Time

Track #1

Track #2

Track #3

VIP

09:00~10:00

(1HR)

registration

10:00~10:50

(50Min)

Keynote #1 Prof. Seungjoo Kim
Combination of Crypto and Hacking, Possible?
- Theory must be integrated with practice, and vice versa -

10:50~11:20

(30Min)

Open Ceremony

11:20~12:10

(50Min)

Keynote #2 ̽(beist)
Issues of illegal copy and unauthorized use for source code copyright

12:10~13:00

(50Min)

Lunch

13:00~13:50

(50Min)

Won-hyuk Choi

APT attack case analysis using the vulnerability of Hanword and it's countermeasure

Ȼȯ Sang-hwan Ahn

How to find vulnerability

in software

attorney Tae-Eon Koo
(the representative attorney of TEK & LAW)

A new security paradigm based on the revised Act of electronic financial transaction

Director Kyu-min Cho (KISA)

Privacy Guidelines of Financial Sector

13:50~14:40

(50Min)

Byungho Min

Security of anti-virus solutions

Jung-hoon Shin (sjh21a)

Hacking Smart Devices

(I just drank c0ffee only!)

14:40~15:00

(20Min)

Break Time

15:00~15:50

(50Min)

Heung-soo Kang (jz)

Sandbox for security

(Understanding sandbox

and attack examples)

Samuel Koo (dual5651)

Development & Analysis of Korean-style botnet

Kiyoung Kim (Ahnlab)

GAP

15:50~16:40

(50Min)

Long Le

Exploiting nginx

chunked overflow bug,

the undisclosed attack vector

Sang-keun Jang (maxoverpro)

Mobile Game Hacking

and Defense Strategy

Joo-ho Lee (Koscom)

Reference model of financial privacy, Security-oriented development process

16:40~17:30

(50Min)

Dong-hun You (x82)

Writing ARM32 Linux kernel Exploitation

 

17:30~18:00

(30Min)

Competition Winners Awards, Ceremony and Sweepstakes

ϴܺ
          

 

HARU&SECUINSIDE. All Rights Reserved.