Ελάτε μαζί μας στο Binding Hook Live στις 27 Οκτωβρίου στο Underbelly Boulevard Soho στο Λονδίνο
Ελάτε μαζί μας στο Binding Hook Live

Adversarial Reasoning

This module explores adversarial reasoning, focusing on understanding and anticipating attacker strategies to enhance threat prediction and mitigation in cybersecurity.

Πύλη > Κυβερνοασφάλεια > Adversarial Reasoning

Δημιουργός προγράμματος σπουδών

Valasek, Chris, and Charlie Miller. “Remote Exploitation of an Unaltered Passenger Vehicle.” IOActive, 2015.

https://ioactive.com/pdfs/IOActive_Remote_Car_Hacking.pdf

Kocher, Paul, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, et al. “Spectre Attacks: Exploiting Speculative Execution.” In 2019 IEEE Symposium on Security and Privacy (SP), 1–19. San Francisco, CA, USA: IEEE, 2019.

https://doi.org/10.1109/SP.2019.00002

Bond, Mike, Omar Choudary, Steven J. Murdoch, Sergei Skorobogatov, and Ross Anderson. “Chip and Skim: Cloning EMV Cards with the Pre-Play Attack.” In IEEE Symposium on Security and Privacy, 49–64. IEEE Computer Society, 2014.

Razavi, Kaveh, Ben Gras, and Erik Bosman. “Flip Feng Shui: Hammering a Needle in the Software Stack.” In Proceedings of the 25th USENIX Security Symposium, 18. Austin, TX: USENIX The Advanced Computing Systems Association, 2016.

Koscher, Karl, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, et al. “Experimental Security Analysis of a Modern Automobile.” In Proceedings of the 2010 IEEE Symposium on Security and Privacy, edited by David Evans and Giovanni Vigna, 447–62. USA: IEEE Computer Society, 2010.

Murdoch, Steven J., Saar Drimer, Ross Anderson, and Mike Bond. “Chip and PIN Is Broken.” In Proceedings of the 2010 IEEE Symposium on Security and Privacy, 433–46. SP ’10. USA: IEEE Computer Society, 2010.

https://doi.org/10.1109/SP.2010.33

Thompson, Ken. “Reflections on Trusting Trust.” Communications of the ACM 27, no. 8 (1984): 761–63.

https://doi.org/10.1145/358198.358210

Σας ευχαριστούμε για την εγγραφή σας στο ενημερωτικό μας δελτίο!

Thank you! RSVP received for Valasek, Chris, and Charlie Miller. “Remote Exploitation of an Unaltered Passenger Vehicle.” IOActive, 2015.

Σας ευχαριστούμε για την αίτησή σας! Θα επικοινωνήσουμε μαζί σας.

Apply for: Valasek, Chris, and Charlie Miller. “Remote Exploitation of an Unaltered Passenger Vehicle.” IOActive, 2015.

Valasek, Chris, and Charlie Miller. “Remote Exploitation of an Unaltered Passenger Vehicle.” IOActive, 2015.

Φόρτωση...

Φόρτωση...