Biometrics System Hacking in the Age of the Smart Vehicle

Biometrics System Hacking in the Age of the Smart Vehicle

Hack In The Box Security Conference via YouTube Direct link

Intro

1 of 24

1 of 24

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Biometrics System Hacking in the Age of the Smart Vehicle

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Something you are
  3. 3 Speaker Recognition system 101
  4. 4 Speaker Recognition Applications
  5. 5 Speaker Recognition Spoofing Methodology
  6. 6 Speaker Recognition Replay Attack (Mystery App for Tesla)
  7. 7 Speaker Recognition TTS (Text2Speech) attack
  8. 8 Speaker Recognition TTS attack
  9. 9 Adversarial Example Attack (Speaker Recognition)
  10. 10 Facial Recognition Roadmap
  11. 11 Facial Recognition Applications
  12. 12 Facial Recognition Procedure
  13. 13 Facial Recognition Structure
  14. 14 Face Photo Attack - Hive Box
  15. 15 Face Sculpture Attack - Huawei P30 Pro
  16. 16 Adversarial Example Attack (Face Recognition)
  17. 17 Adversarial Example Attack Comparison
  18. 18 Adversarial Example Attack - Huawei P30 Pro
  19. 19 Adversarial Example Attack - Weltmeister Car
  20. 20 Adversarial Example Attack - Mystery Car :
  21. 21 Features Replace Attack - Xiaomi Note9
  22. 22 Thresholds Value Attack - Mystery Car :
  23. 23 Features Value Attack - Mystery system :
  24. 24 Extra Functions Attack - Access Control

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.