YoVDO

Eliminating Triage Intermediaries for Zero-day Exploits Using a Decentralised Payout Protocol

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Software Development Courses Cybersecurity Courses Ethical Hacking Courses

Course Description

Overview

Explore a groundbreaking protocol for collectivizing security bounties for deterministically verifiable zero-day exploits in this 23-minute Black Hat conference talk. Discover how this innovative approach enables companies to demonstrate software security through dollar-staked open-source software stacks, while ensuring ethical hackers receive unambiguous bounty payouts. Learn about the elimination of subjective triage processes and manual labor for these exploits, and understand how the protocol allows stakeholders to pool bounties on open-source security stacks using decentralized virtual machines (DVMs) with read and/or write secrets. Gain insights from speakers Victoria Bosch, Clara Maine, Subhechha Subudhi, and Akke Toeter on this revolutionary approach to cybersecurity incentives and transparency.

Syllabus

Eliminating Triage Intermediaries for Zero-day Exploits Using a Decentralised Payout Protocol


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube