ºÝºÝߣshows by User: Bletchley131 / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: Bletchley131 / Mon, 12 Mar 2018 09:21:52 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: Bletchley131 Cgc2 /slideshow/cgc2-90370533/90370533 cgc2-180312092152
CGC long version]]>

CGC long version]]>
Mon, 12 Mar 2018 09:21:52 GMT /slideshow/cgc2-90370533/90370533 Bletchley131@slideshare.net(Bletchley131) Cgc2 Bletchley131 CGC long version <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cgc2-180312092152-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> CGC long version
Cgc2 from Chong-Kuan Chen
]]>
412 3 https://cdn.slidesharecdn.com/ss_thumbnails/cgc2-180312092152-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DARPA CGC and DEFCON CTF: Automatic Attack and Defense Technique /slideshow/darpa-cgc-and-defcon-ctf-automatic-attack-and-defense-technique/70311770 cgc-161220165406
Organize some technique used in DARPA CGC]]>

Organize some technique used in DARPA CGC]]>
Tue, 20 Dec 2016 16:54:06 GMT /slideshow/darpa-cgc-and-defcon-ctf-automatic-attack-and-defense-technique/70311770 Bletchley131@slideshare.net(Bletchley131) DARPA CGC and DEFCON CTF: Automatic Attack and Defense Technique Bletchley131 Organize some technique used in DARPA CGC <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cgc-161220165406-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Organize some technique used in DARPA CGC
DARPA CGC and DEFCON CTF: Automatic Attack and Defense Technique from Chong-Kuan Chen
]]>
3104 6 https://cdn.slidesharecdn.com/ss_thumbnails/cgc-161220165406-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Compilation and Execution /slideshow/compilation-and-execution/55256997 presentation1-151118153939-lva1-app6892
About static/dynamic link, ELF format, lazy binding,...]]>

About static/dynamic link, ELF format, lazy binding,...]]>
Wed, 18 Nov 2015 15:39:39 GMT /slideshow/compilation-and-execution/55256997 Bletchley131@slideshare.net(Bletchley131) Compilation and Execution Bletchley131 About static/dynamic link, ELF format, lazy binding,... <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation1-151118153939-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> About static/dynamic link, ELF format, lazy binding,...
Compilation and Execution from Chong-Kuan Chen
]]>
1275 4 https://cdn.slidesharecdn.com/ss_thumbnails/presentation1-151118153939-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Oram And Secure Computation /slideshow/oram-and-secure-computation/55256876 oramsecurecomputation-151118153655-lva1-app6891
This is some talk in NCTU DSNSLab. The topic is about ORAM and Secure Computation.]]>

This is some talk in NCTU DSNSLab. The topic is about ORAM and Secure Computation.]]>
Wed, 18 Nov 2015 15:36:55 GMT /slideshow/oram-and-secure-computation/55256876 Bletchley131@slideshare.net(Bletchley131) Oram And Secure Computation Bletchley131 This is some talk in NCTU DSNSLab. The topic is about ORAM and Secure Computation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/oramsecurecomputation-151118153655-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is some talk in NCTU DSNSLab. The topic is about ORAM and Secure Computation.
Oram And Secure Computation from Chong-Kuan Chen
]]>
779 4 https://cdn.slidesharecdn.com/ss_thumbnails/oramsecurecomputation-151118153655-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Mem forensic /slideshow/mem-forensic/55253893 memforensic-151118142803-lva1-app6891
The material of Computer Security Practice in NCTU 2015 Fall.]]>

The material of Computer Security Practice in NCTU 2015 Fall.]]>
Wed, 18 Nov 2015 14:28:03 GMT /slideshow/mem-forensic/55253893 Bletchley131@slideshare.net(Bletchley131) Mem forensic Bletchley131 The material of Computer Security Practice in NCTU 2015 Fall. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/memforensic-151118142803-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The material of Computer Security Practice in NCTU 2015 Fall.
Mem forensic from Chong-Kuan Chen
]]>
714 5 https://cdn.slidesharecdn.com/ss_thumbnails/memforensic-151118142803-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Addios! /slideshow/addios/53869435 addios-151013102955-lva1-app6892
Usenix 2015 study]]>

Usenix 2015 study]]>
Tue, 13 Oct 2015 10:29:55 GMT /slideshow/addios/53869435 Bletchley131@slideshare.net(Bletchley131) Addios! Bletchley131 Usenix 2015 study <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/addios-151013102955-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Usenix 2015 study
Addios! from Chong-Kuan Chen
]]>
885 4 https://cdn.slidesharecdn.com/ss_thumbnails/addios-151013102955-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security events in 2014 /slideshow/security-events-in-2014/47699705 securityeventsin2014-150503114725-conversion-gate01
Some of important security issue in 2014]]>

