Ga offline met de app Player FM !
ThinkstScapes Research Roundup - Q4 - 2021
Manage episode 314859821 series 3290432
Sponge Examples: Energy-Latency Attacks on Neural Networks
Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, and Ross Anderson
How to Use Cheated Cryptography to Overload a Server
Szilárd Pfeiffer
[Slides]
Bestie: Very Practical Searchable Encryption with Forward and Backward Security
Tuanyang Chen, Peng Xu, Wei Wang, Yubo Zheng, Willy Susilo, and Hai Jin
[Paper]
Symgrate: A Symbol Recovery Service for ARM Firmware
Travis Goodspeed & EVM
[Site]
From Graph Queries to Vulnerabilities in Binary Code
claudiu, fabs, and niko
[Slides]
Fast verified post-quantum software
Daniel J. Bernstein
[Slides]
AIModel-Mutator: Finding Vulnerabilities in TensorFlow
Qian Feng, Zhaofeng Chen, Zhenyu Zhong, Yakun Zhang, Ying Wang, Zheng Huang, Kang Li, Jie Hu and Heng Yin
[Slides]
DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification
Camille Le Bon, Erven Rohou, Frederic Tronel, and Guillaume Hiet
[Paper]
Trojan Source: Invisible Vulnerabilities
Nicholas Boucher and Ross Anderson
Who owns your hybrid Active Directory? Hunting for adversary techniques!
Thirumalai Natarajan Muthiah & Anurag Khanna
[Paper]
Breaking Azure AD joined endpoints in zero-trust environments
Dirk-jan Mollema
Going Deeper into Schneider Modicon PAC Security
Gao Jian
New Ways of IPv6 Scanning
Shupeng Gao, Xingru Wu, and Jie Gao
[Slides]
DIY cheap gigabit data diode
Magnus
[Code]
Bridge your service mesh and AWS
Santosh Ananthakrishnan & Harihara K Narayanan
[Slides]
GALILEO: In GPS We Trust?
Áron Szabó, Levente Kovács, and Péter Ligeti
[Slides]
“We wait, because we know you.” Inside the ransomware negotiation economics.
Pepijn Hack & Harihara K Narayanan
[Paper]
Privacy of DNS-over-HTTPS: Requiem for a dream?
Levente Csikor, Himanshu Singh, Min Suk Kang, and Dinil Mon Divakaran
[Slides]
Sleight of ARM: Demystifying Intel Houdini
Brian Hong
12 afleveringen
Manage episode 314859821 series 3290432
Sponge Examples: Energy-Latency Attacks on Neural Networks
Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, and Ross Anderson
How to Use Cheated Cryptography to Overload a Server
Szilárd Pfeiffer
[Slides]
Bestie: Very Practical Searchable Encryption with Forward and Backward Security
Tuanyang Chen, Peng Xu, Wei Wang, Yubo Zheng, Willy Susilo, and Hai Jin
[Paper]
Symgrate: A Symbol Recovery Service for ARM Firmware
Travis Goodspeed & EVM
[Site]
From Graph Queries to Vulnerabilities in Binary Code
claudiu, fabs, and niko
[Slides]
Fast verified post-quantum software
Daniel J. Bernstein
[Slides]
AIModel-Mutator: Finding Vulnerabilities in TensorFlow
Qian Feng, Zhaofeng Chen, Zhenyu Zhong, Yakun Zhang, Ying Wang, Zheng Huang, Kang Li, Jie Hu and Heng Yin
[Slides]
DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification
Camille Le Bon, Erven Rohou, Frederic Tronel, and Guillaume Hiet
[Paper]
Trojan Source: Invisible Vulnerabilities
Nicholas Boucher and Ross Anderson
Who owns your hybrid Active Directory? Hunting for adversary techniques!
Thirumalai Natarajan Muthiah & Anurag Khanna
[Paper]
Breaking Azure AD joined endpoints in zero-trust environments
Dirk-jan Mollema
Going Deeper into Schneider Modicon PAC Security
Gao Jian
New Ways of IPv6 Scanning
Shupeng Gao, Xingru Wu, and Jie Gao
[Slides]
DIY cheap gigabit data diode
Magnus
[Code]
Bridge your service mesh and AWS
Santosh Ananthakrishnan & Harihara K Narayanan
[Slides]
GALILEO: In GPS We Trust?
Áron Szabó, Levente Kovács, and Péter Ligeti
[Slides]
“We wait, because we know you.” Inside the ransomware negotiation economics.
Pepijn Hack & Harihara K Narayanan
[Paper]
Privacy of DNS-over-HTTPS: Requiem for a dream?
Levente Csikor, Himanshu Singh, Min Suk Kang, and Dinil Mon Divakaran
[Slides]
Sleight of ARM: Demystifying Intel Houdini
Brian Hong
12 afleveringen
Alle afleveringen
×Welkom op Player FM!
Player FM scant het web op podcasts van hoge kwaliteit waarvan u nu kunt genieten. Het is de beste podcast-app en werkt op Android, iPhone en internet. Aanmelden om abonnementen op verschillende apparaten te synchroniseren.