I gave a keynote on modeling attackers and aligning defensive operations, using attacks on mobile phones as a case study. I mostly improvised from my ~2012 slides here: https://github.com/trailofbits/publications/tree/master/presentations/The%20Mobile%20Exploit%20Intelligence%20Project …
-
-
Show this thread
-
Teams Cyber Warriors, fsociety, and Byte Me are finalists presenting their policy responses to a hypothetical foreign country manipulating a US municipal election through a cutout abusing stolen USG exploit code.pic.twitter.com/RkjE2snZ2k
Show this thread -
And the results are in: 1. fsociety (Tufts) 2. Byte Me (Wellesley) 3. Cyber Warriors (Harvard)
Show this thread
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.