Únase a nosotros en Binding Hook Live el 27 de octubre en el Underbelly Boulevard Soho de Londres
Únase a nosotros en Binding Hook Live

Razonamiento adversarial

This module explores adversarial reasoning, focusing on understanding and anticipating attacker strategies to enhance threat prediction and mitigation in cybersecurity.

Portal > Ciberseguridad > Razonamiento adversarial

Curriculum Builder

Valasek, Chris, and Charlie Miller. “Remote Exploitation of an Unaltered Passenger Vehicle.” IOActive, 2015.

https://ioactive.com/pdfs/IOActive_Remote_Car_Hacking.pdf

Kocher, Paul, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, et al. “Spectre Attacks: Exploiting Speculative Execution.” In 2019 IEEE Symposium on Security and Privacy (SP), 1–19. San Francisco, CA, USA: IEEE, 2019.

https://doi.org/10.1109/SP.2019.00002

Bond, Mike, Omar Choudary, Steven J. Murdoch, Sergei Skorobogatov, and Ross Anderson. “Chip and Skim: Cloning EMV Cards with the Pre-Play Attack.” In IEEE Symposium on Security and Privacy, 49–64. IEEE Computer Society, 2014.

Razavi, Kaveh, Ben Gras, and Erik Bosman. “Flip Feng Shui: Hammering a Needle in the Software Stack.” In Proceedings of the 25th USENIX Security Symposium, 18. Austin, TX: USENIX The Advanced Computing Systems Association, 2016.

Koscher, Karl, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, et al. “Experimental Security Analysis of a Modern Automobile.” In Proceedings of the 2010 IEEE Symposium on Security and Privacy, edited by David Evans and Giovanni Vigna, 447–62. USA: IEEE Computer Society, 2010.

Murdoch, Steven J., Saar Drimer, Ross Anderson, and Mike Bond. “Chip and PIN Is Broken.” In Proceedings of the 2010 IEEE Symposium on Security and Privacy, 433–46. SP ’10. USA: IEEE Computer Society, 2010.

https://doi.org/10.1109/SP.2010.33

Thompson, Ken. “Reflections on Trusting Trust.” Communications of the ACM 27, no. 8 (1984): 761–63.

https://doi.org/10.1145/358198.358210

Gracias por suscribirse a nuestro boletín.

Thank you! RSVP received for Valasek, Chris, and Charlie Miller. “Remote Exploitation of an Unaltered Passenger Vehicle.” IOActive, 2015.

Gracias por su solicitud. Nos pondremos en contacto con usted.

Apply for: Valasek, Chris, and Charlie Miller. “Remote Exploitation of an Unaltered Passenger Vehicle.” IOActive, 2015.

Valasek, Chris, and Charlie Miller. “Remote Exploitation of an Unaltered Passenger Vehicle.” IOActive, 2015.

Cargando...

Cargando...