All times are in Pacific Daylight Time (UTC-0700).
The use of voice recognition is becoming prominent and is on the rise in many pieces of software. Yet there are vulnerabilities and shortcomings of algorithms and technologies that allow attackers to perform voice morphing, theft of voice histories, etc., to perform other destructive attacks and influence companies, individuals, politics, legal proceedings, and more. The possibilities are limitless. This talk identifies those vulnerabilities, risks, and preventions.
Kim is working as a Teaching Assistant at CityU School of Technology & Computing and is a full time M.S. Computer Science student and security researcher. Currently Kim focuses on exploit development and mobile application exploitation. She finds her passion in helping people elevate their technical skills and knowledge, especially the...
Read More© 2024 ShellCon