.7 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.lrc 28.7 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.lrc 28.7 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.vtt 28.6 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.txt 28.6 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embeddedeng.srt 28.6 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.text 28.4 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.text 28.3 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.lrc 28.3 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/DVB-T Hacking by Amihai Neiderman.eng.tsv 28.3 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Esoteric Web Application Vulnerabilities by Andres Riancho.eng.text 28.2 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.vtt 28.2 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.txt 28.2 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.text 28.2 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.tsv 28.1 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.lrc 27.9 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.vtt 27.9 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.txt 27.8 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/説明可能な悪性ドメイン診断.eng.vtt 27.7 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/説明可能な悪性ドメイン診断.eng.txt 27.7 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Fight Against Citadel in Japan by You Nakatsuru.eng.tsv 27.7 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.vtt 27.7 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.txt 27.7 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.lrc 27.6 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.srt 27.6 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.srt 27.6 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Industroyer - biggest threat to industrial control systems since Stuxnet.eng.vtt 27.6 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Industroyer - biggest threat to industrial control systems since Stuxnet.eng.txt 27.5 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.tsv 27.5 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.vtt 27.5 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.txt 27.5 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/説明可能な悪性ドメイン診断.eng.lrc 27.5 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.text 27.5 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.lrc 27.4 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.text 27.3 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Industroyer - biggest threat to industrial control systems since Stuxnet.eng.lrc 27.3 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.tsv 27.3 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.text 27.3 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.vtt 27.3 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.txt 27.2 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.srt 27.2 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.lrc 27.2 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/COFI break by Ron Shina & Shlomi Oberman.eng.srt 27.1 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.lrc 27.0 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/The Lazarus Group's Attack Operations Targeting Japan.eng.text 26.8 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Reverse Engineering archeology.eng.tsv 26.8 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.tsv 26.5 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.text 26.4 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.srt 26.1 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Vulnerabilities of Machine Learning Infrastructure.eng.srt 26.0 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Detection index learning based on cyber threat intelligence and its application.eng.tsv 26.0 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.srt 25.9 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.tsv 25.8 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.text 25.8 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.srt 25.6 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.tsv 25.6 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.text 25.5 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.tsv 25.4 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.tsv 25.4 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.vtt 25.4 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.text 25.4 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.txt 25.3 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.srt 25.2 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.text 25.2 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/COFI break by Ron Shina & Shlomi Oberman.eng.vtt 25.1 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.lrc 25.1 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/COFI break by Ron Shina & Shlomi Oberman.eng.txt 25.1 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/A new exploitation method to bypass stack canaries by Yuki Koike.eng.srt 25.1 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.json 25.1 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.vtt 25.1 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.txt 25.1 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.text 25.1 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/COFI break by Ron Shina & Shlomi Oberman.eng.lrc 24.9 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.lrc 24.9 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/説明可能な悪性ドメイン診断.eng.tsv 24.9 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.tsv 24.9 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.srt 24.8 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.tsv 24.8 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.text 24.8 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.vtt 24.7 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Industroyer - biggest threat to industrial control systems since Stuxnet.eng.tsv 24.7 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.txt 24.7 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.tsv 24.5 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.lrc 24.5 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.tsv 24.4 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Takahiro Matsuki & Dennis Kengo Oka.eng.text 24.4 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Be a Binary Rockstar by Sophia DAntoine.eng.text 24.2 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/SOARによるセキュリティ監視業務の効率化とSecOps.eng.srt 24.2 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.srt 24.1 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.tsv 24.0 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.srt 24.0 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/[BB] FileInsight-plugins Decoding toolbox for malware analysis by Nobutaka Mantani.eng.srt 23.8 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.srt 23.8 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Vulnerabilities of Machine Learning Infrastructure.eng.vtt 23.8 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Vulnerabilities of Machine Learning