Unveiling the Underground World of Anti-Cheats
By Joel Noguera
This talk pretends to catch everyone's attention from new people to experts on the field, starting with a state of the market and interesting cases around the cheating world, and finishing with a deep explanation of each analyzed technique and the results we obtained during the journey.
Full Abstract & Presentation Materials: https://www.blackhat.com/eu-19/briefings/schedule/index.html#unveiling-the-underground-world-of-anti-cheats-17358
Видео Unveiling the Underground World of Anti-Cheats канала Black Hat
This talk pretends to catch everyone's attention from new people to experts on the field, starting with a state of the market and interesting cases around the cheating world, and finishing with a deep explanation of each analyzed technique and the results we obtained during the journey.
Full Abstract & Presentation Materials: https://www.blackhat.com/eu-19/briefings/schedule/index.html#unveiling-the-underground-world-of-anti-cheats-17358
Видео Unveiling the Underground World of Anti-Cheats канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Implementing the Lessons Learned From a Major Cyber AttackTactics of Physical Pen TestersProcess Injection Techniques - Gotta Catch Them AllBadUSB - On Accessories that Turn Evil by Karsten Nohl + Jakob LellReversing Statically-Linked Binaries with Function Signatures - bin 0x2DThe Path Less Traveled: Abusing Kubernetes DefaultsThe NSA Playset: A Year Of Toys And ToolsBreaking the x86 Instruction SetNext Level Cheating and Leveling Up MitigationsDEF CON 26 - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86Exploiting Network PrintersWriting Bad @$$ Malware For OS XWe fixed Windows 10 - Microsoft will HATE this!Hardware Bans, Machine Learning; PC Gaming's Anti-Cheat Strategy to Stop CheatingNew Adventures in Spying 3G and 4G Users: Locate Track & MonitorHorse Pill: A New Type of Linux RootkitWindows Offender: Reverse Engineering Windows Defender's Antivirus EmulatorThe Machines That Betrayed Their Masters by Glenn Wilkinson24 Techniques to Gather Threat Intel and Track Actors