Adversarial Reasoning

This module explores adversarial reasoning, focusing on understanding and anticipating attacker strategies to enhance threat prediction and mitigation in cybersecurity.

Portal > Cybersecurity > Adversarial Reasoning

Curriculum Builder

Valasek, Chris, and Charlie Miller. “Remote Exploitation of an Unaltered Passenger Vehicle.” IOActive, 2015.

https://ioactive.com/pdfs/IOActive_Remote_Car_Hacking.pdf

Kocher, Paul, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, et al. “Spectre Attacks: Exploiting Speculative Execution.” In 2019 IEEE Symposium on Security and Privacy (SP), 1–19. San Francisco, CA, USA: IEEE, 2019.

https://doi.org/10.1109/SP.2019.00002

Bond, Mike, Omar Choudary, Steven J. Murdoch, Sergei Skorobogatov, and Ross Anderson. “Chip and Skim: Cloning EMV Cards with the Pre-Play Attack.” In IEEE Symposium on Security and Privacy, 49–64. IEEE Computer Society, 2014.

Razavi, Kaveh, Ben Gras, and Erik Bosman. “Flip Feng Shui: Hammering a Needle in the Software Stack.” In Proceedings of the 25th USENIX Security Symposium, 18. Austin, TX: USENIX The Advanced Computing Systems Association, 2016.

Koscher, Karl, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, et al. “Experimental Security Analysis of a Modern Automobile.” In Proceedings of the 2010 IEEE Symposium on Security and Privacy, edited by David Evans and Giovanni Vigna, 447–62. USA: IEEE Computer Society, 2010.

Murdoch, Steven J., Saar Drimer, Ross Anderson, and Mike Bond. “Chip and PIN Is Broken.” In Proceedings of the 2010 IEEE Symposium on Security and Privacy, 433–46. SP ’10. USA: IEEE Computer Society, 2010.

https://doi.org/10.1109/SP.2010.33

Thompson, Ken. “Reflections on Trusting Trust.” Communications of the ACM 27, no. 8 (1984): 761–63.

https://doi.org/10.1145/358198.358210

Thank you for signing up to our newsletter!

Thank you! RSVP received for Valasek, Chris, and Charlie Miller. “Remote Exploitation of an Unaltered Passenger Vehicle.” IOActive, 2015.

Thank you for applying! We will be in touch.

Apply for: Valasek, Chris, and Charlie Miller. “Remote Exploitation of an Unaltered Passenger Vehicle.” IOActive, 2015.

Valasek, Chris, and Charlie Miller. “Remote Exploitation of an Unaltered Passenger Vehicle.” IOActive, 2015.

Loading...

Loading…