Infrastructure.eng.txt 23.7 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.srt 23.7 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/Who put the backdoor in my modem by Ewerson Guimaraes.eng.text 23.7 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.vtt 23.6 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.txt 23.6 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Kuniyasu Suzaki - DeviceDisEnabler.eng.text 23.5 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Vulnerabilities of Machine Learning Infrastructure.eng.lrc 23.5 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.vtt 23.5 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.txt 23.5 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Ipa-medit Memory modification tool for iOS apps without Jailbreaking.eng.srt 23.4 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.srt 23.4 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.lrc 23.3 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.lrc 23.3 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.text 23.2 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.vtt 23.2 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.txt 23.2 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Reverse Engineering archeology.eng.text 23.1 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/DVB-T Hacking by Amihai Neiderman.eng.text 23.0 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.lrc 23.0 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Ethereum 2.0のセキュリティ.eng.srt 23.0 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.vtt 22.9 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.txt 22.9 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.tsv 22.8 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/COFI break by Ron Shina & Shlomi Oberman.eng.tsv 22.8 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Alliance power for Cyber Security.eng.srt 22.7 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/A new exploitation method to bypass stack canaries by Yuki Koike.eng.vtt 22.7 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/A new exploitation method to bypass stack canaries by Yuki Koike.eng.txt 22.7 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.vtt 22.6 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.txt 22.6 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.lrc 22.6 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.tsv 22.6 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.srt 22.5 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/A new exploitation method to bypass stack canaries by Yuki Koike.eng.lrc 22.5 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.lrc 22.4 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.srt 22.2 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.text 22.2 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/SOARによるセキュリティ監視業務の効率化とSecOps.eng.vtt 22.1 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/SOARによるセキュリティ監視業務の効率化とSecOps.eng.txt 22.1 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/libinjection - from SQLi to XSS by Nick Galbreath.eng.srt 22.1 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.vtt 22.0 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/SOARによるセキュリティ監視業務の効率化とSecOps.eng.lrc 21.9 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.txt 21.9 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.text 21.9 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.vtt 21.8 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.txt 21.8 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/Fight Against Citadel in Japan by You Nakatsuru.eng.text 21.7 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.lrc 21.7 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.lrc 21.6 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/説明可能な悪性ドメイン診断.eng.text 21.5 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.text 21.5 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.text 21.5 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.vtt 21.4 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.tsv 21.4 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.txt 21.4 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.text 21.4 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.vtt 21.4 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.txt 21.4 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.vtt 21.3 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.txt 21.3 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Industroyer - biggest threat to industrial control systems since Stuxnet.eng.text 21.3 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.lrc 21.2 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.lrc 21.1 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Vulnerabilities of Machine Learning Infrastructure.eng.tsv 21.1 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.text 21.1 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.lrc 21.1 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.text 21.0 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.vtt 21.0 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.txt 21.0 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.lrc 20.9 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Ethereum 2.0のセキュリティ.eng.vtt 20.8 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Ethereum 2.0のセキュリティ.eng.txt 20.8 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.tsv 20.8 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Detection index learning based on cyber threat intelligence and its application.eng.text 20.8 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.tsv 20.7 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.tsv 20.6 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Ethereum 2.0のセキュリティ.eng.lrc 20.6 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.text 20.6 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.text 20.6 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.text 20.4 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.vtt 20.2 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.txt 20.2 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.text 20.2 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.tsv 20.0 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.lrc 20.0 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/A new exploitation method to bypass stack canaries by Yuki Koike.eng.tsv 19.9 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/COFI break by Ron Shina & Shlomi Oberman.eng.text 19.9 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.tsv 19.7 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/SOARによるセキュリティ監視業務の効率化とSecOps.eng.tsv 19.7 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.text 19.7 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.text 19.7 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.text 19.5 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.tsv 19.4 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.tsv 19.4 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.srt 19.4 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.tsv 19.2 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.tsv 19.1 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.tsv 18.5 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Ethereum 2.0のセキュリティ.eng.tsv 18.3 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.tsv 18.3 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.text 18.0 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Vulnerabilities of Machine Learning Infrastructure.eng.text 17.9 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.tsv 17.8 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.vtt 17.5 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.txt 17.5 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.text 17.4 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.lrc 17.3 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.srt 17.3 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.srt 17.3 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.text 17.2 KB
