Academic and Industry Talks
Vulnerabilities
-
- Overview of the security and privacy risks of integrating technology into medical devices, cars, and other things (20 minutes)
-
Chris Pritchard - The Basics of Social Engineering - DEF CON 27 Social Engineering Village
- Discusses practical experience engaging in social engineering attacks (24 minutes)
-
- Shows how to jailbreak an LLM, with participants in a study succeeding even without much expertise (10 minutes)
-
- Shows how a video decoder can be exploited to attack Firefox and VLC for Windows, multiple Android devices (11 minutes)
-
- Demonstrates a new type of attack that manipulates source code to hide a vulnerability (13 minutes)
Protective Technology
-
- Describes a tool that can be used to “cloak” art before an artist shares it, avoiding style mimicry by AI (12 minutes)
-
- Describe cache side-channel attacks and a technique to prevent them
Skills
- everything is open source if you can reverse engineer, Low Level
- video demonstrating reverse engineering (14 minutes)
Usable Security and Privacy
-
- Examines the motivation of bug hunters and the challenges they face (12 minutes)
-
- Examines views regarding non-consensual AI image generation (10 minutes)
-
- Discusses security and privacy difficulties faced by victim-survivors of intimate partner violence (12 minutes)
-
- Examines security and privacy needs of refugees to the US (12 minutes)