Personal Information
Organization / Workplace
Tokyo Japan
Industry
Presentations / Communications
Website
About
- International Security Conference in Tokyo -
World leading security researchers will come together for this unique international conference in Tokyo.
At this conference, CODE BLUE plan to aggregate a wide range of innovative and creative research topics and presentations all aspects of information security.
CODE BLUE look forward on this conference activities that will bring together domestic and international researchers, bridge research with industry and cultivate information security personnel who can take an active role on a global scale.
Contact Details
Tags
code blue
cb16
security
code blue 2017
codeblue
cb19
web security
malware
apt
iot
xss
reverse engineering
binary analysis
vulnerability
hardware
forensic
kernel
network
embedded
automotive security
u24
fuzzing
exploits
dalvik
scada
remote exploits
national security
osx
bug bounty
machine learning
javascript
backdoor
sf
binary
education
keynote
android kernel
exploit development
u25
webos forensics
digital forensics investigation
bug hunter
power shell
ai
smart tv
medical devices
msoffice
master key
software protection
china
wireless
smartgrid
windows 10
targeted attack
adobe
side channel attack
api
fuzzy hash
cryptanalysis
ids
zero-day market
devops
whitebox cryptography
rootkit
efi
auto security system
cyber grand challenge (cgc)
dns
cb18
igor skochinsky
intel management engine
chris valasek
static analysis
chris eagle
ctf
hacking
appsec
celil unuver
citadel
industrial security
html5
tomoyuki shigemori
vulnerability research
vmware
linux security
nick galbreath
sqli
libinjection
ida pro
masaaki chida
kenji toda
security barrier device
sbd
mac
anti-malware
amsi
android
botnet
risk management
innovation
forensics
current status
web application security
scanner
client fingerprinting
root exploit
vpn
crypto
police
bot
neutralize
atm
buffer overflow
http/2
auto exploit
windows
debug stub
debugger
vulnerability detection
automation
security evaluation
software testing
remote debug
web
auto vul scan
smart auto mobile
bluetooth
gc root
memory leak
exploit
sns
hardware control
phishing
incident response
vulnerability hunt
jeff moss
dai shimogaito
public-private relationship
yuu nakatsuru
you nakatsuru
重森友行
europen union
mitm
hacking tool
nfc
0day
linux
monitor attackers activity
networking with home electronics
yoshihiro horibe
堀部千寿
ネットワーク家电
yuhei otsubo
yuhei ootsubo
hdd disaster recovery
european union
public private relationship
自动车セキュリティ
ukraine
大坪雄平
标的型攻撃
o-checker
protocol smuggling
local priviledge escalating
singurarity
distributed
singularity
distoributed
future countermeasure
future countermeasures
information security
firefox
fifefox
espionage
immunesystem
immune system
static code analysis
live variable analysis
data-flow analysis
e-estonia
e-state
ssrf
obfuscation
seok ha lee
wh1ant
seok-ha lee
sandbox
ニック?ガルブレス
mobile
jailbreak
binaly analysis
networked home appliances
yukihisa horibe
ios
internet security
public health security
u20
network security
virtualization
See more
Users following CODE BLUE