Artwork

Content provided by Jacob Torrey, Haroon meer, and Marco slaviero. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Torrey, Haroon meer, and Marco slaviero or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

ThinkstScapes Research Roundup - Q4 - 2021

25:28
 
Share
 

Manage episode 314859821 series 3290432
Content provided by Jacob Torrey, Haroon meer, and Marco slaviero. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Torrey, Haroon meer, and Marco slaviero or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Sponge Examples: Energy-Latency Attacks on Neural Networks

Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, and Ross Anderson

[Slides] [Paper] [Video]

How to Use Cheated Cryptography to Overload a Server

Szilárd Pfeiffer

[Slides]

Bestie: Very Practical Searchable Encryption with Forward and Backward Security

Tuanyang Chen, Peng Xu, Wei Wang, Yubo Zheng, Willy Susilo, and Hai Jin

[Paper]

Symgrate: A Symbol Recovery Service for ARM Firmware

Travis Goodspeed & EVM

[Site]

From Graph Queries to Vulnerabilities in Binary Code

claudiu, fabs, and niko

[Slides]

Fast verified post-quantum software

Daniel J. Bernstein

[Slides]

AIModel-Mutator: Finding Vulnerabilities in TensorFlow

Qian Feng, Zhaofeng Chen, Zhenyu Zhong, Yakun Zhang, Ying Wang, Zheng Huang, Kang Li, Jie Hu and Heng Yin

[Slides]

DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification

Camille Le Bon, Erven Rohou, Frederic Tronel, and Guillaume Hiet

[Paper]

Trojan Source: Invisible Vulnerabilities

Nicholas Boucher and Ross Anderson

[Paper] [Code]

Who owns your hybrid Active Directory? Hunting for adversary techniques!

Thirumalai Natarajan Muthiah & Anurag Khanna

[Paper]

Breaking Azure AD joined endpoints in zero-trust environments

Dirk-jan Mollema

[Slides] [Video]

Going Deeper into Schneider Modicon PAC Security

Gao Jian

[Slides] [Video]

New Ways of IPv6 Scanning

Shupeng Gao, Xingru Wu, and Jie Gao

[Slides]

DIY cheap gigabit data diode

Magnus

[Code]

Bridge your service mesh and AWS

Santosh Ananthakrishnan & Harihara K Narayanan

[Slides]

GALILEO: In GPS We Trust?

Áron Szabó, Levente Kovács, and Péter Ligeti

[Slides]

“We wait, because we know you.” Inside the ransomware negotiation economics.

Pepijn Hack & Harihara K Narayanan

[Paper]

Privacy of DNS-over-HTTPS: Requiem for a dream?

Levente Csikor, Himanshu Singh, Min Suk Kang, and Dinil Mon Divakaran

[Slides]

Sleight of ARM: Demystifying Intel Houdini

Brian Hong

[Slides] [Video]

  continue reading

11 episodes

Artwork
iconShare
 
Manage episode 314859821 series 3290432
Content provided by Jacob Torrey, Haroon meer, and Marco slaviero. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Torrey, Haroon meer, and Marco slaviero or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Sponge Examples: Energy-Latency Attacks on Neural Networks

Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, and Ross Anderson

[Slides] [Paper] [Video]

How to Use Cheated Cryptography to Overload a Server

Szilárd Pfeiffer

[Slides]

Bestie: Very Practical Searchable Encryption with Forward and Backward Security

Tuanyang Chen, Peng Xu, Wei Wang, Yubo Zheng, Willy Susilo, and Hai Jin

[Paper]

Symgrate: A Symbol Recovery Service for ARM Firmware

Travis Goodspeed & EVM

[Site]

From Graph Queries to Vulnerabilities in Binary Code

claudiu, fabs, and niko

[Slides]

Fast verified post-quantum software

Daniel J. Bernstein

[Slides]

AIModel-Mutator: Finding Vulnerabilities in TensorFlow

Qian Feng, Zhaofeng Chen, Zhenyu Zhong, Yakun Zhang, Ying Wang, Zheng Huang, Kang Li, Jie Hu and Heng Yin

[Slides]

DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification

Camille Le Bon, Erven Rohou, Frederic Tronel, and Guillaume Hiet

[Paper]

Trojan Source: Invisible Vulnerabilities

Nicholas Boucher and Ross Anderson

[Paper] [Code]

Who owns your hybrid Active Directory? Hunting for adversary techniques!

Thirumalai Natarajan Muthiah & Anurag Khanna

[Paper]

Breaking Azure AD joined endpoints in zero-trust environments

Dirk-jan Mollema

[Slides] [Video]

Going Deeper into Schneider Modicon PAC Security

Gao Jian

[Slides] [Video]

New Ways of IPv6 Scanning

Shupeng Gao, Xingru Wu, and Jie Gao

[Slides]

DIY cheap gigabit data diode

Magnus

[Code]

Bridge your service mesh and AWS

Santosh Ananthakrishnan & Harihara K Narayanan

[Slides]

GALILEO: In GPS We Trust?

Áron Szabó, Levente Kovács, and Péter Ligeti

[Slides]

“We wait, because we know you.” Inside the ransomware negotiation economics.

Pepijn Hack & Harihara K Narayanan

[Paper]

Privacy of DNS-over-HTTPS: Requiem for a dream?

Levente Csikor, Himanshu Singh, Min Suk Kang, and Dinil Mon Divakaran

[Slides]

Sleight of ARM: Demystifying Intel Houdini

Brian Hong

[Slides] [Video]

  continue reading

11 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide