Timetable
Main Track
Workshop Track
Conference Day
10:00
11:00
12:00
09:30 - 10:00
Registration
10:00 - 10:10
Opening Remarks
10:10 - 10:30
Presentation
The Betrayed Update: Beyond the Signpost
Speaker: 山本 高弘
10:40 - 11:20
Presentation
Knife Cutting the Edge: Dissecting A Gateway Surveillance & MitM Framework
Speaker: Chi-en “Ashley” Shen
11:30 - 12:10
Presentation
The Return of Old Forces: Revealing New Campaigns Connected to A Missing Cyber Mercenary Firm
Speaker: Joseph Chen
10:10 - 12:10
Workshop
Workshop: Leveraging EML Analyzer to triage malicious email messages during incident response
Speaker: 二関 学, Michał Praszmo
12:10 - 13:20
Lunch Break
14:00
15:00
16:00
17:00
18:00
13:20-14:00
Presentation
Attribution in Action: A Case Study of an Incident Involving Multiple Activity Clusters
Speaker: 原 弘明, Doel Santos
14:10-14:50
Presentation
Ghost in Your Network: How Earth Kurma Stays Hidden and Exfiltrates Your Data
Speaker: Nick Dai, Sunny W Lu
15:00-15:40
Presentation
進化を続けるTianwuのマルウェアPangolin8RATおよびカスタムCobalt Strike Beacon
Speaker: 高山 尚樹
15:40 - 16:10
16:10-16:50
Presentation
Incident Response at the Edge: Unmasking the Massive Exploitation of Ivanti
Speaker: Greg Chen, Sharon Liu
17:00 - 17:40
Presentation
Infrastructure-less Adversary: C2 Laundering via Dead-Drop Resolvers and the Microsoft Graph API
Speaker: Wei-Chieh Chao, Shih-Min Chan
17:50 - 18:10
Presentation
Konni’s New Arsenal: Unmasking GSRAT in North Korea-linked APT Operation
Speaker: 松本 拓馬, 石川 芳浩
13:20 - 18:00
Workshop
Workshop: Advanced Malware Reverse Engineering: Dealing with anti analysis techniques from scratch.
Speaker: Mark Lim
15:20 - 15:50
13:20 - 18:00
Workshop
Workshop: Advanced Malware Reverse Engineering: Dealing with anti analysis techniques from scratch.
Speaker: Mark Lim
※ タイムテーブルは変更される可能性があります / Schedule subject to change