
Sign up to save your podcasts
Or
Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, and Ross Anderson
[Slides] [Paper] [Video]
How to Use Cheated Cryptography to Overload a ServerSzilárd Pfeiffer
[Slides]
Bestie: Very Practical Searchable Encryption with Forward and Backward SecurityTuanyang Chen, Peng Xu, Wei Wang, Yubo Zheng, Willy Susilo, and Hai Jin
[Paper]
Symgrate: A Symbol Recovery Service for ARM FirmwareTravis Goodspeed & EVM
[Site]
From Graph Queries to Vulnerabilities in Binary Codeclaudiu, fabs, and niko
[Slides]
Fast verified post-quantum softwareDaniel J. Bernstein
[Slides]
AIModel-Mutator: Finding Vulnerabilities in TensorFlowQian Feng, Zhaofeng Chen, Zhenyu Zhong, Yakun Zhang, Ying Wang, Zheng Huang, Kang Li, Jie Hu and Heng Yin
[Slides]
DAMAS: Control-Data Isolation at Runtime through Dynamic Binary ModificationCamille Le Bon, Erven Rohou, Frederic Tronel, and Guillaume Hiet
[Paper]
Trojan Source: Invisible VulnerabilitiesNicholas Boucher and Ross Anderson
[Paper] [Code]
Who owns your hybrid Active Directory? Hunting for adversary techniques!Thirumalai Natarajan Muthiah & Anurag Khanna
[Paper]
Breaking Azure AD joined endpoints in zero-trust environmentsDirk-jan Mollema
[Slides] [Video]
Going Deeper into Schneider Modicon PAC SecurityGao Jian
[Slides] [Video]
New Ways of IPv6 ScanningShupeng Gao, Xingru Wu, and Jie Gao
[Slides]
DIY cheap gigabit data diodeMagnus
[Code]
Bridge your service mesh and AWSSantosh Ananthakrishnan & Harihara K Narayanan
[Slides]
GALILEO: In GPS We Trust?Áron Szabó, Levente Kovács, and Péter Ligeti
[Slides]
“We wait, because we know you.” Inside the ransomware negotiation economics.Pepijn Hack & Harihara K Narayanan
[Paper]
Privacy of DNS-over-HTTPS: Requiem for a dream?Levente Csikor, Himanshu Singh, Min Suk Kang, and Dinil Mon Divakaran
[Slides]
Sleight of ARM: Demystifying Intel HoudiniBrian Hong
[Slides] [Video]
5
11 ratings
Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, and Ross Anderson
[Slides] [Paper] [Video]
How to Use Cheated Cryptography to Overload a ServerSzilárd Pfeiffer
[Slides]
Bestie: Very Practical Searchable Encryption with Forward and Backward SecurityTuanyang Chen, Peng Xu, Wei Wang, Yubo Zheng, Willy Susilo, and Hai Jin
[Paper]
Symgrate: A Symbol Recovery Service for ARM FirmwareTravis Goodspeed & EVM
[Site]
From Graph Queries to Vulnerabilities in Binary Codeclaudiu, fabs, and niko
[Slides]
Fast verified post-quantum softwareDaniel J. Bernstein
[Slides]
AIModel-Mutator: Finding Vulnerabilities in TensorFlowQian Feng, Zhaofeng Chen, Zhenyu Zhong, Yakun Zhang, Ying Wang, Zheng Huang, Kang Li, Jie Hu and Heng Yin
[Slides]
DAMAS: Control-Data Isolation at Runtime through Dynamic Binary ModificationCamille Le Bon, Erven Rohou, Frederic Tronel, and Guillaume Hiet
[Paper]
Trojan Source: Invisible VulnerabilitiesNicholas Boucher and Ross Anderson
[Paper] [Code]
Who owns your hybrid Active Directory? Hunting for adversary techniques!Thirumalai Natarajan Muthiah & Anurag Khanna
[Paper]
Breaking Azure AD joined endpoints in zero-trust environmentsDirk-jan Mollema
[Slides] [Video]
Going Deeper into Schneider Modicon PAC SecurityGao Jian
[Slides] [Video]
New Ways of IPv6 ScanningShupeng Gao, Xingru Wu, and Jie Gao
[Slides]
DIY cheap gigabit data diodeMagnus
[Code]
Bridge your service mesh and AWSSantosh Ananthakrishnan & Harihara K Narayanan
[Slides]
GALILEO: In GPS We Trust?Áron Szabó, Levente Kovács, and Péter Ligeti
[Slides]
“We wait, because we know you.” Inside the ransomware negotiation economics.Pepijn Hack & Harihara K Narayanan
[Paper]
Privacy of DNS-over-HTTPS: Requiem for a dream?Levente Csikor, Himanshu Singh, Min Suk Kang, and Dinil Mon Divakaran
[Slides]
Sleight of ARM: Demystifying Intel HoudiniBrian Hong
[Slides] [Video]
361 Listeners
626 Listeners
590 Listeners
269 Listeners
7,879 Listeners
15,277 Listeners
43 Listeners