Artwork

Konten disediakan oleh Jacob Torrey, Haroon meer, and Marco slaviero. Semua konten podcast termasuk episode, grafik, dan deskripsi podcast diunggah dan disediakan langsung oleh Jacob Torrey, Haroon meer, and Marco slaviero atau mitra platform podcast mereka. Jika Anda yakin seseorang menggunakan karya berhak cipta Anda tanpa izin, Anda dapat mengikuti proses yang diuraikan di sini https://id.player.fm/legal.
Player FM - Aplikasi Podcast
Offline dengan aplikasi Player FM !

ThinkstScapes Research Roundup - Q1 - 2022

34:35
 
Bagikan
 

Manage episode 326563400 series 3290432
Konten disediakan oleh Jacob Torrey, Haroon meer, and Marco slaviero. Semua konten podcast termasuk episode, grafik, dan deskripsi podcast diunggah dan disediakan langsung oleh Jacob Torrey, Haroon meer, and Marco slaviero atau mitra platform podcast mereka. Jika Anda yakin seseorang menggunakan karya berhak cipta Anda tanpa izin, Anda dapat mengikuti proses yang diuraikan di sini https://id.player.fm/legal.

Hyntrospect: a fuzzer for Hyper-V devices

Diane Dubois

[Slides] [Paper] [Code] [Video]

Put an io_uring on it: Exploiting the Linux Kernel

Valentina Palmiotti

[Blog]

The AMD Branch (Mis)predictor: Where No CPU has Gone Before

Pawel Wieczorkiewicz

[Blog part 1] [Blog part 2]

Dynamic Process Isolation

Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Daniel Gruss, and Michael Schwarz

[Paper]

Another Brick in the Wall: Uncovering SMM Vulnerabilities in HP Firmware

Itai Liba, and Assaf Carlsbad

[Blog] [Code]

Confidential Containers: Bringing Confidential Computing to the Kubernetes Workload Masses

Samuel Ortiz

[Video]

Kubernetes Meets Confidential Computing - The Different Ways of Scaling Sensitive Workloads

Moritz Eckert

[Video]

Implementing Post-quantum Cryptography for Developers

Julius Hekkala, Kimmo Halunen, and Visa Vallivaara

[Paper]

CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes

Hao Huang, Yongtao Wang, Zhaoyu Chen, Yu Ze Zhang, Yuheng Li, Zhi Tang, Wei Chu, Jingdong Chen, Weisi Lin, and Kai-Kuang Ma

[Paper] [Code]

Leashing the Inner Demons: Self-Detoxification for Language Models

Canwen Xu, Zexue He, Zhankui He, and Julian McAuley

[Paper] [Code]

Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems

Wei Jia, Zhaojun Lu, Haichun Zhang, Zhenglin Liu, Jie Wang, and Gang Qu

[Paper]

Synthetic Disinformation Attacks on Automated Fact Verification Systems

Yibing Du, Antoine Bosselut, Christopher D. Manning

[Paper]

Why No One Pwned Synology at Pwn2Own and Tianfu Cup in 2021

Eugene Lim, and Loke Hui Yi

[Slides]

DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting

Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, and Yuval Yarom

[Paper] [Code]

Attacking JavaScript Engines in 2022

Samuel Groß, and Amanda Burnett

[Slides]

Security Analysis of MTE Through Examples

Saar Amar

[Slides] [Video]

An Armful of CHERIs

Saar Amar, Nicholas Joly, David Chisnall, Manuel Costa, Sylvan Clebsch, Wes Filardo, Boris Köpf, Robert Norton-Wright, and Matthew Parkison

[Blog]

  continue reading

12 episode

Artwork
iconBagikan
 
Manage episode 326563400 series 3290432
Konten disediakan oleh Jacob Torrey, Haroon meer, and Marco slaviero. Semua konten podcast termasuk episode, grafik, dan deskripsi podcast diunggah dan disediakan langsung oleh Jacob Torrey, Haroon meer, and Marco slaviero atau mitra platform podcast mereka. Jika Anda yakin seseorang menggunakan karya berhak cipta Anda tanpa izin, Anda dapat mengikuti proses yang diuraikan di sini https://id.player.fm/legal.

Hyntrospect: a fuzzer for Hyper-V devices

Diane Dubois

[Slides] [Paper] [Code] [Video]

Put an io_uring on it: Exploiting the Linux Kernel

Valentina Palmiotti

[Blog]

The AMD Branch (Mis)predictor: Where No CPU has Gone Before

Pawel Wieczorkiewicz

[Blog part 1] [Blog part 2]

Dynamic Process Isolation

Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Daniel Gruss, and Michael Schwarz

[Paper]

Another Brick in the Wall: Uncovering SMM Vulnerabilities in HP Firmware

Itai Liba, and Assaf Carlsbad

[Blog] [Code]

Confidential Containers: Bringing Confidential Computing to the Kubernetes Workload Masses

Samuel Ortiz

[Video]

Kubernetes Meets Confidential Computing - The Different Ways of Scaling Sensitive Workloads

Moritz Eckert

[Video]

Implementing Post-quantum Cryptography for Developers

Julius Hekkala, Kimmo Halunen, and Visa Vallivaara

[Paper]

CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes

Hao Huang, Yongtao Wang, Zhaoyu Chen, Yu Ze Zhang, Yuheng Li, Zhi Tang, Wei Chu, Jingdong Chen, Weisi Lin, and Kai-Kuang Ma

[Paper] [Code]

Leashing the Inner Demons: Self-Detoxification for Language Models

Canwen Xu, Zexue He, Zhankui He, and Julian McAuley

[Paper] [Code]

Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems

Wei Jia, Zhaojun Lu, Haichun Zhang, Zhenglin Liu, Jie Wang, and Gang Qu

[Paper]

Synthetic Disinformation Attacks on Automated Fact Verification Systems

Yibing Du, Antoine Bosselut, Christopher D. Manning

[Paper]

Why No One Pwned Synology at Pwn2Own and Tianfu Cup in 2021

Eugene Lim, and Loke Hui Yi

[Slides]

DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting

Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, and Yuval Yarom

[Paper] [Code]

Attacking JavaScript Engines in 2022

Samuel Groß, and Amanda Burnett

[Slides]

Security Analysis of MTE Through Examples

Saar Amar

[Slides] [Video]

An Armful of CHERIs

Saar Amar, Nicholas Joly, David Chisnall, Manuel Costa, Sylvan Clebsch, Wes Filardo, Boris Köpf, Robert Norton-Wright, and Matthew Parkison

[Blog]

  continue reading

12 episode

Tüm bölümler

×
 
Loading …

Selamat datang di Player FM!

Player FM memindai web untuk mencari podcast berkualitas tinggi untuk Anda nikmati saat ini. Ini adalah aplikasi podcast terbaik dan bekerja untuk Android, iPhone, dan web. Daftar untuk menyinkronkan langganan di seluruh perangkat.

 

Panduan Referensi Cepat