sstf logo

Samsung Security Tech Forum 2019

August 20, 2019
  • SVP Daniel Ahn | Samsung Research

    video 1 Play
    0:01 Artificial Intelligence has been widely adopted and adversaries are even leveraging it.
    Furthermore, security threats are significantly increasing because various devices are being connected with the new technologies such as 5G
    As such, security is no longer as choice but a must
    0:17 (Trust with SAMSUNG)
    (Samsung Security Technologies)
    First, we focus on the rigorous analysis and management of security vulnerabilities and potential risks.
    Second, we design and develop core security technologies for securing our products and services.
    Third, we investigate security and privacy challenges that new emerging technologies such as 5G would bring.
    0:44 (SSTF 2019)
    The purpose of the forum is to share various security trends.
    Samsung produces diverse products and services. We strongly believe that security should not be taken for granted and all of our products and services should be complied with security requirements.
    Having said that, we also plan to share our best practices in fulfilling such requirements at SSTF 2019.
    0:14 (Greetings)
    The 3rd Samsung Security Tech Forum(SSTF) will be held on August 20, The 3rd Samsung Security Tech Forum(SSTF) will be held on August 20, and we have prepared different events such as keynote session, panel discussion, poster session, Open Tech Talk and an Open CTF(Capture the Flag).
    We invite you all and look forward to seeing you in August.
    1:34 (Samsung Security Tech Forum 2019)
    (SAMSUNG Research)
  • Prof. Taesoo Kim | Georgia Tech

    video 2 Play
    (Through Samsung Security Technology)
    (Enhance the security level of Samsung products & services)
    (Build a safe and secure environment)
    (Furthermore, provide the value of TRUST)
    (Samsung Security Tech Forum 2019)
    Calling Georgia form Seoul
    0:31 “Hello, Everyone My name is Taesoo Kim, I am looking forward to meeting you all in SSTF 2019.”
    0:37 (Nice to meet you, Mr.Kim, we are also waiting to meet you at the forum.)
    0:42 (Please introduce yourself to people who will watch this.)
    0:43 “I got my PhD from MIT in 2014. Since then, I’ve been serving as an associate professor (in the school of computer Science at Georgia Tech.)”
    0:52 “My research is interested in building a security system by using security hardware mechanisms.”
    0:57 (we would like to know the contents in your keynote.)
    0:58 “In the keynote, I will be talking about…”
    ‘Why these hardware security mechanisms are proposed by the community‘
    ‘What are the applicable problem solution using them‘
    ‘Why is so challenging to currently use them in order to build secure mechanisms’
    1:13 “Particularly, I am going to share my lessons learned from our research projects.”
    1:18 (Please say your closing comments to people.)
    “It’s my first time to be in the conference, but I have been hearing so many good things about the event, Hope all participants learn new things, being motivated and influence whichever projects they are doing at the workplace.”
    1:32 “It should be very fun and exciting event”
    1:38 (Samsung Security Tech Forum 2019)
  • Prof. Ruoyu (Fish) Wang | Arizona State Univ.

    video 3 Play
    0:00 (through Samsung Security Technology)
    (Enhance the security level of Samsung products & services)
    (Build a safe and secure environment)
    (Furthermore, provide the value of TRUST)
    (Samsung Security Tech Forum 2019)
    0:22 (TRUST with SAMSUNG)
    Calling Georgia form Seoul
    0:33 “Hello, my name is Fish Wang. Thank you for inviting me to SSTF 2019. It’s a great pleasure for me to be here and give you guys a talks”
    0:42 (Nice to meet you Mr.Wang. We are pleased to have you to the forum.)
    0:48 (Please introduce yourself to people attending the conference.)
    0:49 “I am an assistant professor in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University.”
    0:59 “My research is interested in system security, especially on binary program analysis and software reverse engineering.”
    1:08 (Let us know the theme of your keynote.)
    1:10 “The subject of my keynote will be…. On the difficulty of automated vulnerability discovery*
    What is vulnerability discovery, and why is it important?”
    Why haven’t we found all bugs?
    What can we do?”
    1:33 (Please give some greetings to SSTF attendees.)
    1:34 “I am going to Samsung Security Tech Forum 2019 It will be on August 20th.”
    1:53 (Samsung Security Tech Forum 2019)
  • CEO Brian Pak | Theori