- CODE BLUE 2016/CODE BLUE 2016 captions/House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.text 17.2 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.text 17.0 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/MalCfgParser A Lightweight Malware Configuration Parsing Tool.eng.srt 17.0 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.text 16.9 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/SOARによるセキュリティ監視業務の効率化とSecOps.eng.text 16.9 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/A new exploitation method to bypass stack canaries by Yuki Koike.eng.text 16.6 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.text 16.6 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.text 16.3 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.srt 16.3 KB
- CODE BLUE 2013/CODE BLUE 2013 captions/HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.text 16.3 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.srt 16.2 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.vtt 15.9 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.txt 15.9 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.text 15.8 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.lrc 15.8 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.vtt 15.5 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.txt 15.5 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.lrc 15.3 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Ethereum 2.0のセキュリティ.eng.text 15.3 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.tsv 15.3 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.text 15.1 KB
- CODE BLUE 2015/CODE BLUE 2015 captions/[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.text 14.8 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.vtt 14.8 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.txt 14.8 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Apk-medit memory search and patch tool for APK without root & android NDK.eng.srt 14.7 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.lrc 14.7 KB
- CODE BLUE 2014/CODE BLUE 2014 captions/Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.text 14.6 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.vtt 14.5 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.txt 14.5 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.lrc 14.3 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.tsv 14.2 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Opening.eng.srt 13.8 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.tsv 13.4 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.tsv 13.0 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.text 12.8 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.tsv 12.4 KB
- CODE BLUE 2022/CODE BLUE 2022 captions/Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.text 12.2 KB
- CODE BLUE 2020/CODE BLUE 2020 captions/Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.text 10.9 KB
- CODE BLUE 2019/CODE BLUE 2019 captions/Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.text 10.9 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Event Closing.eng.srt 10.9 KB
- CODE BLUE 2018/CODE BLUE 2018 captions/RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.text 10.1 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Event Closing.eng.vtt 9.8 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Event Closing.eng.txt 9.7 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Event Closing.eng.lrc 9.6 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day1 Opening.eng.srt 8.9 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Event Closing.eng.tsv 8.2 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day1 Opening.eng.vtt 7.9 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day1 Opening.eng.txt 7.9 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day1 Opening.eng.lrc 7.8 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Opening.eng.srt 6.7 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Event Closing.eng.text 6.6 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day1 Opening.eng.tsv 6.5 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Opening.eng.vtt 5.9 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Opening.eng.txt 5.9 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Opening.eng.lrc 5.8 KB
- Code Blue logo.jpg 5.5 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Online Closing.eng.srt 5.4 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day1 Opening.eng.text 4.9 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Online Closing.eng.vtt 4.9 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Online Closing.eng.txt 4.9 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Online Closing.eng.lrc 4.9 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Opening.eng.tsv 4.8 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Online Closing.eng.tsv 4.3 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Opening.eng.text 3.7 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day2 Online Closing.eng.text 3.6 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day1 Closing.eng.srt 2.4 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day1 Closing.eng.vtt 2.1 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day1 Closing.eng.txt 2.1 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day1 Closing.eng.lrc 2.1 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day1 Closing.eng.tsv 1.7 KB
- CODE BLUE 2021/CODE BLUE 2021 captions/Day1 Closing.eng.text 1.3 KB
- CODE BLUE thank you.txt 1.0 KB
- CODE BLUE 2017/CODE BLUE 2017 captions/Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.srt 887 bytes
- CODE BLUE 2017/CODE BLUE 2017 captions/Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.vtt 796 bytes
- CODE BLUE 2017/CODE BLUE 2017 captions/Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.txt 786 bytes
- CODE BLUE 2017/CODE BLUE 2017 captions/Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.lrc 775 bytes
- HEADER.md 638 bytes
- CODE BLUE 2017/CODE BLUE 2017 captions/Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.tsv 634 bytes
- CODE BLUE 2017/CODE BLUE 2017 captions/Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.text 489 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.