Artwork

Inhoud geleverd door Jacob Torrey, Haroon meer, and Marco slaviero. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Jacob Torrey, Haroon meer, and Marco slaviero of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.
Player FM - Podcast-app
Ga offline met de app Player FM !

ThinkstScapes Research Roundup - Q4 - 2021

25:28
 
Delen
 

Manage episode 314859821 series 3290432
Inhoud geleverd door Jacob Torrey, Haroon meer, and Marco slaviero. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Jacob Torrey, Haroon meer, and Marco slaviero of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

Sponge Examples: Energy-Latency Attacks on Neural Networks

Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, and Ross Anderson

[Slides] [Paper] [Video]

How to Use Cheated Cryptography to Overload a Server

Szilárd Pfeiffer

[Slides]

Bestie: Very Practical Searchable Encryption with Forward and Backward Security

Tuanyang Chen, Peng Xu, Wei Wang, Yubo Zheng, Willy Susilo, and Hai Jin

[Paper]

Symgrate: A Symbol Recovery Service for ARM Firmware

Travis Goodspeed & EVM

[Site]

From Graph Queries to Vulnerabilities in Binary Code

claudiu, fabs, and niko

[Slides]

Fast verified post-quantum software

Daniel J. Bernstein

[Slides]

AIModel-Mutator: Finding Vulnerabilities in TensorFlow

Qian Feng, Zhaofeng Chen, Zhenyu Zhong, Yakun Zhang, Ying Wang, Zheng Huang, Kang Li, Jie Hu and Heng Yin

[Slides]

DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification

Camille Le Bon, Erven Rohou, Frederic Tronel, and Guillaume Hiet

[Paper]

Trojan Source: Invisible Vulnerabilities

Nicholas Boucher and Ross Anderson

[Paper] [Code]

Who owns your hybrid Active Directory? Hunting for adversary techniques!

Thirumalai Natarajan Muthiah & Anurag Khanna

[Paper]

Breaking Azure AD joined endpoints in zero-trust environments

Dirk-jan Mollema

[Slides] [Video]

Going Deeper into Schneider Modicon PAC Security

Gao Jian

[Slides] [Video]

New Ways of IPv6 Scanning

Shupeng Gao, Xingru Wu, and Jie Gao

[Slides]

DIY cheap gigabit data diode

Magnus

[Code]

Bridge your service mesh and AWS

Santosh Ananthakrishnan & Harihara K Narayanan

[Slides]

GALILEO: In GPS We Trust?

Áron Szabó, Levente Kovács, and Péter Ligeti

[Slides]

“We wait, because we know you.” Inside the ransomware negotiation economics.

Pepijn Hack & Harihara K Narayanan

[Paper]

Privacy of DNS-over-HTTPS: Requiem for a dream?

Levente Csikor, Himanshu Singh, Min Suk Kang, and Dinil Mon Divakaran

[Slides]

Sleight of ARM: Demystifying Intel Houdini

Brian Hong

[Slides] [Video]

  continue reading

12 afleveringen

Artwork
iconDelen
 
Manage episode 314859821 series 3290432
Inhoud geleverd door Jacob Torrey, Haroon meer, and Marco slaviero. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Jacob Torrey, Haroon meer, and Marco slaviero of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

Sponge Examples: Energy-Latency Attacks on Neural Networks

Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, and Ross Anderson

[Slides] [Paper] [Video]

How to Use Cheated Cryptography to Overload a Server

Szilárd Pfeiffer

[Slides]

Bestie: Very Practical Searchable Encryption with Forward and Backward Security

Tuanyang Chen, Peng Xu, Wei Wang, Yubo Zheng, Willy Susilo, and Hai Jin

[Paper]

Symgrate: A Symbol Recovery Service for ARM Firmware

Travis Goodspeed & EVM

[Site]

From Graph Queries to Vulnerabilities in Binary Code

claudiu, fabs, and niko

[Slides]

Fast verified post-quantum software

Daniel J. Bernstein

[Slides]

AIModel-Mutator: Finding Vulnerabilities in TensorFlow

Qian Feng, Zhaofeng Chen, Zhenyu Zhong, Yakun Zhang, Ying Wang, Zheng Huang, Kang Li, Jie Hu and Heng Yin

[Slides]

DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification

Camille Le Bon, Erven Rohou, Frederic Tronel, and Guillaume Hiet

[Paper]

Trojan Source: Invisible Vulnerabilities

Nicholas Boucher and Ross Anderson

[Paper] [Code]

Who owns your hybrid Active Directory? Hunting for adversary techniques!

Thirumalai Natarajan Muthiah & Anurag Khanna

[Paper]

Breaking Azure AD joined endpoints in zero-trust environments

Dirk-jan Mollema

[Slides] [Video]

Going Deeper into Schneider Modicon PAC Security

Gao Jian

[Slides] [Video]

New Ways of IPv6 Scanning

Shupeng Gao, Xingru Wu, and Jie Gao

[Slides]

DIY cheap gigabit data diode

Magnus

[Code]

Bridge your service mesh and AWS

Santosh Ananthakrishnan & Harihara K Narayanan

[Slides]

GALILEO: In GPS We Trust?

Áron Szabó, Levente Kovács, and Péter Ligeti

[Slides]

“We wait, because we know you.” Inside the ransomware negotiation economics.

Pepijn Hack & Harihara K Narayanan

[Paper]

Privacy of DNS-over-HTTPS: Requiem for a dream?

Levente Csikor, Himanshu Singh, Min Suk Kang, and Dinil Mon Divakaran

[Slides]

Sleight of ARM: Demystifying Intel Houdini

Brian Hong

[Slides] [Video]

  continue reading

12 afleveringen

Alle afleveringen

×
 
Loading …

Welkom op Player FM!

Player FM scant het web op podcasts van hoge kwaliteit waarvan u nu kunt genieten. Het is de beste podcast-app en werkt op Android, iPhone en internet. Aanmelden om abonnementen op verschillende apparaten te synchroniseren.

 

Korte handleiding