    video 4 Play
    (Introduction)
    0:00 (through Samsung Security Technology)
    (Enhance the security level of Samsung products & services)
    (Build a safe and secure environment)
    (Furthermore, provide the value of TRUST)
    (Samsung Security Tech Forum 2019)
    0:22 (TRUST with SAMSUNG)
    0:28 (Calling Texas from Seoul)
    0:32 “Good day. I am Brian Park, the CEO of Theori, which will make a keynote presentation at this year’s SSTF. I am pleased to meet you on this great occasion. ^^”
    0:38 (Good morning. We also feel honored to meet you on the occasion of SSTF. Please, briefly introduce yourself for prospective participants in SSTF 2019.)
    0:45 “I majored in Computer Science and got my bachelor’s and master’s degree from Carnegie Mellon University. I then established a cyber security R&D company called “Theori” We now provide security consulting and advanced research services to diverse companies and state agencies globally.”
    0:57 “While at the university, I established a hacking club called Plaid Parliament of Pwning (PPP). I currently still participate in diverse competitions and have won the greatest number of awards at DEF CON, the largest international hacking preventing conference.”
    1:13 (What do you plan to present during the keynote presentation?)
    1:15 “During the presentation the Theori team plans to share lessons we learned and the experiences we’ve had while providing security consulting to diverse client companies, including startups, large enterprises, and public agencies, in the last few years.”
    1:18 (To share the lessons learned and experiences gained while providing security consulting to diverse clients, from startups to large enterprises and public agencies)
    (To present a guideline with examples of actual cases for companies to refer to)
    To present the future direction to pursue in order to standardize the overall security technologies to a higher level)
    1:37 (Last, please a few words for those who want to participate in SSTF)
    1:38 “I am also greatly looking forward to this year’s SSTF as we have been invited to give the keynote presentation. I hope you will get to benefit and enjoy your time at the event.”
    1:50 (Samsung Security Tech Forum 2019)
    1:53 (SAMSUNG Research)
  • SVP Seungbeom Choi | Samsung Research

    video 5 Play
    “Yes! Samsung Research carries out advanced research for the set part of Samsung Electronics.”
    We research future-oriented innovative technologies necessary for Samsung’s key products and services. We thus create value for our customers at 14 global research and development (R&D) centers and 7 global artificial intelligence (AI) centers under the vision of “Shape the Future with Innovation and Intelligence.”
    0:20 (TRUST With SAMSUNG)
    0:24 (SAMSUNG Research)
    0:27 “Samsung Research mainly researches the eight key themes of next generation communications like 5G and 6G, AI, robot, big data, Tizen, life care & wellness, next generation media, and security. In the field of security, we are particularly working hard to secure the world’s best security technology as a core technology indispensable for our clients to safely use our products and services.”
    0:57(Next Generation Security)
    1:00 “5G is a key technology that must be equipped with security, as an infrastructure based on the Fourth Industrial Revolution, like state agency networks and automatic driving. Samsung has thus secured in advance and is applying security systems and technologies that can fundamentally block various security problems on 5G networks. We do this with completely automated systems from the design of products to their launching. In addition, we use AI technology to predict and respond in advance against security threats that are recently becoming all the more diverse and sophisticated to strictly prepare against them.”
    1:38 (SSTF 2019 Greetings)
    1:41 “This time around, we will hold the third SSTF under the slogan of Trust with Samsung. We will also hold Open CTF and Hands on Lab, wherein everyone, from children to security experts, can participate and personally experience security technologies. We have equally prepared diverse programs like Open Tech Talk, wherein students majoring in security will get to debate their research areas with experts.
    We invite you to the third SSTF, which is Korea’s largest security technology festival.”
    2:15 (Samsung Security Tech Forum 2019)
    2:17 (SAMSUNG Research)
  • SSTF 2019 | 2019. 8. 20

