Biometrics System Hacking in the Age of the Smart Vehicle
Hack In The Box Security Conference via YouTube
Overview
Syllabus
Intro
Something you are
Speaker Recognition system 101
Speaker Recognition Applications
Speaker Recognition Spoofing Methodology
Speaker Recognition Replay Attack (Mystery App for Tesla)
Speaker Recognition TTS (Text2Speech) attack
Speaker Recognition TTS attack
Adversarial Example Attack (Speaker Recognition)
Facial Recognition Roadmap
Facial Recognition Applications
Facial Recognition Procedure
Facial Recognition Structure
Face Photo Attack - Hive Box
Face Sculpture Attack - Huawei P30 Pro
Adversarial Example Attack (Face Recognition)
Adversarial Example Attack Comparison
Adversarial Example Attack - Huawei P30 Pro
Adversarial Example Attack - Weltmeister Car
Adversarial Example Attack - Mystery Car :
Features Replace Attack - Xiaomi Note9
Thresholds Value Attack - Mystery Car :
Features Value Attack - Mystery system :
Extra Functions Attack - Access Control
Taught by
Hack In The Box Security Conference