Timetable

Main Track

Workshop Track

Conference Day

10:00
11:00
12:00
09:30 - 10:00  Registration
10:00 - 10:10  Opening Remarks
10:10 - 10:30 Presentation

The Betrayed Update: Beyond the Signpost

Speaker: 山本 高弘

10:40 - 11:20 Presentation

Knife Cutting the Edge: Dissecting A Gateway Surveillance & MitM Framework

Speaker: Chi-en “Ashley” Shen

11:30 - 12:10 Presentation

The Return of Old Forces: Revealing New Campaigns Connected to A Missing Cyber Mercenary Firm

Speaker: Joseph Chen

10:10 - 12:10 Workshop

Workshop: Leveraging EML Analyzer to triage malicious email messages during incident response

Speaker: 二関 学, Michał Praszmo

12:10 - 13:20  Lunch Break
14:00
15:00
16:00
17:00
18:00
13:20-14:00 Presentation

Attribution in Action: A Case Study of an Incident Involving Multiple Activity Clusters

Speaker: 原 弘明, Doel Santos

14:10-14:50 Presentation

Ghost in Your Network: How Earth Kurma Stays Hidden and Exfiltrates Your Data

Speaker: Nick Dai, Sunny W Lu

15:00-15:40 Presentation

進化を続けるTianwuのマルウェアPangolin8RATおよびカスタムCobalt Strike Beacon

Speaker: 高山 尚樹

15:40 - 16:10
Coffee Break
16:10-16:50 Presentation

Incident Response at the Edge: Unmasking the Massive Exploitation of Ivanti

Speaker: Greg Chen, Sharon Liu

17:00 - 17:40 Presentation

Infrastructure-less Adversary: C2 Laundering via Dead-Drop Resolvers and the Microsoft Graph API

Speaker: Wei-Chieh Chao, Shih-Min Chan

17:50 - 18:10 Presentation

Konni’s New Arsenal: Unmasking GSRAT in North Korea-linked APT Operation

Speaker: 松本 拓馬, 石川 芳浩

13:20 - 18:00 Workshop

Workshop: Advanced Malware Reverse Engineering: Dealing with anti analysis techniques from scratch.

Speaker: Mark Lim

15:20 - 15:50
Coffee Break
13:20 - 18:00 Workshop

Workshop: Advanced Malware Reverse Engineering: Dealing with anti analysis techniques from scratch.

Speaker: Mark Lim

※ タイムテーブルは変更される可能性があります / Schedule subject to change