
Sign up to save your podcasts
Or
Diane Dubois
[Slides] [Paper] [Code] [Video]
Put an io_uring on it: Exploiting the Linux KernelValentina Palmiotti
[Blog]
The AMD Branch (Mis)predictor: Where No CPU has Gone BeforePawel Wieczorkiewicz
[Blog part 1] [Blog part 2]
Dynamic Process IsolationMartin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Daniel Gruss, and Michael Schwarz
[Paper]
Another Brick in the Wall: Uncovering SMM Vulnerabilities in HP FirmwareItai Liba, and Assaf Carlsbad
[Blog] [Code]
Confidential Containers: Bringing Confidential Computing to the Kubernetes Workload MassesSamuel Ortiz
[Video]
Kubernetes Meets Confidential Computing - The Different Ways of Scaling Sensitive WorkloadsMoritz Eckert
[Video]
Implementing Post-quantum Cryptography for DevelopersJulius Hekkala, Kimmo Halunen, and Visa Vallivaara
[Paper]
CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating DeepfakesHao Huang, Yongtao Wang, Zhaoyu Chen, Yu Ze Zhang, Yuheng Li, Zhi Tang, Wei Chu, Jingdong Chen, Weisi Lin, and Kai-Kuang Ma
[Paper] [Code]
Leashing the Inner Demons: Self-Detoxification for Language ModelsCanwen Xu, Zexue He, Zhankui He, and Julian McAuley
[Paper] [Code]
Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition SystemsWei Jia, Zhaojun Lu, Haichun Zhang, Zhenglin Liu, Jie Wang, and Gang Qu
[Paper]
Synthetic Disinformation Attacks on Automated Fact Verification SystemsYibing Du, Antoine Bosselut, Christopher D. Manning
[Paper]
Why No One Pwned Synology at Pwn2Own and Tianfu Cup in 2021Eugene Lim, and Loke Hui Yi
[Slides]
DRAWN APART: A Device Identification Technique based on Remote GPU FingerprintingTomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, and Yuval Yarom
[Paper] [Code]
Attacking JavaScript Engines in 2022Samuel Groß, and Amanda Burnett
[Slides]
Security Analysis of MTE Through ExamplesSaar Amar
[Slides] [Video]
An Armful of CHERIsSaar Amar, Nicholas Joly, David Chisnall, Manuel Costa, Sylvan Clebsch, Wes Filardo, Boris Köpf, Robert Norton-Wright, and Matthew Parkison
[Blog]
5
11 ratings
Diane Dubois
[Slides] [Paper] [Code] [Video]
Put an io_uring on it: Exploiting the Linux KernelValentina Palmiotti
[Blog]
The AMD Branch (Mis)predictor: Where No CPU has Gone BeforePawel Wieczorkiewicz
[Blog part 1] [Blog part 2]
Dynamic Process IsolationMartin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Daniel Gruss, and Michael Schwarz
[Paper]
Another Brick in the Wall: Uncovering SMM Vulnerabilities in HP FirmwareItai Liba, and Assaf Carlsbad
[Blog] [Code]
Confidential Containers: Bringing Confidential Computing to the Kubernetes Workload MassesSamuel Ortiz
[Video]
Kubernetes Meets Confidential Computing - The Different Ways of Scaling Sensitive WorkloadsMoritz Eckert
[Video]
Implementing Post-quantum Cryptography for DevelopersJulius Hekkala, Kimmo Halunen, and Visa Vallivaara
[Paper]
CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating DeepfakesHao Huang, Yongtao Wang, Zhaoyu Chen, Yu Ze Zhang, Yuheng Li, Zhi Tang, Wei Chu, Jingdong Chen, Weisi Lin, and Kai-Kuang Ma
[Paper] [Code]
Leashing the Inner Demons: Self-Detoxification for Language ModelsCanwen Xu, Zexue He, Zhankui He, and Julian McAuley
[Paper] [Code]
Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition SystemsWei Jia, Zhaojun Lu, Haichun Zhang, Zhenglin Liu, Jie Wang, and Gang Qu
[Paper]
Synthetic Disinformation Attacks on Automated Fact Verification SystemsYibing Du, Antoine Bosselut, Christopher D. Manning
[Paper]
Why No One Pwned Synology at Pwn2Own and Tianfu Cup in 2021Eugene Lim, and Loke Hui Yi
[Slides]
DRAWN APART: A Device Identification Technique based on Remote GPU FingerprintingTomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, and Yuval Yarom
[Paper] [Code]
Attacking JavaScript Engines in 2022Samuel Groß, and Amanda Burnett
[Slides]
Security Analysis of MTE Through ExamplesSaar Amar
[Slides] [Video]
An Armful of CHERIsSaar Amar, Nicholas Joly, David Chisnall, Manuel Costa, Sylvan Clebsch, Wes Filardo, Boris Köpf, Robert Norton-Wright, and Matthew Parkison
[Blog]
361 Listeners
626 Listeners
590 Listeners
269 Listeners
7,879 Listeners
15,277 Listeners
43 Listeners