Déjà Vu - Uncovering Stolen Algorithms in Commercial Products
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the systemic issue of algorithm theft and unauthorized use in the cybersecurity community through this 26-minute Black Hat conference talk. Discover search techniques for automatically detecting unauthorized code in commercial products and learn how reverse-engineering and binary comparison methods can confirm such findings. Examine a real-world case study focusing on a popular non-profit tool reverse-engineered by multiple entities for unauthorized use in commercial products. Gain actionable takeaways and recommendations for confronting culpable commercial entities and their legal teams. Learn strategies for corporations to prevent algorithm theft, ensuring the cybersecurity community remains focused on mutual goals. Presented by Tom McGuire and Patrick Wardle, this talk provides valuable insights into protecting intellectual property and maintaining ethical standards within the industry.
Syllabus
Déjà Vu: Uncovering Stolen Algorithms in Commercial Products
Taught by
Black Hat
Related Courses
Grow to Greatness: Smart Growth for Private Businesses, Part IUniversity of Virginia via Coursera Designing and Executing Information Security Strategies
University of Washington via Coursera Retos de la agricultura y la alimentación en el siglo XXI
Miríadax Ressources naturelles et développement durable
Université catholique de Louvain via edX Innovating in Health Care
Harvard University via edX