Lépjen offline állapotba az Player FM alkalmazással!
ThinkstScapes Research Roundup - Q1 - 2022
Manage episode 326563400 series 3290432
Hyntrospect: a fuzzer for Hyper-V devices
Diane Dubois
[Slides] [Paper] [Code] [Video]
Put an io_uring on it: Exploiting the Linux Kernel
Valentina Palmiotti
[Blog]
The AMD Branch (Mis)predictor: Where No CPU has Gone Before
Pawel Wieczorkiewicz
Dynamic Process Isolation
Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Daniel Gruss, and Michael Schwarz
[Paper]
Another Brick in the Wall: Uncovering SMM Vulnerabilities in HP Firmware
Itai Liba, and Assaf Carlsbad
Confidential Containers: Bringing Confidential Computing to the Kubernetes Workload Masses
Samuel Ortiz
[Video]
Kubernetes Meets Confidential Computing - The Different Ways of Scaling Sensitive Workloads
Moritz Eckert
[Video]
Implementing Post-quantum Cryptography for Developers
Julius Hekkala, Kimmo Halunen, and Visa Vallivaara
[Paper]
CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes
Hao Huang, Yongtao Wang, Zhaoyu Chen, Yu Ze Zhang, Yuheng Li, Zhi Tang, Wei Chu, Jingdong Chen, Weisi Lin, and Kai-Kuang Ma
Leashing the Inner Demons: Self-Detoxification for Language Models
Canwen Xu, Zexue He, Zhankui He, and Julian McAuley
Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems
Wei Jia, Zhaojun Lu, Haichun Zhang, Zhenglin Liu, Jie Wang, and Gang Qu
[Paper]
Synthetic Disinformation Attacks on Automated Fact Verification Systems
Yibing Du, Antoine Bosselut, Christopher D. Manning
[Paper]
Why No One Pwned Synology at Pwn2Own and Tianfu Cup in 2021
Eugene Lim, and Loke Hui Yi
[Slides]
DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting
Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, and Yuval Yarom
Attacking JavaScript Engines in 2022
Samuel Groß, and Amanda Burnett
[Slides]
Security Analysis of MTE Through Examples
Saar Amar
An Armful of CHERIs
Saar Amar, Nicholas Joly, David Chisnall, Manuel Costa, Sylvan Clebsch, Wes Filardo, Boris Köpf, Robert Norton-Wright, and Matthew Parkison
[Blog]
12 epizódok
Manage episode 326563400 series 3290432
Hyntrospect: a fuzzer for Hyper-V devices
Diane Dubois
[Slides] [Paper] [Code] [Video]
Put an io_uring on it: Exploiting the Linux Kernel
Valentina Palmiotti
[Blog]
The AMD Branch (Mis)predictor: Where No CPU has Gone Before
Pawel Wieczorkiewicz
Dynamic Process Isolation
Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Daniel Gruss, and Michael Schwarz
[Paper]
Another Brick in the Wall: Uncovering SMM Vulnerabilities in HP Firmware
Itai Liba, and Assaf Carlsbad
Confidential Containers: Bringing Confidential Computing to the Kubernetes Workload Masses
Samuel Ortiz
[Video]
Kubernetes Meets Confidential Computing - The Different Ways of Scaling Sensitive Workloads
Moritz Eckert
[Video]
Implementing Post-quantum Cryptography for Developers
Julius Hekkala, Kimmo Halunen, and Visa Vallivaara
[Paper]
CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes
Hao Huang, Yongtao Wang, Zhaoyu Chen, Yu Ze Zhang, Yuheng Li, Zhi Tang, Wei Chu, Jingdong Chen, Weisi Lin, and Kai-Kuang Ma
Leashing the Inner Demons: Self-Detoxification for Language Models
Canwen Xu, Zexue He, Zhankui He, and Julian McAuley
Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems
Wei Jia, Zhaojun Lu, Haichun Zhang, Zhenglin Liu, Jie Wang, and Gang Qu
[Paper]
Synthetic Disinformation Attacks on Automated Fact Verification Systems
Yibing Du, Antoine Bosselut, Christopher D. Manning
[Paper]
Why No One Pwned Synology at Pwn2Own and Tianfu Cup in 2021
Eugene Lim, and Loke Hui Yi
[Slides]
DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting
Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, and Yuval Yarom
Attacking JavaScript Engines in 2022
Samuel Groß, and Amanda Burnett
[Slides]
Security Analysis of MTE Through Examples
Saar Amar
An Armful of CHERIs
Saar Amar, Nicholas Joly, David Chisnall, Manuel Costa, Sylvan Clebsch, Wes Filardo, Boris Köpf, Robert Norton-Wright, and Matthew Parkison
[Blog]
12 epizódok
Minden epizód
×Üdvözlünk a Player FM-nél!
A Player FM lejátszó az internetet böngészi a kiváló minőségű podcastok után, hogy ön élvezhesse azokat. Ez a legjobb podcast-alkalmazás, Androidon, iPhone-on és a weben is működik. Jelentkezzen be az feliratkozások szinkronizálásához az eszközök között.