YoVDO

Biometrics System Hacking in the Age of the Smart Vehicle

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Wireless Security Courses Face Recognition Courses Replay Attacks Courses

Course Description

Overview

Explore biometric system vulnerabilities in smart vehicles through this HITB2022SIN conference talk. Delve into practical attack methods for bypassing facial recognition and voice-print identification systems used in modern vehicles. Learn about spoofing techniques for face recognition login and engine start, as well as methods to trick smart speaker authentication for online shopping. Discover how to embed hidden commands in seemingly harmless audio files. Gain insights from security researchers Huajiang "Kevin2600" Chen and Li Siwei as they discuss various attack methodologies, including photo attacks, sculpture attacks, adversarial examples, and feature replacement attacks. Understand the implications for vehicle security, access control systems, and consumer electronics like smartphones and smart speakers.

Syllabus

Intro
Something you are
Speaker Recognition system 101
Speaker Recognition Applications
Speaker Recognition Spoofing Methodology
Speaker Recognition Replay Attack (Mystery App for Tesla)
Speaker Recognition TTS (Text2Speech) attack
Speaker Recognition TTS attack
Adversarial Example Attack (Speaker Recognition)
Facial Recognition Roadmap
Facial Recognition Applications
Facial Recognition Procedure
Facial Recognition Structure
Face Photo Attack - Hive Box
Face Sculpture Attack - Huawei P30 Pro
Adversarial Example Attack (Face Recognition)
Adversarial Example Attack Comparison
Adversarial Example Attack - Huawei P30 Pro
Adversarial Example Attack - Weltmeister Car
Adversarial Example Attack - Mystery Car :
Features Replace Attack - Xiaomi Note9
Thresholds Value Attack - Mystery Car :
Features Value Attack - Mystery system :
Extra Functions Attack - Access Control


Taught by

Hack In The Box Security Conference

Related Courses

In Soviet Russia Smart Card Hacks You
media.ccc.de via YouTube
Breaking Fraud and Bot Detection Solutions
OWASP Foundation via YouTube
Breaking the Security of Physical Devices
Black Hat via YouTube
Red Teaming a Manufacturing Network - Without Crashing It
BSidesLV via YouTube
Common Developer Crypto Mistakes with Illustrations in Java
YouTube