Player FM 앱으로 오프라인으로 전환하세요!
ThinkstScapes Research Roundup - Q1 - 2022
Manage episode 326563400 series 3290432
Hyntrospect: a fuzzer for Hyper-V devices
Diane Dubois
[Slides] [Paper] [Code] [Video]
Put an io_uring on it: Exploiting the Linux Kernel
Valentina Palmiotti
[Blog]
The AMD Branch (Mis)predictor: Where No CPU has Gone Before
Pawel Wieczorkiewicz
Dynamic Process Isolation
Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Daniel Gruss, and Michael Schwarz
[Paper]
Another Brick in the Wall: Uncovering SMM Vulnerabilities in HP Firmware
Itai Liba, and Assaf Carlsbad
Confidential Containers: Bringing Confidential Computing to the Kubernetes Workload Masses
Samuel Ortiz
[Video]
Kubernetes Meets Confidential Computing - The Different Ways of Scaling Sensitive Workloads
Moritz Eckert
[Video]
Implementing Post-quantum Cryptography for Developers
Julius Hekkala, Kimmo Halunen, and Visa Vallivaara
[Paper]
CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes
Hao Huang, Yongtao Wang, Zhaoyu Chen, Yu Ze Zhang, Yuheng Li, Zhi Tang, Wei Chu, Jingdong Chen, Weisi Lin, and Kai-Kuang Ma
Leashing the Inner Demons: Self-Detoxification for Language Models
Canwen Xu, Zexue He, Zhankui He, and Julian McAuley
Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems
Wei Jia, Zhaojun Lu, Haichun Zhang, Zhenglin Liu, Jie Wang, and Gang Qu
[Paper]
Synthetic Disinformation Attacks on Automated Fact Verification Systems
Yibing Du, Antoine Bosselut, Christopher D. Manning
[Paper]
Why No One Pwned Synology at Pwn2Own and Tianfu Cup in 2021
Eugene Lim, and Loke Hui Yi
[Slides]
DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting
Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, and Yuval Yarom
Attacking JavaScript Engines in 2022
Samuel Groß, and Amanda Burnett
[Slides]
Security Analysis of MTE Through Examples
Saar Amar
An Armful of CHERIs
Saar Amar, Nicholas Joly, David Chisnall, Manuel Costa, Sylvan Clebsch, Wes Filardo, Boris Köpf, Robert Norton-Wright, and Matthew Parkison
[Blog]
12 에피소드
Manage episode 326563400 series 3290432
Hyntrospect: a fuzzer for Hyper-V devices
Diane Dubois
[Slides] [Paper] [Code] [Video]
Put an io_uring on it: Exploiting the Linux Kernel
Valentina Palmiotti
[Blog]
The AMD Branch (Mis)predictor: Where No CPU has Gone Before
Pawel Wieczorkiewicz
Dynamic Process Isolation
Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Daniel Gruss, and Michael Schwarz
[Paper]
Another Brick in the Wall: Uncovering SMM Vulnerabilities in HP Firmware
Itai Liba, and Assaf Carlsbad
Confidential Containers: Bringing Confidential Computing to the Kubernetes Workload Masses
Samuel Ortiz
[Video]
Kubernetes Meets Confidential Computing - The Different Ways of Scaling Sensitive Workloads
Moritz Eckert
[Video]
Implementing Post-quantum Cryptography for Developers
Julius Hekkala, Kimmo Halunen, and Visa Vallivaara
[Paper]
CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes
Hao Huang, Yongtao Wang, Zhaoyu Chen, Yu Ze Zhang, Yuheng Li, Zhi Tang, Wei Chu, Jingdong Chen, Weisi Lin, and Kai-Kuang Ma
Leashing the Inner Demons: Self-Detoxification for Language Models
Canwen Xu, Zexue He, Zhankui He, and Julian McAuley
Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems
Wei Jia, Zhaojun Lu, Haichun Zhang, Zhenglin Liu, Jie Wang, and Gang Qu
[Paper]
Synthetic Disinformation Attacks on Automated Fact Verification Systems
Yibing Du, Antoine Bosselut, Christopher D. Manning
[Paper]
Why No One Pwned Synology at Pwn2Own and Tianfu Cup in 2021
Eugene Lim, and Loke Hui Yi
[Slides]
DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting
Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, and Yuval Yarom
Attacking JavaScript Engines in 2022
Samuel Groß, and Amanda Burnett
[Slides]
Security Analysis of MTE Through Examples
Saar Amar
An Armful of CHERIs
Saar Amar, Nicholas Joly, David Chisnall, Manuel Costa, Sylvan Clebsch, Wes Filardo, Boris Köpf, Robert Norton-Wright, and Matthew Parkison
[Blog]
12 에피소드
Minden epizód
×플레이어 FM에 오신것을 환영합니다!
플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.