Biometrics System Hacking in the Age of the Smart Vehicle
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Syllabus
Intro
Something you are
Speaker Recognition system 101
Speaker Recognition Applications
Speaker Recognition Spoofing Methodology
Speaker Recognition Replay Attack (Mystery App for Tesla)
Speaker Recognition TTS (Text2Speech) attack
Speaker Recognition TTS attack
Adversarial Example Attack (Speaker Recognition)
Facial Recognition Roadmap
Facial Recognition Applications
Facial Recognition Procedure
Facial Recognition Structure
Face Photo Attack - Hive Box
Face Sculpture Attack - Huawei P30 Pro
Adversarial Example Attack (Face Recognition)
Adversarial Example Attack Comparison
Adversarial Example Attack - Huawei P30 Pro
Adversarial Example Attack - Weltmeister Car
Adversarial Example Attack - Mystery Car :
Features Replace Attack - Xiaomi Note9
Thresholds Value Attack - Mystery Car :
Features Value Attack - Mystery system :
Extra Functions Attack - Access Control
Taught by
Hack In The Box Security Conference
Related Courses
In Soviet Russia Smart Card Hacks Youmedia.ccc.de via YouTube Breaking Fraud and Bot Detection Solutions
OWASP Foundation via YouTube Breaking the Security of Physical Devices
Black Hat via YouTube Red Teaming a Manufacturing Network - Without Crashing It
BSidesLV via YouTube Common Developer Crypto Mistakes with Illustrations in Java
YouTube