Artwork

İçerik Jacob Torrey, Haroon meer, and Marco slaviero tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Jacob Torrey, Haroon meer, and Marco slaviero veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.
Player FM - Podcast Uygulaması
Player FM uygulamasıyla çevrimdışı Player FM !

ThinkstScapes Research Roundup - Q1 - 2022

34:35
 
Paylaş
 

Manage episode 326563400 series 3290432
İçerik Jacob Torrey, Haroon meer, and Marco slaviero tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Jacob Torrey, Haroon meer, and Marco slaviero veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.

Hyntrospect: a fuzzer for Hyper-V devices

Diane Dubois

[Slides] [Paper] [Code] [Video]

Put an io_uring on it: Exploiting the Linux Kernel

Valentina Palmiotti

[Blog]

The AMD Branch (Mis)predictor: Where No CPU has Gone Before

Pawel Wieczorkiewicz

[Blog part 1] [Blog part 2]

Dynamic Process Isolation

Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Daniel Gruss, and Michael Schwarz

[Paper]

Another Brick in the Wall: Uncovering SMM Vulnerabilities in HP Firmware

Itai Liba, and Assaf Carlsbad

[Blog] [Code]

Confidential Containers: Bringing Confidential Computing to the Kubernetes Workload Masses

Samuel Ortiz

[Video]

Kubernetes Meets Confidential Computing - The Different Ways of Scaling Sensitive Workloads

Moritz Eckert

[Video]

Implementing Post-quantum Cryptography for Developers

Julius Hekkala, Kimmo Halunen, and Visa Vallivaara

[Paper]

CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes

Hao Huang, Yongtao Wang, Zhaoyu Chen, Yu Ze Zhang, Yuheng Li, Zhi Tang, Wei Chu, Jingdong Chen, Weisi Lin, and Kai-Kuang Ma

[Paper] [Code]

Leashing the Inner Demons: Self-Detoxification for Language Models

Canwen Xu, Zexue He, Zhankui He, and Julian McAuley

[Paper] [Code]

Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems

Wei Jia, Zhaojun Lu, Haichun Zhang, Zhenglin Liu, Jie Wang, and Gang Qu

[Paper]

Synthetic Disinformation Attacks on Automated Fact Verification Systems

Yibing Du, Antoine Bosselut, Christopher D. Manning

[Paper]

Why No One Pwned Synology at Pwn2Own and Tianfu Cup in 2021

Eugene Lim, and Loke Hui Yi

[Slides]

DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting

Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, and Yuval Yarom

[Paper] [Code]

Attacking JavaScript Engines in 2022

Samuel Groß, and Amanda Burnett

[Slides]

Security Analysis of MTE Through Examples

Saar Amar

[Slides] [Video]

An Armful of CHERIs

Saar Amar, Nicholas Joly, David Chisnall, Manuel Costa, Sylvan Clebsch, Wes Filardo, Boris Köpf, Robert Norton-Wright, and Matthew Parkison

[Blog]

  continue reading

12 bölüm

Artwork
iconPaylaş
 
Manage episode 326563400 series 3290432
İçerik Jacob Torrey, Haroon meer, and Marco slaviero tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Jacob Torrey, Haroon meer, and Marco slaviero veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.

Hyntrospect: a fuzzer for Hyper-V devices

Diane Dubois

[Slides] [Paper] [Code] [Video]

Put an io_uring on it: Exploiting the Linux Kernel

Valentina Palmiotti

[Blog]

The AMD Branch (Mis)predictor: Where No CPU has Gone Before

Pawel Wieczorkiewicz

[Blog part 1] [Blog part 2]

Dynamic Process Isolation

Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Daniel Gruss, and Michael Schwarz

[Paper]

Another Brick in the Wall: Uncovering SMM Vulnerabilities in HP Firmware

Itai Liba, and Assaf Carlsbad

[Blog] [Code]

Confidential Containers: Bringing Confidential Computing to the Kubernetes Workload Masses

Samuel Ortiz

[Video]

Kubernetes Meets Confidential Computing - The Different Ways of Scaling Sensitive Workloads

Moritz Eckert

[Video]

Implementing Post-quantum Cryptography for Developers

Julius Hekkala, Kimmo Halunen, and Visa Vallivaara

[Paper]

CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes

Hao Huang, Yongtao Wang, Zhaoyu Chen, Yu Ze Zhang, Yuheng Li, Zhi Tang, Wei Chu, Jingdong Chen, Weisi Lin, and Kai-Kuang Ma

[Paper] [Code]

Leashing the Inner Demons: Self-Detoxification for Language Models

Canwen Xu, Zexue He, Zhankui He, and Julian McAuley

[Paper] [Code]

Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems

Wei Jia, Zhaojun Lu, Haichun Zhang, Zhenglin Liu, Jie Wang, and Gang Qu

[Paper]

Synthetic Disinformation Attacks on Automated Fact Verification Systems

Yibing Du, Antoine Bosselut, Christopher D. Manning

[Paper]

Why No One Pwned Synology at Pwn2Own and Tianfu Cup in 2021

Eugene Lim, and Loke Hui Yi

[Slides]

DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting

Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, and Yuval Yarom

[Paper] [Code]

Attacking JavaScript Engines in 2022

Samuel Groß, and Amanda Burnett

[Slides]

Security Analysis of MTE Through Examples

Saar Amar

[Slides] [Video]

An Armful of CHERIs

Saar Amar, Nicholas Joly, David Chisnall, Manuel Costa, Sylvan Clebsch, Wes Filardo, Boris Köpf, Robert Norton-Wright, and Matthew Parkison

[Blog]

  continue reading

12 bölüm

Tüm bölümler

×
 
Loading …

Player FM'e Hoş Geldiniz!

Player FM şu anda sizin için internetteki yüksek kalitedeki podcast'leri arıyor. En iyi podcast uygulaması ve Android, iPhone ve internet üzerinde çalışıyor. Aboneliklerinizi cihazlar arasında eş zamanlamak için üye olun.

 

Hızlı referans rehberi