主題論壇
xSecurity Forum
xSecurity Forum

Join us at this forum where experts who have dealt with or assisted in preventing cybersecurity attacks share their experiences. Discover also the latest developments in cybersecurity topics. 

More
TIME & LOCATION
5/11 (Thur.) 9:30 - 17:00 | 4B Meeting Room
AGENDA
09:30 - 10:00

Face deepfake technology has matured, and related cases have increased year by year, with a wide range of impacts. However, with the rise of new AIGC (such as language model text generation, AI drawing, etc.) technologies, deepfake technology will be upgraded again and expanded to more levels. These new technologies are likely to generate more criminal cases. Therefore, we will sort out the context of deepfake technology from the past to the future. Our content will cover deepfake technology demonstration, real case study, technical introduction, and introduction of deepfake identification technology.

More
Rocky Lo Trend Micro ML Engineer
AI
10:15 - 10:45
Jimmy Chen National Taiwan University Adjunct Assistant Professor
Post Quantum Cryptography Cryptography Quantum Computing
11:00 - 11:30

Why 5G Security = (3GPP + IT + IoT + CT) Security? To answer this question, we break it down to several questions: What is inside a cellular network? How do mobile phones connect? What is ORAN? What is 5GC? What is MEC? What is private 5G? Why traditional IT firewalls aren't enough? We introduce the architecture of Cellular Networks and discuss how it differs from traditional IT. Then we cover private 5G systems and their unique security challenges, with examples. To wrap up, we discuss a Zero-Day, and show how the private, isolated subnet of a manufacturing plant is thrown open to attackers by the peculiarities of CT networks.

More
Salim S. I. CTOne Director of Cyber Threat Intelligence
Yi-Lun Li CTOne R&D Manager
5G Security
11:45 - 12:15

As the defending side, blue teams have many different perspectives when it comes to responding to cybersecurity incidents compared to the red team. Besides considering the analysis's accuracy under a large amount of log data, blue teams also have more emphasis on response time and costs due to the needs of complying with government policies and regulations.

CyCraft has conducted extensive research on using Machine Learning techniques in investigations of large-scale cybersecurity incidents, and has incorporated AI into various scenarios, including endpoint event correlation, CmdGPT analysis of Cmdline, and automatic forensic report generation. Since last year, we have incorporated a new generation of large language models into our blue team AI assistant for automatic incident response and issue management. In this talk, the speaker will share our practical experiences and exclusive insights on how cybersecurity teams can properly use AI, and share some actual case studies.

More
Jeremy Chiu (aka Birdman) CyCraft Technology Founder & CTO, CyCraft Technology Corporation
AI Machine Learning Blue Team
14:00 - 14:30

Modern information security’s last line of defense depends on the confidentiality of devices. When the hardware implements encryption and decryption operations, it is easy to inadvertently leak sensitive information and affect security, such as execution time, power consumption, electromagnetic radiation, etc. This type of research was called Side-Channel Cryptanalysis more than 20 years ago, but it is now called Side-Channel Analysis (SCA) and has received widespread international attention. The speech will mention that compared with traditional analysis methods, such as Simple Power Analysis (SPA), Correlation Power Analysis (CPA), Template Attack, etc. The application of Machine Learning to enhance the side-channel analysis technology, regardless of whether the encryption and decryption algorithm is protected, the analysis results based on Deep Learning have been proven to have an overwhelming advantage in recent years.


More
Jiun-Peng Chen National Taiwan University Department of Electrical Engineering / Adjunct Assistant Professor
Side-chanel Attack Machine Learning
14:45 - 15:15

As artificial intelligence (AI) has been widely adopted in a variety of applications, it is time to consider the security and privacy of AI. For example, we may wonder whether the AI model will be backdoored such that the face recognition system for access control is useless. We may also have a question about whether object detectors will be fooled such that the self-driving cars cause the accidents. We might also wonder whether the chatGPT will output illicit or discriminative contents. In this talk, we assume that the audience has certain background on AI and summarize the security and privacy issues of AI. 

More
​Chia-Mu Yu ​National Yang Ming Chiao Tung University Associate Professor of Department of Information Management and Finance
AI Security Privacy AI
15:45 - 16:15
Shin-Ming Cheng National Taiwan University of Sciecne and Technology Associate Professor, Department of Computer Science and Infomration Engineering
5G Security Open Source Security Telecom Security
16:30 - 17:00

Due to the explosion of applications in 5G, AIoT, and Industry 4.0, the transformation towards computerization, digitization, and intelligence has led to a continuous occurrence of supply chain attacks, making supply chain cybersecurity a globally concerning issue in recent years. Open Source Software has become a mainstream trend in the information and communications field in the past few years, and the industry frequently uses open source software as a component for integration or secondary development. Therefore, building an open source secure supply chain is a crucial issue. Since building an open source secure supply chain requires collaboration between the upstream and downstream industries, SZ will share how major international companies and different industries use process management regulations to identify the entry and exit points that should exist in organizational processes, policies, or training. Combined with Software Bill of Material (SBOM) to identify and track compliance and security status of software used and actually deployed, trust can be established among different companies to exchange deliverables composed of open source software. In addition to sharing industry examples, SZ will also share the future development blueprints and first-hand information from the OpenChain open source security standards and the international SBOM standard SPDX, hoping to build an open source secure supply chain together.

More
Supply Chain Security Open Source Security SBOM