Some of important security issue in 2014]]>
Sun, 03 May 2015 11:47:25 GMT /slideshow/security-events-in-2014/47699705 Bletchley131@slideshare.net(Bletchley131) Security events in 2014 Bletchley131 Some of important security issue in 2014 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securityeventsin2014-150503114725-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Some of important security issue in 2014
Security events in 2014 from Chong-Kuan Chen
]]>
1290 5 https://cdn.slidesharecdn.com/ss_thumbnails/securityeventsin2014-150503114725-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Automatic tool for static analysis /slideshow/automatic-tool-for-static-analysis/39863582 automatictoolforstaticanalysis-141004013308-conversion-gate02
How to use ClamAV and Yara]]>

How to use ClamAV and Yara]]>
Sat, 04 Oct 2014 01:33:08 GMT /slideshow/automatic-tool-for-static-analysis/39863582 Bletchley131@slideshare.net(Bletchley131) Automatic tool for static analysis Bletchley131 How to use ClamAV and Yara <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/automatictoolforstaticanalysis-141004013308-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to use ClamAV and Yara
Automatic tool for static analysis from Chong-Kuan Chen
]]>
1380 1 https://cdn.slidesharecdn.com/ss_thumbnails/automatictoolforstaticanalysis-141004013308-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Intro. to static analysis /slideshow/intro-to-static-analysis/39863525 intro-141004012900-conversion-gate02
Basic Static Analysis to Understand Program]]>

Basic Static Analysis to Understand Program]]>
Sat, 04 Oct 2014 01:29:00 GMT /slideshow/intro-to-static-analysis/39863525 Bletchley131@slideshare.net(Bletchley131) Intro. to static analysis Bletchley131 Basic Static Analysis to Understand Program <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/intro-141004012900-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Basic Static Analysis to Understand Program
Intro. to static analysis from Chong-Kuan Chen
]]>
980 2 https://cdn.slidesharecdn.com/ss_thumbnails/intro-141004012900-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Android Application Security /slideshow/android-application-security/38797378 androidapplicationsecurity-140907123144-phpapp02
Describe the common vuln of android app]]>

Describe the common vuln of android app]]>
Sun, 07 Sep 2014 12:31:44 GMT /slideshow/android-application-security/38797378 Bletchley131@slideshare.net(Bletchley131) Android Application Security Bletchley131 Describe the common vuln of android app <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/androidapplicationsecurity-140907123144-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Describe the common vuln of android app
Android Application Security from Chong-Kuan Chen
]]>
1223 2 https://cdn.slidesharecdn.com/ss_thumbnails/androidapplicationsecurity-140907123144-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Android system security /slideshow/android-system-security/38797351 androidsystemsecurity-140907123014-phpapp02
Discuss the threat about android system]]>

Discuss the threat about android system]]>
Sun, 07 Sep 2014 12:30:14 GMT /slideshow/android-system-security/38797351 Bletchley131@slideshare.net(Bletchley131) Android system security Bletchley131 Discuss the threat about android system <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/androidsystemsecurity-140907123014-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Discuss the threat about android system
Android system security from Chong-Kuan Chen
]]>
1334 4 https://cdn.slidesharecdn.com/ss_thumbnails/androidsystemsecurity-140907123014-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
HITCON CTF 2014 BambooFox ½âî}Ðĵ÷ÖÏí /slideshow/hitcon-ctf-2014-bamboofox/38262732 hitcon14ctf-140822125344-phpapp02
This is about the experience in HITCON 2014.]]>

This is about the experience in HITCON 2014.]]>
Fri, 22 Aug 2014 12:53:43 GMT /slideshow/hitcon-ctf-2014-bamboofox/38262732 Bletchley131@slideshare.net(Bletchley131) HITCON CTF 2014 BambooFox ½âî}Ðĵ÷ÖÏí Bletchley131 This is about the experience in HITCON 2014. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hitcon14ctf-140822125344-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is about the experience in HITCON 2014.
HITCON CTF 2014 BambooFox ½âî}Ðĵ÷ÖÏí from Chong-Kuan Chen
]]>
7869 5 https://cdn.slidesharecdn.com/ss_thumbnails/hitcon14ctf-140822125344-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
?Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis /slideshow/inside-the-matrixhow-to-build-transparent-sandbox-for-malware-analysis/38262420 insidethevm-140822124259-phpapp02
It's presentation in HITCON 2014. ]]>

