Главная
Study mode:
on
1
Intro
2
Something you are
3
Speaker Recognition system 101
4
Speaker Recognition Applications
5
Speaker Recognition Spoofing Methodology
6
Speaker Recognition Replay Attack (Mystery App for Tesla)
7
Speaker Recognition TTS (Text2Speech) attack
8
Speaker Recognition TTS attack
9
Adversarial Example Attack (Speaker Recognition)
10
Facial Recognition Roadmap
11
Facial Recognition Applications
12
Facial Recognition Procedure
13
Facial Recognition Structure
14
Face Photo Attack - Hive Box
15
Face Sculpture Attack - Huawei P30 Pro
16
Adversarial Example Attack (Face Recognition)
17
Adversarial Example Attack Comparison
18
Adversarial Example Attack - Huawei P30 Pro
19
Adversarial Example Attack - Weltmeister Car
20
Adversarial Example Attack - Mystery Car :
21
Features Replace Attack - Xiaomi Note9
22
Thresholds Value Attack - Mystery Car :
23
Features Value Attack - Mystery system :
24
Extra Functions Attack - Access Control
Description:
Explore biometric system vulnerabilities in smart vehicles through this HITB2022SIN conference talk. Delve into practical attack methods for bypassing facial recognition and voice-print identification systems used in modern vehicles. Learn about spoofing techniques for face recognition login and engine start, as well as methods to trick smart speaker authentication for online shopping. Discover how to embed hidden commands in seemingly harmless audio files. Gain insights from security researchers Huajiang "Kevin2600" Chen and Li Siwei as they discuss various attack methodologies, including photo attacks, sculpture attacks, adversarial examples, and feature replacement attacks. Understand the implications for vehicle security, access control systems, and consumer electronics like smartphones and smart speakers.

Biometrics System Hacking in the Age of the Smart Vehicle

Hack In The Box Security Conference
Add to list
0:00 / 0:00