|Presentation1||14:00-14:40||Lee Gun Young||Dream Security Co., Ltd. Director (CTO)
Completed his Ph.D. in computer engineering from Ajou University
|IoT security service via analyzing into Smart City cases|
|Opposing Force, CTO||Dissecting Smart City Security|
|Presentation3||15:20-16:00||Martin tom-Petersen||Smart City Catalyst(SCC) CEO||The real insider threat in smart cities|
|Presentation4||16:00-16:40||Lee Hwi Won||Agency for Defense Development||IoT Hub Vulnerability Analysis and Home Service Security Threats and Countermeasures|
|Park Chang Hyun||EY Han Young|
|Presentation5||16:40-17:20||Jung Hyun Chul||Korea Server Hosting||Cloud Service Risk Management|
|Presentation1||14:00-14:50||Choi I Joo||Seoul Womens University information Security bachelor's degree||Researching of Robot Security with ROS(Robot Operating System) Vulnerability Analysis|
|Han Jeong Hun||GrayHash
|Presentation2||14:50-15:40||Jang Moon Su||National Research Council of Science & Technology Cyber Security Training Center head of a department
POSTECH M.Sc (Information Security major)
|National Security Technology Institute Cyberspace Defense Council and Outage Plan|
|Presentation3||16:00-16:40||Kim Jung Nyeo||ETRI||Smart Home / City IoT Security Infrastructure and Next Generation IoT Security Technologies|
|Presentation4||16:30-17:20||Cho Seong Jun||Hanyang University ComputerSoftware undergraduate studies||Smart Home Hacking in Real World|
|Park Sang Hyun||Kyonggi University Convergence Security department|
[Team : OWL] Choi I Joo / Han Jeong Hun
Seoul Womens University information Security bachelor's degree
Researching of Robot Security with ROS(Robot Operating System) Vulnerability Analysis
Is it possible only in movies that a robot harm people in the opposite way from what they made to be?
In this presentation, we discuss the problems that can be caused by vulnerabilities of robots.
We’re going to introduce vulnerabilities found in ROS(Robot Operating System), one of the representative operating systems installed in robots. In addition, we will present interesting scenarios by controlling toy robot through hack wireless communication.
Let’s think about the smart city and the robot that have come close to near future and what we have to prepare.
Mr. Martin Tom-Petersen is CEO and co-founder of Smart City Catalyst (SCC).
Started his career in a dominant media company in Denmark working with business administration, asset and project management. Has a background in business administration and computer science.
+3 years of experience in Danish Smart City scene and a member of the national Danish smart city council. Providing insights on Smart city solution and their utilization ICT as independent advisor. Recently secured funding for the establishment of a Smart City Cyber security lab in Greater Copenhagen based on a pre-analysis from Smart City Catalyst. Over 8 years of experience from Lenovo and Oracle. Advising both commercial and public-sector clients on innovation aspects and the possibilities in both new and proven technology. An active contributor to the worldwide non-profit organization Securing Smart Cities(SSC) and co-authored several reports in collaboration with the members of SSC.
The real insider threat in smart cities
How can Smart Cities deal with cyber security and data privacy in a regulatory world filled with legacy and dependencies?
Choosing the right solution for a Smart City is never simple task when it is almost impossible to discard legacy constraints in policies, regulations or in existing infrastructure then adding cyber security to the conversation adds an extra level of complexity.
Understanding that the threat is eminent for Smart cities is a high priority case as there have already been attacks on city infrastructure.
Our studies revealed in 2015 out of 98 selected cities questioned – only 5 thoughts that they sufficient cyber security resources currently in their organisation.
Many cities still lack dedicated funds in the annual spending budget even after numerous systems are compromised.
Get acquainted with the top cyber-attacks cities should expect and why.
Smart cities rely heavily on data insight this becomes apparent when go into details in a compromised solution. Providing you with ability to understand the cyber threat scenario and how it evolves in a Smart City.
Lee Gun Young
Dream Security Co., Ltd. Director (CTO)
Completed his Ph.D. in computer engineering from Ajou University
IoT security service via analyzing into Smart City cases
IoT service is now becoming an important element technology in all areas. It is certainly for Smart Cities where all components are integrated and the efficiency is required.
I am going to explain the necessary security for Smart Cities having an example of IoT security, which is for building a stable Smart City.
Jang Moon Su
National Research Council of Science & Technology Cyber Security Training Center head of a department
POSTECH M.Sc (Infomation Security major)
National Security Technology Institute Cyberspace Defense Council and Outage Plan
National Security Technology Institute Cyber Safety Training Center is a national cyber security nurture training institute established to secure national cyber response capability and to preemptively respond to future threats.
We have established a cyber training center that simulates the work environment of national and public institutions, such as major IT infrastructure and government computer network in 2014, and conducts research on the latest cyber threats and accidents We conduct practical training.
This presentation introduces the technical accomplishments achieved through the R & D of the Cyber Conflict Exercise & Contest (CCE) organized by the National Security Technology Institute and the preparation process of the competition.
It also discusses ways to strengthen international cooperation needed for cyber safety training center to become an international cyber security training institute.
Cho Seong Jun / Park Sang Hyun
Hanyang University ComputerSoftware undergraduate studies
Kyonggi University Convergence Security department
Smart Home Hacking in Real World
We have analyzed the smart home system in service. We found many critical issues, and it was possible to manipulate all functions. Here is the functions list we could control exploiting the vulnerabilities:
- Doorlock, main entrance of an apartment building, parking entrance gate, CCTV, light, heating system, visitors log, elevator, camera of wallpad, etc
The company provides the service to about 300 apartment complexes. If there are 500 families in one apartment complexes and there are 4 members in one family, then 450,000 people can be in danger of this vulnerabilties.
We're going to share all of the stories in our project. You can get the technical knowledge from firmware extractions to vulnerability analysis/exploit.
Opposing Force, CTO
Matteo is a security researcher enrolled in computer engineering course at Politecnico of Torino. As Opposing Force’s Chief Technical Officer, he manages internal security research on network protocols, Near Field Communication (NFC) and access control security. He presented the results of his research to prestigious international conferences such DEF CON 21, 30th Chaos Communication Congress (30C3), Black Hat USA Arsenal 2014, DEF CON 22 SkyTalks, Black Hat Europe 2014, TetCon 2015, DEFC ON 23 and ZeroNights 2015.
Dissecting smart city security
Advertised as the next revolutionary hyper-connected environments, Smart Cities are fusing together multiple technological kingdoms, such as ICS/SCADA, IoT and Big Data, and consequently inheriting their challenges in terms of secure design and implementation. Furthermore, in the era of Smart Cities there is palpable overlap between the concept of security and safety, which requires a smarter security approach to address the weaknesses of these technologies.
Which are the most relevant challenges in the development of secure Smart Cities infrastructures? Which are the related threats and risks? How can we achieve the resilience of these ecosystems? How can we mitigate the chain reaction effect on multiple technologies?
During the talk, we will provide answers to these questions with the discussion of real-world case studies.