    video 6 Play
    Introduction~
    0:01 (Samsung Seoul R&D Campus)
    0:06 “The Samsung Security Tech Forum (SSTF) now in its third year consists of various parts like Open Tech Talk and Open CTF, during which we introduce our company’s research direction and technology under the slogan of Trust with SAMSUNG, as well as enhance the participants’ level of participation.”
    0:20 (Opening Remarks)
    0:26 (Sound of applause)
    0:29 (Introduction to Samsung Research), “We are restructuring our advance research, which functions as the pivot in the overall set business consisting of~”
    0:38 (Keynote 1), “Let’s examine how we are checking offensively. How we find and defend.”
    0:46 (Keynote 1), “There exist factors that can lead to infection while accessing the network.”
    0:55 “Can we make secure software through an extension like CPU,,,, which ruled an era?”
    1:04 (Keynote 3), “Automatic share that everyone here todays these…”
    1:16 (Keynote 4), “The advantages and limitations of offensive security are clear. Links do not connect with just facts learned from offensive security.”
    1:27 (Hands on Lab, customized learning)
    1:36 (Open CTF)
    1:46 (Poster Session, explaining product and voting)
    1:52 (Open Tech Talk, debating disclosed technology)
    1:59 (Sound of applause)
    2:00 (Session), “I automate and reflect solutions so that the weaknesses I have found, and not just actual module units, do not repeatedly occur.”
    2:10 (Panel Discussion), “We are not only working on power but also steadily on defense and thus making efforts to make products and services that users, speakers, and clients can trust more. Thank you very much.” (Sound of applause)
    2:28 (Dining scene)
    2:33 (TRUST With SAMSUNG, Samsung Security Tech Forum 2019)

SSTF Workshop
Registration

EligibilityAnyone interested in security

SubmissionJuly 10 - August 13, 2019 (On-site registration also possible)

The first 500 SSTF Workshop registrants will receive a coffee coupon.
The first 300 SSTF Workshop attendees will get an "Early Bird" gift.

Schedule

08:30 - 09:30

Registration

09:30 - 09:40

Opening Remarks

EVP Seunghwan Cho|Samsung Research

09:40 - 10:00

Samsung Research Introduction

SVP Seungbeom Choi|Samsung Research

10:00 - 11:00

Keynote 1      >>

Building Trust through Security

SVP Daniel Ahn

Samsung Research

SVP Henry Jong-Hyeon Lee

Mobile Communications Business

11:00 - 12:00

Keynote 2      >>

Building Trustworthy Software Foundation with Hardware Security Mechanisms

Professor Taesoo Kim|Georgia Institute of Technology

12:00 - 13:00

Lunch

13:00 - 14:00

Keynote 3      >>

On the Difficulty of Automated Vulnerability Discovery on Binary Programs

Professor Ruoyu (Fish) Wang|Arizona State University

14:00 - 15:00

Keynote 4      >> Presentation Download

Best Practices and Lessons Learned from Security Consulting

CEO Brian Pak|Theori

15:00 - 16:00

Break Time

16:00 - 17:00

Session      >>

Researches and Activities for Offensive Security in Samsung Research

Security Team / Offensive security group|Samsung Research

17:00 - 18:00

Panel Discussion

SVP Daniel Ahn (Chair), Professor Yongdae Kim (KAIST), Professor Seungjoo Kim (Korea University), Director Kiwook Sohn (NSR), Director Seung-Hun Jin (ETRI)

