Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the systemic issue of algorithm theft and unauthorized use in the cybersecurity community through this 26-minute Black Hat conference talk. Discover search techniques for automatically detecting unauthorized code in commercial products and learn how reverse-engineering and binary comparison methods can confirm such findings. Examine a real-world case study focusing on a popular non-profit tool reverse-engineered by multiple entities for unauthorized use in commercial products. Gain actionable takeaways and recommendations for confronting culpable commercial entities and their legal teams. Learn strategies for corporations to prevent algorithm theft, ensuring the cybersecurity community remains focused on mutual goals. Presented by Tom McGuire and Patrick Wardle, this talk provides valuable insights into protecting intellectual property and maintaining ethical standards within the industry.