While near-ultrasonic communications are gradually established as an alternative to Bluetooth and WiFi, the technology remains largely unregulated. This talk will go through the security challenges that the ecosystem faced from its inception, demonstrate its shortcomings and propose mitigations. The insights shared will inform potential adopters and those seeking to prevent security incidents.

Learning Objectives:
1: Learn about near-ultrasonic communication technology and the surrounding ecosystem.
2: Explore security shortcomings, privacy issues and mitigations.
3: Discover past and future security incidents, coupled with relevant insights.

Speakers: Vasilios Mavroudis, Giovanni Vigna

Vasilios Mavroudis is a Doctoral Researcher in the Information Security Group at University College London, where he studies the security and privacy aspects of digital ecosystems with a focus on emerging technologies and previously unknown attack vectors. His study on ultrasound tracking has received widespread attention and is considered the seminal work on the security of that ecosystem. He recently released a prototype of a novel high-assurance cryptograpic hardware architecture, while in the past he developed auditing tools for the public key infrastructure of Deutsche Bank and studied large-scale security threats in telecommunication networks. Mavroudis holds an M.Sc. in information security from University College London, and a B.Sc. in computer science from University of Macedonia, Greece.

Giovanni Vigna has been researching and developing security technology for more than 20 years, working on malware analysis, web security, vulnerability assessment and intrusion detection. He is a Professor in the Department of Computer Science and the Director of the Center for CyberSecurity at the University of California in Santa Barbara, and is Co-Founder and CTO at Lastline. He is the Author of more than 200 publications, peer-reviewed papers, conferences and books. He is known for organizing and running an annual inter university Capture the Flag (iCTF) hacking contest that involves dozens of institutions and hundreds of students around the world. He also leads the Shellphish hacking team, which is the longest-running team playing at DefCon’s CTF.

Detailed Presentation:

(Source: RSA Conference USA 2018)
 
 
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform