top of page
  • mastodonlogo_edited
  • X
  • LinkedIn
  • Youtube
  • Instagram
  • Blue Sky Logo_edited
Biohacking Village

cybersecurity and biomedical technology research for healthcare
 

Website FEB DEF CON 32 UPDATE-4_edited_e
Abstract Blue Light
CodeBLUE_edited.png

Shinjuku, Tokyo, Japan

Trainings: November 16 - 17, 2025

Conference: November 18 -19, 2025

​Biohacking Village is honored to participate in CODE BLUE, with our village friends from Aerospace, Car Hacking, ICS Village, and Maritime Hacking.

 

The Biohacking Village works to unite healthcare, technology, and cybersecurity professionals to explore the latest innovations in biomedical security. Our mission is to create a safer, healthier future through collaborative efforts in securing medical devices and advancing patient safety.

We look forward to the opportunity to share our knowledge and contribute to the global healthcare security conversation. Thank you for your continued trust and support.

Our Commitment to Innovation and Security

Biohacking Village has always been committed to bringing together experts from around the world. At CODE BLUE, we are proud to showcase:

  • Cutting-Edge Technologies: Demonstrations of real-world medical devices, including blood pressure monitors, glucose meters, and oxygen saturation devices, highlighting security vulnerabilities and solutions.

  • Hands-on Learning: Engaging workshops, including Med Team vs. Red Team exercises, where participants will have the chance to secure medical devices in real-time.

  • Global Collaboration: Join experts from healthcare, cybersecurity, and tech fields to exchange ideas and build relationships that drive innovation.

Biohacking Village Labs

At the Biohacking Village, we are honored to present our specialized Labs: Talk Track, Device Lab, and Capture the Flag. These Labs foster a secure and collaborative environment where esteemed professionals from the medical device industry, healthcare practitioners, and independent security researchers can engage in respectful exchanges of knowledge on security while exploring emerging technologies. We believe that thoughtful dialogue and mutual respect are key to driving innovation and advancing healthcare.

 

In the Talk Track, we will have various discussions from the villages:

In the Device Lab, participants have the opportunity to test medical instruments, applications, and devices in real-time. Security researchers are respectfully asked to sign the Hippocratic Oath for Hackers, pledging to abide by the established boundaries and rules of engagement, both during and after the conference, to maintain a spirit of integrity and professionalism.

Devices:

Operative Suite Industrial Control System (ICS): Programable Logic Controller 

EKO Stethoscope: Reimagined healthcare for modern medicine

SolaSec Training Board with CTF challenges

Our Capture the Flag challenge, "Code Crimson," bridges the worlds of healthcare and cybersecurity. Each challenge provides participants with the chance to safeguard biological data, an endeavor as vital as securing digital assets. Code Crimson. offers a variety of puzzles designed to accommodate diverse skills and interests. For those new to Capture the Flag, we humbly provide guidance through Tips, Tricks, and Tools to help you begin your journey with confidence.

Partnering for a Safer Future

As we continue to expand our global reach, we are excited to collaborate with CODE BLUE, one of Japan’s premier cybersecurity conferences, to enhance biomedical cybersecurity. We aim to contribute to Japan’s healthcare and technology sectors, while learning from the expertise and dedication of the local community.


Together, we can create healthier tech for healthier people.

Get Involved with Biohacking Village

We invite you to join our workshops, learn from our demonstrations, and share in the innovation happening at CODE BLUE. Your presence will further elevate the important discussions surrounding healthcare security, and we would be honored to collaborate with you.

We humbly welcome your participation and look forward to working together to shape a safer, more secure future for healthcare.

Acknowledgements

We sincerely thank CODE BLUE, our partners, and the community for making this collaboration possible. Together, we will continue to foster the growth of biomedical cybersecurity on a global scale.

Title
Abstract
Speakers
Village
Day / Time
Outer Space Cyberattacks Generating Novel Scenarios to Avoid Surprise
Outer space is the next frontier for cybersecurity. To guard against space cyberattacks, we need to understand and anticipate them, and imagination is at the very heart of both cybersecurity and frontiers.
Henry Danielson
Aerospace Village
18 November / 1100
Automotive RCE with Nothing But Your Fingers - JVC Kenwood Pwn2Own Automotive 2025 Deep Dive
Some days you need a long chain of vulnerabilities and embedded payloads to pwn a system. Other days you just need to inject commands in a field anyone can access. This talk offers a deep dive into a rather humerous vulnerability that has unexpectedly severe consequences on the target system, discovered for the Pwn2Own Automotive Competition.
Aapo Oksman
Car Hacking Village
18 November / 1130
Don’t Ship Your Bridges! Tools to Explore Wireless Attack Surfaces in Every Ship's Marine Navigation Systems
Automated Identification System (AIS) is a prolific and core technology to the Maritime Transportation System. It also happens to be unauthenticated and unencrypted, and easily spoofable with a commercial-off-the-shelf Software Defined Radio (SDR). This talk will discuss the AIS protocol structure, and present and demonstrate a suite of open-source tools developed by the presenters for AIS hacking and security research. This will include a live, over-the-wire demonstration against a real AIS system.
Duncan Woodbury
Maritime Hacking Village
18 November / 1200
When X-Rays Become Hacker Weapons: How I Crashed DICOM Systems With Malformed Medical Images
DICOM is the backbone of medical imaging, governing both file syntax and network dialogue for CT, MRI, and X-ray systems. Any flaw can ripple through hospital workflows worldwide. Using protocol-aware fuzzing fed by a curated set of rare-disease images, we uncovered ten zero-day bugs in five leading DICOM stacks—six already assigned CVEs. Key takeaways 47 exotic tag patterns from unusual clinical datasets boosted crash discovery by 8.3×. State-machine sabotage: carefully breaking DICOM TLV transitions exposed deep parser gaps and produced minimal, reliable proofs of concept. Without continuous, domain-specific fuzzing, DICOM’s vast spec and legacy add-ons will keep accruing security debt. Imaging devices, PACS, and AI pipelines must be hardened now—before the next silent exploit disrupts patient care.
XiaoZheng Ding, Lidong Li, Oliver Dong
Biohacking Village
18 November / 1230
Car Hacking with a Smile! CAN and LIN Workshop with DumpLIN!
CAN and LIN are two of the most common automotive networking technologies in use today. Join this hands-on workshop for the chance to learn about them and get experience with an innovative (and adorable) new car hacking tool - the DumpLIN!
Toyota Tsusho Systems
Car Hacking Village
18 November / 1300
Embedded Hacking and Reverse Engineering: A Hands-On Walkthrough
This intensive, workshop-style session delivers a compact but deep progression from fundamental memory mapping to advanced firmware patching and signal decoding, blending live demonstrations with short, tool-driven exercises that scale for entry-level analysts and seasoned practitioners alike. Attendees will be guided through practical techniques for extracting firmware from flash and storage media, reconstructing memory layouts, performing static and dynamic analysis, applying targeted binary patches, and validating changes in emulators, then advance to capturing and decoding UART, SPI, I2C, and common RF traces to reveal hidden device behavior. The emphasis is on repeatable, legally sound workflows, common failure modes, and pragmatic mitigations that produce verifiable results during assessments. By the end of the session participants will be able to recover firmware images, implement precise binary modifications, reproduce device behavior safely in an emulator, and interpret communication traces to uncover latent functionality. No special hardware is required, only an enthusiasm unknown to mankind.
Caleb Davis, SolaSec
Biohacking Village
18 November / 1400
bottom of page