Skip to content

Commit

Permalink
Create Articles “exploring-collaboration-on-coordinated-vulnerability…
Browse files Browse the repository at this point in the history
…-disclosure-in-japan”
  • Loading branch information
ser1aa authored Dec 18, 2024
1 parent 4a75b35 commit 2c840cb
Show file tree
Hide file tree
Showing 3 changed files with 64 additions and 0 deletions.
Binary file added assets/images/bamboozled.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Original file line number Diff line number Diff line change
@@ -0,0 +1,48 @@
---
title: Exploring Collaboration on Coordinated Vulnerability Disclosure in Japan
date: 2024-12-18T17:51:00+01:00
author: []
tag: news
intro: |-
With the support of the Dutch embassy in Tokyo, I (Chris van 't Hof) have researched Coordinated Vulnerability Disclosure (CVD) in Japan. I had the opportunity to travel to Japan from October 22 to November 22.
During my stay, I interviewed security researchers from various governmental institutes, companies, and universities and spoke with hackers, most of whom were foreign nationals residing in Japan. I also participated in conferences and meetings: KEIO Cybersecurity Conference (30-10/1-11), Cyber Risk Meetup (1-11), TengueSec meetup (13-11), CodeBlue (14-11/15-11), and AVTokyo (16-11). One of the highlights of my trip was organizing a CVD expert meeting with the Dutch embassy on the 13th of November. The last days I spent in the beautiful coastal village of Kamakura to start writing this report.
image: /images/bamboozled.jpg
Alt tag for image: ""
case: null
faq_enabled: false
faq: null
---
Written on **December** **16**, **2024** by [Chris van 't Hof](https://www.divd.nl/who-we-are/team/people/chris-van-t-hof/)

#

## I went to Japan!

With the support of the Dutch embassy in Tokyo, I have researched Coordinated Vulnerability Disclosure (CVD) in Japan. I had the opportunity to travel to Japan from October 22 to November 22. 

During my stay, I interviewed security researchers from various governmental institutes, companies, and universities and spoke with hackers, most of whom were foreign nationals residing in Japan. I also participated in conferences and meetings: KEIO Cybersecurity Conference (30-10/1-11), Cyber Risk Meetup (1-11), TengueSec meetup (13-11), CodeBlue (14-11/15-11), and AVTokyo (16-11). One of the highlights of my trip was organizing a CVD expert meeting with the Dutch embassy on the 13th of November. The last days I spent in the beautiful coastal village of Kamakura to start writing this report. 

## Key findings

To read all my findings in great detail, please read the official report [here](https://drive.google.com/file/d/1Kr2gMfIDBKOOTDxd90YbSitBVjND6qaG/view?usp=drive_link). Below is a brief summary of the key points:

### Japan’s governmental policy on CVD dates back to 2004.

The Japanese Computer Emergency Response Team Coordination Center (JPCERT/CC) is an independent institute founded in 1996 and currently funded by METI. The center handles incidents, analyses and shares information on online threats, monitors internet traffic, and has published Vulnerability Notes with Advisories since 2004.

### Japanese criminal law and jurisprudence do not allow for large-scale intrusive vulnerability research and disclosure as Dutch case law does.

In Japan, doing CVD on a broader scope and without informed consent is perceived as very rare. Security researchers generally fear prosecution as they may violate cyber security and privacy laws. A common statement at hacker events was: “I only report if they provide a bug bounty.”

### Japanese institutes help citizens disclose zero days to vendors and report vulnerabilities to website operators.

Organizations like IPA and JPCERT/CC provide structured processes for reporting vulnerabilities, focusing primarily on zero days affecting software or websites widely used in Japan. These reports are forwarded to vendors and operators, though researchers must navigate strict conditions.

### NICT scans and notifies vulnerable IoT, and the Japanese government has adjusted laws to allow this.

The NOTICE project aims to prevent cyber-attacks by scanning IoT devices on weak passwords by attempting to log in. These activities run parallel to the _Handling Regulations for Information Related to Vulnerabilities in Software Products_ and clearly violate cyber security laws. In order to proceed on this endeavor, the Cabinet overruled the _Act on Prohibition of Unauthorized Computer Access_ by a special law, which provided NICT the mandate. To my knowledge, this is unique in the world.

To read all my findings in great detail, please read the official report [here](https://drive.google.com/file/d/1Kr2gMfIDBKOOTDxd90YbSitBVjND6qaG/view?usp=drive_link).

#
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
---
title: Exploring Collaboration on Coordinated Vulnerability Disclosure in Japan
date: ""
author: []
tag: ""
intro: |-
With the support of the Dutch embassy in Tokyo, I (Chris van 't Hof) have researched Coordinated Vulnerability Disclosure (CVD) in Japan. I had the opportunity to travel to Japan from October 22 to November 22.
During my stay, I interviewed security researchers from various governmental institutes, companies, and universities and spoke with hackers, most of whom were foreign nationals residing in Japan. I also participated in conferences and meetings: KEIO Cybersecurity Conference (30-10/1-11), Cyber Risk Meetup (1-11), TengueSec meetup (13-11), CodeBlue (14-11/15-11), and AVTokyo (16-11). One of the highlights of my trip was organizing a CVD expert meeting with the Dutch embassy on the 13th of November. The last days I spent in the beautiful coastal village of Kamakura to start writing this report.
image: ""
Alt tag for image: ""
case: null
faq_enabled: false
faq: null
---
x

0 comments on commit 2c840cb

Please sign in to comment.