Artwork

Content provided by Jacob Torrey, Haroon meer, and Marco slaviero. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Torrey, Haroon meer, and Marco slaviero or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

ThinkstScapes Research Roundup - Q1 - 2022

34:35
 
Share
 

Manage episode 326563400 series 3290432
Content provided by Jacob Torrey, Haroon meer, and Marco slaviero. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Torrey, Haroon meer, and Marco slaviero or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Hyntrospect: a fuzzer for Hyper-V devices

Diane Dubois

[Slides] [Paper] [Code] [Video]

Put an io_uring on it: Exploiting the Linux Kernel

Valentina Palmiotti

[Blog]

The AMD Branch (Mis)predictor: Where No CPU has Gone Before

Pawel Wieczorkiewicz

[Blog part 1] [Blog part 2]

Dynamic Process Isolation

Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Daniel Gruss, and Michael Schwarz

[Paper]

Another Brick in the Wall: Uncovering SMM Vulnerabilities in HP Firmware

Itai Liba, and Assaf Carlsbad

[Blog] [Code]

Confidential Containers: Bringing Confidential Computing to the Kubernetes Workload Masses

Samuel Ortiz

[Video]

Kubernetes Meets Confidential Computing - The Different Ways of Scaling Sensitive Workloads

Moritz Eckert

[Video]

Implementing Post-quantum Cryptography for Developers

Julius Hekkala, Kimmo Halunen, and Visa Vallivaara

[Paper]

CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes

Hao Huang, Yongtao Wang, Zhaoyu Chen, Yu Ze Zhang, Yuheng Li, Zhi Tang, Wei Chu, Jingdong Chen, Weisi Lin, and Kai-Kuang Ma

[Paper] [Code]

Leashing the Inner Demons: Self-Detoxification for Language Models

Canwen Xu, Zexue He, Zhankui He, and Julian McAuley

[Paper] [Code]

Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems

Wei Jia, Zhaojun Lu, Haichun Zhang, Zhenglin Liu, Jie Wang, and Gang Qu

[Paper]

Synthetic Disinformation Attacks on Automated Fact Verification Systems

Yibing Du, Antoine Bosselut, Christopher D. Manning

[Paper]

Why No One Pwned Synology at Pwn2Own and Tianfu Cup in 2021

Eugene Lim, and Loke Hui Yi

[Slides]

DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting

Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, and Yuval Yarom

[Paper] [Code]

Attacking JavaScript Engines in 2022

Samuel Groß, and Amanda Burnett

[Slides]

Security Analysis of MTE Through Examples

Saar Amar

[Slides] [Video]

An Armful of CHERIs

Saar Amar, Nicholas Joly, David Chisnall, Manuel Costa, Sylvan Clebsch, Wes Filardo, Boris Köpf, Robert Norton-Wright, and Matthew Parkison

[Blog]

  continue reading

12 episodes

Artwork
iconShare
 
Manage episode 326563400 series 3290432
Content provided by Jacob Torrey, Haroon meer, and Marco slaviero. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Torrey, Haroon meer, and Marco slaviero or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Hyntrospect: a fuzzer for Hyper-V devices

Diane Dubois

[Slides] [Paper] [Code] [Video]

Put an io_uring on it: Exploiting the Linux Kernel

Valentina Palmiotti

[Blog]

The AMD Branch (Mis)predictor: Where No CPU has Gone Before

Pawel Wieczorkiewicz

[Blog part 1] [Blog part 2]

Dynamic Process Isolation

Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Daniel Gruss, and Michael Schwarz

[Paper]

Another Brick in the Wall: Uncovering SMM Vulnerabilities in HP Firmware

Itai Liba, and Assaf Carlsbad

[Blog] [Code]

Confidential Containers: Bringing Confidential Computing to the Kubernetes Workload Masses

Samuel Ortiz

[Video]

Kubernetes Meets Confidential Computing - The Different Ways of Scaling Sensitive Workloads

Moritz Eckert

[Video]

Implementing Post-quantum Cryptography for Developers

Julius Hekkala, Kimmo Halunen, and Visa Vallivaara

[Paper]

CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes

Hao Huang, Yongtao Wang, Zhaoyu Chen, Yu Ze Zhang, Yuheng Li, Zhi Tang, Wei Chu, Jingdong Chen, Weisi Lin, and Kai-Kuang Ma

[Paper] [Code]

Leashing the Inner Demons: Self-Detoxification for Language Models

Canwen Xu, Zexue He, Zhankui He, and Julian McAuley

[Paper] [Code]

Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems

Wei Jia, Zhaojun Lu, Haichun Zhang, Zhenglin Liu, Jie Wang, and Gang Qu

[Paper]

Synthetic Disinformation Attacks on Automated Fact Verification Systems

Yibing Du, Antoine Bosselut, Christopher D. Manning

[Paper]

Why No One Pwned Synology at Pwn2Own and Tianfu Cup in 2021

Eugene Lim, and Loke Hui Yi

[Slides]

DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting

Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, and Yuval Yarom

[Paper] [Code]

Attacking JavaScript Engines in 2022

Samuel Groß, and Amanda Burnett

[Slides]

Security Analysis of MTE Through Examples

Saar Amar

[Slides] [Video]

An Armful of CHERIs

Saar Amar, Nicholas Joly, David Chisnall, Manuel Costa, Sylvan Clebsch, Wes Filardo, Boris Köpf, Robert Norton-Wright, and Matthew Parkison

[Blog]

  continue reading

12 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide