Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

I am a legend 3: Looking for undervalued cards in Hearthstone

What Elie Bursztein now looks into is the process of modeling cards by attributes to determine their real values and then compare those to the face values. Okay, so how do we scale that to hundreds of cards? More precisely, we were able to do 130 cards for this research, because modeling each attribute is a...

I am a legend 2: Card attributes and basic game assumptions

Elie Bursztein now looks into the attributes for each card in Hearthstone, providing a few simple examples of value discrepancy for some of the common ones. What makes this game so interesting is the cards. Everything is a card, and you should look at how the game is structured. Actually, your hero is a...

I am a legend: Hacking Hearthstone with machine learning

At Defcon 22, Elie Bursztein and his wife Celine present their research about finding undervalued cards in Hearthstone and predicting the opponent’s actions. Hi everyone! My name is Elie. Today Celine and I are going to talk to you about Blizzard’s new game Hearthstone. Just a quick disclaimer before we...

Weaponizing Your Pets 8: The Conclusions

The closing part of Mr. Bransfield’s presentation highlights the key takeaways from his research and some extracurricular activities for the Defcon community. So, what have we learned overall? A tech hobbyist with no prior firmware experience can create a functional War Kitteh Collar in a relatively short...

Weaponizing Your Pets 7: The Denial of Service Dog in Action

Gene Bransfield moves on to describe further experiments with weaponizing pets, now covering the deployment of the Denial of Service Dog project. Now I’ll move on to the Denial of Service Dog. So, the Denial of Service Dog, admittedly, is just trolling. There’s nothing socially redeeming about it...

Weaponizing Your Pets 6: The War Kitteh Success

The cat collar assembly being finally completed, the War Kitteh goes for a walkabout to do some wardriving in the neighborhood while staying tracked via GPS. So, now we’re back to our volunteer cat (see right-hand image). This bastard still owes me a cell phone. We’re going to send him out with some...

Weaponizing Your Pets 5: The Final Collar Assembly

This part of Gene Bransfield’s talk covers the final troubleshooting and gear preparation before the volunteer pets are good to go with the collar. So, when I was working with the Arduino stuff I had the TinyGPS++ stuff that I’d really liked to use. I loved to use TinyGPS++ because it was very easy to...

Weaponizing Your Pets 4: Spark Core to the Rescue

Having run into hurdles with Arduino, Gene Bransfield now turns to Spark Core development platform to make the needed pet collar and try to get it working. Looking into another form factor, this is the Spark Core (see leftmost image below). I call it the “Arduino mullet” because it’s got WiFi...

Weaponizing Your Pets 3: Some Fun with Arduino

After the fail with tech inside the cat coat, Gene decides to give Arduino a shot due to the right form factor and sufficient functionality – read how it went. I was talking to my friend Bill about this, and he laughed. He said: “Why don’t you try Arduino? It’s a small form factor, low power...

Weaponizing Your Pets 2: Better Luck Next Time with the Cat

Gene Bransfield’s very first attempts sending out the War Kitteh with not-so-sophisticated gear turned out a fail – read the entry to learn what happened. So, requirements… The CONOP is to put a collar or harness on a cat with stuff in it and have the cat do a walkabout and get data. Well, number 0 is...