All times are in Pacific Daylight Time (UTC-0700).

  • Track: Main Channel: Saturday 10/10 @ 1500-1525 PDT

The use of voice recognition is becoming prominent and is on the rise in many pieces of software. Yet there are vulnerabilities and shortcomings of algorithms and technologies that allow attackers to perform voice morphing, theft of voice histories, etc., to perform other destructive attacks and influence companies, individuals, politics, legal proceedings, and more. The possibilities are limitless. This talk identifies those vulnerabilities, risks, and preventions.

Kim is working as a Teaching Assistant at CityU School of Technology & Computing and is a full time M.S. Computer Science student and security researcher. Currently Kim focuses on exploit development and mobile application exploitation. She finds her passion in helping people elevate their technical skills and knowledge, especially the...

Read More

linkedin Kim Nguyen

© 2024 ShellCon