YoVDO

Biometrics System Hacking in the Age of the Smart Vehicle

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Wireless Security Courses Face Recognition Courses Replay Attacks Courses

Course Description

Overview

Explore biometric system vulnerabilities in smart vehicles through this HITB2022SIN conference talk. Delve into practical attack methods for bypassing facial recognition and voice-print identification systems used in modern vehicles. Learn about spoofing techniques for face recognition login and engine start, as well as methods to trick smart speaker authentication for online shopping. Discover how to embed hidden commands in seemingly harmless audio files. Gain insights from security researchers Huajiang "Kevin2600" Chen and Li Siwei as they discuss various attack methodologies, including photo attacks, sculpture attacks, adversarial examples, and feature replacement attacks. Understand the implications for vehicle security, access control systems, and consumer electronics like smartphones and smart speakers.

Syllabus

Intro
Something you are
Speaker Recognition system 101
Speaker Recognition Applications
Speaker Recognition Spoofing Methodology
Speaker Recognition Replay Attack (Mystery App for Tesla)
Speaker Recognition TTS (Text2Speech) attack
Speaker Recognition TTS attack
Adversarial Example Attack (Speaker Recognition)
Facial Recognition Roadmap
Facial Recognition Applications
Facial Recognition Procedure
Facial Recognition Structure
Face Photo Attack - Hive Box
Face Sculpture Attack - Huawei P30 Pro
Adversarial Example Attack (Face Recognition)
Adversarial Example Attack Comparison
Adversarial Example Attack - Huawei P30 Pro
Adversarial Example Attack - Weltmeister Car
Adversarial Example Attack - Mystery Car :
Features Replace Attack - Xiaomi Note9
Thresholds Value Attack - Mystery Car :
Features Value Attack - Mystery system :
Extra Functions Attack - Access Control


Taught by

Hack In The Box Security Conference

Related Courses

Hacking RF - Breaking What We Can't See
Security BSides London via YouTube
Car Hacking - Practical Guide to Automotive Security
Hack In The Box Security Conference via YouTube
Red Teaming a Manufacturing Network - Without Crashing It
BSidesLV via YouTube
Breaking Fraud and Bot Detection Solutions
OWASP Foundation via YouTube
RollBack - A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems
Black Hat via YouTube