A gap that makes little sense since z/OS has been around for a while and is used by most major companies to perform critical business operations: wire transfer, claim refunds, bookings, etc.
If you want to test some of the tools showcased during the talk, you can check out his tools: https://github.com/ayoul3/ @ayoul3__ Sunday at in Track 3 20 minutes | Demo, Tool Windows' BITS service is a middleman for your download jobs.
Ayoul3 Ayoub is a pentester working for Wavestone, a consulting firm based in France.
He got interested in Mainframe security in 2014 when, during an audit, he noticed the big security gap between this platform and standard systems like Windows and Unix.
After surveying all-too-possible low level attacks on critical systems, we will introduce an alternative open source solution to peace-of-mind cryptography and private computing.
By using programmable logic chips, called Field Programmable Gate Arrays, this device is more open source than any common personal computing system to date.
He received his Ph D in Electrical Engineering (signal and image processing machine learning) from the University of Washington and BS/MS degrees from Brigham Young University.
Embedded technologies like Intel Management Engine pose significant threats when, not if, they get exploited.
Advanced attackers in possession of firmware signing keys, and even potential access to chip fabrication, could wreak untold havoc on cryptographic devices we rely on.
Less well appreciated, however, is that machine learning can be susceptible to attack by, ironically, other machine learning models.
In this talk, we demonstrate an AI agent trained through reinforcement learning to modify malware to evade machine learning malware detection.
Other interests include SDR and RF exploration, networking, cryptography, computer history, distributed computing...really anything that sounds cool that I happen to stumble on at 3am.