Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Eliminating Triage Intermediaries for Zero-day Exploits Using a Decentralised Payout Protocol

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a groundbreaking protocol for collectivizing security bounties for deterministically verifiable zero-day exploits in this 23-minute Black Hat conference talk. Discover how this innovative approach enables companies to demonstrate software security through dollar-staked open-source software stacks, while ensuring ethical hackers receive unambiguous bounty payouts. Learn about the elimination of subjective triage processes and manual labor for these exploits, and understand how the protocol allows stakeholders to pool bounties on open-source security stacks using decentralized virtual machines (DVMs) with read and/or write secrets. Gain insights from speakers Victoria Bosch, Clara Maine, Subhechha Subudhi, and Akke Toeter on this revolutionary approach to cybersecurity incentives and transparency.

Syllabus

Eliminating Triage Intermediaries for Zero-day Exploits Using a Decentralised Payout Protocol

Taught by

Black Hat

Reviews

Start your review of Eliminating Triage Intermediaries for Zero-day Exploits Using a Decentralised Payout Protocol

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.