Chuyển sang chế độ ngoại tuyến với ứng dụng Player FM !
ThinkstScapes Research Roundup - Q4 - 2021
Manage episode 314859821 series 3290432
Sponge Examples: Energy-Latency Attacks on Neural Networks
Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, and Ross Anderson
How to Use Cheated Cryptography to Overload a Server
Szilárd Pfeiffer
[Slides]
Bestie: Very Practical Searchable Encryption with Forward and Backward Security
Tuanyang Chen, Peng Xu, Wei Wang, Yubo Zheng, Willy Susilo, and Hai Jin
[Paper]
Symgrate: A Symbol Recovery Service for ARM Firmware
Travis Goodspeed & EVM
[Site]
From Graph Queries to Vulnerabilities in Binary Code
claudiu, fabs, and niko
[Slides]
Fast verified post-quantum software
Daniel J. Bernstein
[Slides]
AIModel-Mutator: Finding Vulnerabilities in TensorFlow
Qian Feng, Zhaofeng Chen, Zhenyu Zhong, Yakun Zhang, Ying Wang, Zheng Huang, Kang Li, Jie Hu and Heng Yin
[Slides]
DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification
Camille Le Bon, Erven Rohou, Frederic Tronel, and Guillaume Hiet
[Paper]
Trojan Source: Invisible Vulnerabilities
Nicholas Boucher and Ross Anderson
Who owns your hybrid Active Directory? Hunting for adversary techniques!
Thirumalai Natarajan Muthiah & Anurag Khanna
[Paper]
Breaking Azure AD joined endpoints in zero-trust environments
Dirk-jan Mollema
Going Deeper into Schneider Modicon PAC Security
Gao Jian
New Ways of IPv6 Scanning
Shupeng Gao, Xingru Wu, and Jie Gao
[Slides]
DIY cheap gigabit data diode
Magnus
[Code]
Bridge your service mesh and AWS
Santosh Ananthakrishnan & Harihara K Narayanan
[Slides]
GALILEO: In GPS We Trust?
Áron Szabó, Levente Kovács, and Péter Ligeti
[Slides]
“We wait, because we know you.” Inside the ransomware negotiation economics.
Pepijn Hack & Harihara K Narayanan
[Paper]
Privacy of DNS-over-HTTPS: Requiem for a dream?
Levente Csikor, Himanshu Singh, Min Suk Kang, and Dinil Mon Divakaran
[Slides]
Sleight of ARM: Demystifying Intel Houdini
Brian Hong
12 tập
Manage episode 314859821 series 3290432
Sponge Examples: Energy-Latency Attacks on Neural Networks
Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, and Ross Anderson
How to Use Cheated Cryptography to Overload a Server
Szilárd Pfeiffer
[Slides]
Bestie: Very Practical Searchable Encryption with Forward and Backward Security
Tuanyang Chen, Peng Xu, Wei Wang, Yubo Zheng, Willy Susilo, and Hai Jin
[Paper]
Symgrate: A Symbol Recovery Service for ARM Firmware
Travis Goodspeed & EVM
[Site]
From Graph Queries to Vulnerabilities in Binary Code
claudiu, fabs, and niko
[Slides]
Fast verified post-quantum software
Daniel J. Bernstein
[Slides]
AIModel-Mutator: Finding Vulnerabilities in TensorFlow
Qian Feng, Zhaofeng Chen, Zhenyu Zhong, Yakun Zhang, Ying Wang, Zheng Huang, Kang Li, Jie Hu and Heng Yin
[Slides]
DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification
Camille Le Bon, Erven Rohou, Frederic Tronel, and Guillaume Hiet
[Paper]
Trojan Source: Invisible Vulnerabilities
Nicholas Boucher and Ross Anderson
Who owns your hybrid Active Directory? Hunting for adversary techniques!
Thirumalai Natarajan Muthiah & Anurag Khanna
[Paper]
Breaking Azure AD joined endpoints in zero-trust environments
Dirk-jan Mollema
Going Deeper into Schneider Modicon PAC Security
Gao Jian
New Ways of IPv6 Scanning
Shupeng Gao, Xingru Wu, and Jie Gao
[Slides]
DIY cheap gigabit data diode
Magnus
[Code]
Bridge your service mesh and AWS
Santosh Ananthakrishnan & Harihara K Narayanan
[Slides]
GALILEO: In GPS We Trust?
Áron Szabó, Levente Kovács, and Péter Ligeti
[Slides]
“We wait, because we know you.” Inside the ransomware negotiation economics.
Pepijn Hack & Harihara K Narayanan
[Paper]
Privacy of DNS-over-HTTPS: Requiem for a dream?
Levente Csikor, Himanshu Singh, Min Suk Kang, and Dinil Mon Divakaran
[Slides]
Sleight of ARM: Demystifying Intel Houdini
Brian Hong
12 tập
모든 에피소드
×Chào mừng bạn đến với Player FM!
Player FM đang quét trang web để tìm các podcast chất lượng cao cho bạn thưởng thức ngay bây giờ. Đây là ứng dụng podcast tốt nhất và hoạt động trên Android, iPhone và web. Đăng ký để đồng bộ các theo dõi trên tất cả thiết bị.