It's presentation in HITCON 2014. ]]>
Fri, 22 Aug 2014 12:42:59 GMT /slideshow/inside-the-matrixhow-to-build-transparent-sandbox-for-malware-analysis/38262420 Bletchley131@slideshare.net(Bletchley131) ?Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis Bletchley131 It's presentation in HITCON 2014. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/insidethevm-140822124259-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> It&#39;s presentation in HITCON 2014.
?Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis from Chong-Kuan Chen
]]>
1777 3 https://cdn.slidesharecdn.com/ss_thumbnails/insidethevm-140822124259-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Become A Security Master /slideshow/become-securitymaster/36161140 becomesecuritymaster-140622084655-phpapp01
The resource help you to learn information security]]>

The resource help you to learn information security]]>
Sun, 22 Jun 2014 08:46:55 GMT /slideshow/become-securitymaster/36161140 Bletchley131@slideshare.net(Bletchley131) Become A Security Master Bletchley131 The resource help you to learn information security <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/becomesecuritymaster-140622084655-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The resource help you to learn information security
Become A Security Master from Chong-Kuan Chen
]]>
5948 6 https://cdn.slidesharecdn.com/ss_thumbnails/becomesecuritymaster-140622084655-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Malware Detection - ?A Machine Learning Perspective /Bletchley131/malware-detection-machine-learning malwaredetectionmachinelearning-140603000132-phpapp01
Summary of some research papers about machine learning applied in malware detection]]>

Summary of some research papers about machine learning applied in malware detection]]>
Tue, 03 Jun 2014 00:01:32 GMT /Bletchley131/malware-detection-machine-learning Bletchley131@slideshare.net(Bletchley131) Malware Detection - ?A Machine Learning Perspective Bletchley131 Summary of some research papers about machine learning applied in malware detection <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/malwaredetectionmachinelearning-140603000132-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Summary of some research papers about machine learning applied in malware detection
Malware Detection - A Machine Learning Perspective from Chong-Kuan Chen
]]>
6501 5 https://cdn.slidesharecdn.com/ss_thumbnails/malwaredetectionmachinelearning-140603000132-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Malware collection and analysis /slideshow/malware-collection/35152575 malwarecollection-140527004103-phpapp01
]]>

]]>
Tue, 27 May 2014 00:41:03 GMT /slideshow/malware-collection/35152575 Bletchley131@slideshare.net(Bletchley131) Malware collection and analysis Bletchley131 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/malwarecollection-140527004103-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Malware collection and analysis from Chong-Kuan Chen
]]>
1812 3 https://cdn.slidesharecdn.com/ss_thumbnails/malwarecollection-140527004103-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Malware classification and detection /slideshow/malware-classificationanddetection/35152572 malwareclassificationanddetection-140527004056-phpapp01
]]>

]]>
Tue, 27 May 2014 00:40:56 GMT /slideshow/malware-classificationanddetection/35152572 Bletchley131@slideshare.net(Bletchley131) Malware classification and detection Bletchley131 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/malwareclassificationanddetection-140527004056-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Malware classification and detection from Chong-Kuan Chen
]]>
6085 6 https://cdn.slidesharecdn.com/ss_thumbnails/malwareclassificationanddetection-140527004056-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
2012 S&P Paper Reading Session1 /slideshow/20120816-sp-systemsecuritybletchley/35152570 20120816spsystemsecuritybletchley-140527004051-phpapp02
]]>

]]>
Tue, 27 May 2014 00:40:51 GMT /slideshow/20120816-sp-systemsecuritybletchley/35152570 Bletchley131@slideshare.net(Bletchley131) 2012 S&P Paper Reading Session1 Bletchley131 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20120816spsystemsecuritybletchley-140527004051-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
2012 S&P Paper Reading Session1 from Chong-Kuan Chen
]]>
513 5 https://cdn.slidesharecdn.com/ss_thumbnails/20120816spsystemsecuritybletchley-140527004051-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-Bletchley131-48x48.jpg?cb=1592061587 Google Site: https://sites.google.com/site/bletchleypark2/ GitHub: https://github.com/Bletchley13 2014 Lecturer of "Android Application Security & Android System Security" in Telecom Technology Center 2014 Lecturer of "Cloud System Security" Short Course in Yuan Ze University 2014 Lecturer of "Malware Analysis Workshop" in Yuan Ze University https://sites.google.com/site/bletchleypark2/ https://cdn.slidesharecdn.com/ss_thumbnails/cgc2-180312092152-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cgc2-90370533/90370533 Cgc2 https://cdn.slidesharecdn.com/ss_thumbnails/cgc-161220165406-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/darpa-cgc-and-defcon-ctf-automatic-attack-and-defense-technique/70311770 DARPA CGC and DEFCON C... https://cdn.slidesharecdn.com/ss_thumbnails/presentation1-151118153939-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/compilation-and-execution/55256997 Compilation and Execution