18:00 - 18:10

Closing Remarks

SVP Daniel Ahn|Samsung Research

Sub-events

  • Open Tech Talk

    [13:00-16:30] Live Cube Hall(1F), Tower A

    Open Tech Talk - Schedule
    Type Time Title Presentation Speaker
    Attack
    (Analysis)
    13:00 - 13:25 Cloud BackEnd Target Attack with Mobile Application Hooking Download Hyunjun Park
    13:25 - 13:50 The Ultimate Pie Cookbook: How to Reassemble PIE Binaries Hyungseok Kim
    13:50 - 14:15 Crouching Honeypot, Hidden Exploit: Cloaking Known Exploits by Tracking Client Honeypot Fingerprints Download Jiho Lee
    Defense 14:20 - 14:45 Toward Trustworthy Middlebox-aware Secure Architecture Download Hyunwoo Lee
    14:45 - 15:10 Application-level virtualization based effective Android App reverse engineering prevention method Download Kyeongwhan Lim
    AI Security 15:15 - 15:40 Suitability verification for NVD Reference Feature used in predicting vulnerability exploitation Heedong Yang
    15:40 - 16:05 Car is Only Yours: Automobile theft detection leveraging machine learning algorithms Kyung Ho Park
    16:05 - 16:30 Deep learning based face recognition model attack in a limited Q&A environment through replacement model relearning Gwonsang Ryu
    Open Tech Talk - Schedule
    Type Title
    Attack
    (Analysis)

    13:00 - 13:25

    Cloud BackEnd Target Attack with Mobile Application Hooking

    Presentation Download

    Hyunjun Park

    13:25 - 13:50

    The Ultimate Pie Cookbook: How to Reassemble PIE Binaries

    Hyungseok Kim

    13:50 - 14:15

    Crouching Honeypot, Hidden Exploit: Cloaking Known Exploits by Tracking Client Honeypot Fingerprints

    Presentation Download

    Jiho Lee

    Defense

    14:20 - 14:45

    Toward Trustworthy Middlebox-aware Secure Architecture

    Presentation Download

    Hyunwoo Lee

    14:45 - 15:10

    Application-level virtualization based effective Android App reverse engineering prevention method

    Presentation Download

    Kyeongwhan Lim

    AI Security

    15:15 - 15:40

    Suitability verification for NVD Reference Feature used in predicting vulnerability exploitation

    Heedong Yang

    15:40 - 16:05

    Car is Only Yours: Automobile theft detection leveraging machine learning algorithms

    Kyung Ho Park

    16:05 - 16:30

    Deep learning based face recognition model attack in a limited Q&A environment through replacement model relearning

    Gwonsang Ryu

  • Open CTFDownload Open CTF 2019 Competition question

    [10:00-16:00] Lobby(1F), Tower B

  • Poster Session

    The front of Creative Hall(2F), Tower A

Open Tech Talk
Call for Presentation

We are always encouraging students
with full of passion in Security.

At the 3rd SSTF, we are preparing special occasion for newbies to freely present and share their researches. As the presentors had been selected, we have contacted to selected presentors individually.

Hands On Lab

Escape Plan – Escape room project

It allows you to understand fundamentals through different types of coding, encryption, and security related problem solving experience.

The application is now closed.
VIEW MORE

Location

Seoul R&D Campus <ap Seoul R&D Campus <ap
  • Location

    Samsung Electronics Seoul R&D Campus, 56, Seongchon-gil, Seocho-gu, Seoul

  • Bus

    Samsung Electronics Seoul R&D Campus/ Nature Hill Complex 3, 4/ Entrance of Seongchon Village

    • Green Bus : 19, 3412, 4435
    • Blue Bus : 541, 542
    • Town Bus : Seocho 18, Seocho 18-1
  • Shuttle Bus

    Seonbawi Station Exit 5 → Samsung Seoul R&D Campus
    08:30-10:00 (10-minute intervals)

    Samsung Seoul R&D Campus → Seonbawi Station
    18:15-18:30 (depart when it's full)