YoVDO

Déjà Vu - Uncovering Stolen Algorithms in Commercial Products

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Reverse Engineering Courses Case Study Analysis Courses Intellectual Property Rights Courses Corporate Strategy Courses

Course Description

Overview

Explore the systemic issue of algorithm theft and unauthorized use in the cybersecurity community through this 26-minute Black Hat conference talk. Discover search techniques for automatically detecting unauthorized code in commercial products and learn how reverse-engineering and binary comparison methods can confirm such findings. Examine a real-world case study focusing on a popular non-profit tool reverse-engineered by multiple entities for unauthorized use in commercial products. Gain actionable takeaways and recommendations for confronting culpable commercial entities and their legal teams. Learn strategies for corporations to prevent algorithm theft, ensuring the cybersecurity community remains focused on mutual goals. Presented by Tom McGuire and Patrick Wardle, this talk provides valuable insights into protecting intellectual property and maintaining ethical standards within the industry.

Syllabus

Déjà Vu: Uncovering Stolen Algorithms in Commercial Products


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube