Shuffle Up and Deal: Analyzing the Security of Automated Card Shufflers
There's a long history of cheating in the world of gambling, from hiding aces up your sleeve to developing modern hacks. So it's no surprise that modern casinos are designed with security in mind; thousands of cameras watch every square inch of the floor, closely monitoring each table and machine. Nevertheless, cheating still occurs and can lead to millions of dollars in losses, not only to casinos but, in some games, to players as well.
This presentation will start by providing an overview of the standards defined by the International Gaming Standards Association (IGSA), which are used for communication and authentication in Electronic Gaming Machines (EGMs) and peripherals....
By: Enrique Nissim , Ethan Shackelford , Joseph Tartaro
Full Abstract and Presentation Materials: https://www.blackhat.com/us-23/briefings/schedule/#shuffle-up-and-deal-analyzing-the-security-of-automated-card-shufflers-31741
Видео Shuffle Up and Deal: Analyzing the Security of Automated Card Shufflers канала Black Hat
This presentation will start by providing an overview of the standards defined by the International Gaming Standards Association (IGSA), which are used for communication and authentication in Electronic Gaming Machines (EGMs) and peripherals....
By: Enrique Nissim , Ethan Shackelford , Joseph Tartaro
Full Abstract and Presentation Materials: https://www.blackhat.com/us-23/briefings/schedule/#shuffle-up-and-deal-analyzing-the-security-of-automated-card-shufflers-31741
Видео Shuffle Up and Deal: Analyzing the Security of Automated Card Shufflers канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
A Hole in the Tube: Uncovering Vulnerabilities in Critical Infrastructure of Healthcare FacilitiesDynamic Binary Instrumentation Techniques to Address Native Code ObfuscationFrom Logic to Memory: Winning the Solitaire in Reparse PointsCome to the Dark Side, We Have Apples: Turning macOS Management EvilBeyond Root: Custom Firmware for Embedded Mobile ChipsetshAFL1: Our Journey of Fuzzing Hyper-V and Discovering a 0-DayRCE-as-a-Service: Lessons Learned from 5 Years of Real-World CI/CD Pipeline CompromisePatching Loopholes: Finding Backdoors in ApplicationsRope: Bypassing Behavioral Detection of Malware with Distributed ROP-Driven ExecutionEscaping Virtualized ContainersPortable Data exFiltration: XSS for PDFsMy Cloud is APT's Cloud: Investigating and Defending Office 365Attack on Titan M, Reloaded: Vulnerability Research on a Modern Security ChipIMP4GT: IMPersonation Attacks in 4G NeTworksHey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a FeatureHacking a Capsule Hotel - Ghost in the BedroomsBreaking Firmware Trust From Pre-EFI: Exploiting Early Boot PhasesHiding Objects from Computer Vision by Exploiting Correlation BiasesProxyLogon is Just the Tip of the Iceberg: A New Attack Surface on Microsoft Exchange Server!Reverse Engineering the Tesla Battery Management System to increase Power AvailableMultiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets