Show filters Hide filters

Refine your search

Publication Year
Organisation found in the video
1-36 out of 37 results
Change view
  • Sort by:
32:13 Berkeley System Distribution (BSD), Andrea Ross English 2015

Adding AES-ICM and AES-GCM to OpenCrypto

Adding additional cipher modes may seem simple, but there are many things to consider. Implementing the modes and ensuring security requires more than a simply coding it up. It requires understanding of different standards and computer architecture to make sure things like side channel/timing attacks are addressed or properly understood. Some design decisions can be made to help ensure that consumers of the interface are able to properly use it.
  • Published: 2015
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
47:15 Hacktivity English 2015

The Network Behavior of Targeted Attacks

The network patterns of Targeted Attacks are very different from usual malware because of the different goals of the attackers. Therefore, it is difficult to detect targeted attacks looking for DNS anomalies, DGA traffic or HTTP patterns. However, our analysis of targeted attacks reveals novel patterns in their network communication. These patterns were incorporated into our Stratosphere IPS in order to model, identify and detect the traffic of targeted attacks. With this knowledge it is possible to alert attacks in the network within a short time, independently of the malware used. The Stratosphere project analyzes the inherent patterns of malware actions in the network using Machine Learning. It uses Markov Chain's algorithms to find patterns that are independent of static features. These patterns are used to build behavioral models of malware actions that are later used to detect similar traffic in the network. The tool and datasets are freely published.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
54:19 OpenWebcast.nl, Foundation for Fundamental Research on Matter (FOM) English 2013

Opening lecture with Sibylle Günter

Professor Sibylle Günter has been the Scientific Director of the German 'Max Planck Institute for Plasma Physics' (IPP) since February 2011. She took her degree in physics at the University of Rostock in 1987 and three years later completed her PhD at the Department of Theoretical Physics there. Subsequently she worked at the University of Rostock, the University of Maryland and at the National Institute of Standards and Technology (NIST). She qualified for a lectureship at the University of Rostock in 1996 with a thesis entitled 'Optical Properties of Dense Plasmas' and she still gives lectures there. Since 2006 she has also held a part-time professorship at the Technical University Munich.
  • Published: 2013
  • Publisher: OpenWebcast.nl, Foundation for Fundamental Research on Matter (FOM)
  • Language: English
2:17:42 Foundation for Fundamental Research on Matter (FOM) English 2015

Master class with Sharon Glotzer

Quasiperiodic crystals with long range rotational symmetry but no translational repeat unit have been known in metallic alloys since they were first reported in 1984. Yet only in the past ten years have such complex structures been reported in soft materials, comprised of, e.g., polymers, macromolecules, nanoparticles and colloids. In nearly all of these soft matter systems, quasiperiodicity is entropically stabilized, and any interactions are essentially short range. Interestingly, despite the fact that most metallic quasicrystals exhibit icosahedral symmetry, no icosahedral quasicrystals have been reported for soft matter systems. Instead, primarily 12-fold rotational symmetries are found, with recent, occasional reports of 8-fold, 10-fold, 18-fold, and even 24-fold planar quasicrystals. In this talk, we discuss common features and unifying principles for the self-assembly of soft matter quasicrystals, and we present results for the first icosahedral quasicrystal to be thermodynamically self-assembled in a computer simulation. This icosahedral quasicrystal is robust over a range of parameters, and is obtained from a single particle type interacting via a short-ranged, oscillatory pair potential that may be achievable in systems of colloidal spheres. The icosahedral quasicrystal we report is surrounded in parameter space by clathrates, important for deep sea methane storage, and other new crystal structures never before reported in a one-component system.
  • Published: 2015
  • Publisher: Foundation for Fundamental Research on Matter (FOM)
  • Language: English
1:03:26 Berkeley System Distribution (BSD), Andrea Ross English 2015

Networking with OpenBSD in a virtualized environment

Virtualized systems running on hypervisors such as bhyve, ESXi, Xen, etc are increasingly important in the datacenter. With a long history of stable regular releases, security, and networking performance OpenBSD is very well suited to take advantage of virtualization and to help improve the state of the art. This presentation will explore why OpenBSD is well suited to deploying as virtual network devices on the various hypervisors and present practical examples of using OpenBSD for production networking in a virtual system. I will discuss what tools are in base, what tools are easily installable from ports/packages, current automation and management tools, and how to use them effectively using specific real world examples from large data center networks. Will present examples and methods for using OpenBSD to build routers, firewalls, and loadbalancers running on the various hypervisors. Will talk about methods for automating deployment, configuration, and integration with existing vendors. Will also address possible future applications in switching. Will discuss how to use the tools in OpenBSD to run a better and faster network with fewer problems and how virtualization can be part of that. In addition to the above I will discuss why the OpenBSD community in particular should care about virtualization and work to improve the state of engineering there.
  • Published: 2015
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
42:45 Berkeley System Distribution (BSD), Andrea Ross English 2015

FreeBSD Operations at Limelight Networks (part 1 of 2)

In this talk, we'll look at Limelight's global CDN architecture and the practice of large scale web operations with FreeBSD. We'll investigate how FreeBSD makes these tasks easier and the strategies and tools we've developed to run our operations. We'll then look at why the engineering team chose SaltStack to further improve our operations capabilities and reduce deployment and fault handling times. Finally, we'll finish up with an overview of metrics and monitoring at scale with Zabbix and OpenTSDB. Limelight Networks is one of the "Big Three" CDNs and runs its edge using FreeBSD.
  • Published: 2015
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
58:35 EuroPython English 2015

Writing Domain Specific Languages with Python

Daniel Pope - Writing Domain Specific Languages with Python Python is an expressive general purpose programming language. Its syntax provides many ways to represent structure and minimise code repetition and boilerplate. But Python not always expressible enough. Perhaps when you've built a complicated enough system with hard-to-express inter-relationships, the code required to construct or operate on it can become complicated, repetitive and unreadable. Or perhaps you have users unfamiliar with Python who need to understand or edit a system. In cases like these, stepping beyond the syntax and semantics of basic Python can be an advantage. Daniel will describe various ways you can implement your own Domain Specific Languages, languages perhaps completely unlike Python that can succinctly describe more complicated Python systems. This talk will cover: * What and why of DSLs * Metaprogramming tricks * Writing simple parsers * The libraries PLY and PyParsing * Building tooling around your new DSLs
  • Published: 2015
  • Publisher: EuroPython
  • Language: English
57:59 EuroPython English 2014

One year of Snowden, what's next?

Constanze Kurz - One year of Snowden, what's next? Since June 2013, disclosed by Edward Snowden, we learn more and more facts about American and British spies’ deep appetite for information, economic spying and the methods they use to collect data. They systematically tapped international communications on a scale that only few people could imagine. But what are the consequences for societies when they now know about the NSA metadata repository capable of taking in billions of "events" daily to collected and analyze? Is there a way to defend against an agency with a monstrous secret budget?
  • Published: 2014
  • Publisher: EuroPython
  • Language: English
24:52 EuroPython English 2014

For lack of a better name(server): DNS Explained

Lynn Root - For lack of a better name(server): DNS Explained You've deployed! But your friends can't see it - what's wrong? I'm betting DNS. Maybe you've fixed a couple of entries, point some records to hostnames, waited patiently for new domains to resolve only to notice your nameservers are incorrect. But what actually goes on with DNS? Come to this talk to find out how DNS works, and how to interact and create a DNS with Python. ----- Following instructions of what entries to create where is easy enough when using a PaaS. But DNS is hard – deployment issues always seem to come down to DNS. A solid understanding of DNS will not only help with deploying your applications, but will also give a greater understanding of how the internet works, and more generally, distributed systems. In this talk, you will learn what DNS is, how it works and how to communicate with it, and how Python can make both interacting and spinning up your own DNS server simple (I swear!). Outline: * Intro (1-2m) * What DNS is (5 min) * URL -> IP addr, e.g. "phonebook" lookup (obligatory pun: Call me, Maybe?) * hierarchical system & resolution sequence (local DNS cache/resolver, ISP resolver, recursive DNS search) * popular types (primary, secondary/slave, forwarding, authoritative only, etc) * System components: what makes a DNS? * How to communicate with DNS (3 min) * Protocol: UDP * Operations: CRUD * Resource records (A, AAAA, CNAME, SOA, SRV, etc) * tools: dig/nsupdate/nslookup * Security overview (3min) (disclaimer: NOT a DNS security expert, not planning to get into the details here) * Server-Server, DynDNS: TSIG/GSS-TSIG * Server-Client: DNSSEC * Python + DNS (10 min) * plain UDP query in Python (no 3rd-party libraries/no magic) * Interacting with a DNS w/ Python (dnspython.py) * Sample DNS server with Twisted * "fake" demo (either local or pre-recorded screen cast) of querying/updating/etc of the Twisted DNS * Wrap up - resources page, github links, etc (1min) * Q&A - ~5 min
  • Published: 2014
  • Publisher: EuroPython
  • Language: English
24:24 FOSS4G, Open Source Geospatial Foundation (OSGeo) English 2016

Urban SDG Measuring System using the Open Geospatial Data of the International Organizations

As a post Millennium Development Goals(MDG), 17 Sustainable Development Goals(SDG) and 169 indicators were adopted at 2015 in the UN general assembly. Especially as the developing countries are predicted to face rapid urbanization until the 2030, Cities attract more and more attentions for achieving SDGs because most activities occur in the cities. But the activities are closely related to spatial phenomena. It is essential to consistently construct the spatial database for developing and developed countries and uniformly measure and monitor the indicators of urban SDGs which is operationally defined in this presentation as a SDG 9 and 11. In this regards, open geospatial data present both possibilities and limitations for urban SDG measurement. In this presentation, we analyze open database from UN agencies and Multilateral Development Banks(MDB) and measure and predict the urban SDG until the 2030 using that database. To that end, we analyze the related open data structure of those international organizations and develop a UN SDG monitoring system based on the FOSS4G solutions such as PostGIS and GeoServer. Choi, Junyoug (Spatial Information office, Korea Land and Housing corp., Republic of Korea) Hyunsoo Kim (CITUS. CO) Jaeseong Ahn (Kyungil University)
  • Published: 2016
  • Publisher: FOSS4G, Open Source Geospatial Foundation (OSGeo)
  • Language: English
50:01 Chaos Computer Club e.V. English 2017

Squeezing a key through a carry bit

The Go implementation of the P-256 elliptic curve had a small bug due to a misplaced carry bit affecting less than 0.00000003% of field subtraction operations. We show how to build a full practical key recovery attack on top of it, capable of targeting JSON Web Encryption.
  • Published: 2017
  • Publisher: Chaos Computer Club e.V.
  • Language: English
27:39 Confreaks, LLC English 2016

How to Build a Compiler

Compilers are all around you: Babel, Handlebars/HTMLBars, Glimmer, Uglify, and more. In this talk we'll walk through every part of a compiler from the parser to the generator. Learn about visitors and traversal, paths, scopes, bindings, and everything else. By the end compilers shouldn't seem like magic, and maybe you'll even want to contribute back to them.
  • Published: 2016
  • Publisher: Confreaks, LLC
  • Language: English
58:21 University of Southern California (USC) English 2011

Experimental Quantum Error Correction

The Achilles' heel of quantum information processors is the fragility of quantum states and processes. Without a method to control imperfection and imprecision of quantum devices, the probability that a quantum computation succeed will decrease exponentially in the number of gates it requires. In the last fifteen years, building on the discovery of quantum error correction, accuracy threshold theorems were proved showing that error can be controlled using a reasonable amount of resources as long as the error rate is smaller than a certain threshold. We thus have a scalable theory describing how to control quantum systems. The next step is to turn this theory into practice. I will give an overview of some of the progress towards the implmentation of quantum error correction around the world with a focus on results since the last Quantum Error Correction conference at USC. I will compare the various achievements and point towards what still need to be done to get robust quantum information processors.
  • Published: 2011
  • Publisher: University of Southern California (USC)
  • Language: English
43:28 University of Southern California (USC) English 2011

Smallest Errors achievable by Dynamical Decoupling (and How to Maintain Them)

We explore the fundamental limits on coherence preservation by dynamical decoupling methods in terms of control time scales and the spectrum/bandwidth of the environment. We focus on a decohering qubit controlled by arbitrary sequences of pi pulses. Using results from mathematical analysis, we establish a lower bound for coherence loss in terms of the minimum time between the pulses and the spectral cutoff frequency of the environment. We argue that similar bounds are applicable to a variety of open-loop unitary control methods while we find no explicit dependence of such lower bounds on the total control time. We use these findings to automatically generate "bandwidth adapted dynamical decoupling" sequences that can be used for preserving a qubit up to arbitrary times with the best fidelities theoretically possible given the available control capabilities. We also introduce "Walsh dynamical decoupling" schemes that are optimized for digital sequence generation. Our results imply that fact that, unlike in quantum fault-tolerant architecture, errors cannot be reduced indefinitely using reversible control methods yet a small error can be maintained for a long time.
  • Published: 2011
  • Publisher: University of Southern California (USC)
  • Language: English
46:17 Chaos Computer Club e.V. English 2017

Taking a scalpel to QNX

In this talk we will present a deep-dive analysis of the anatomy of QNX: a proprietary, real-time operating system aimed at the embedded market used in many sensitive and critical systems, particularly within the automotive industry. We will present the first reverse-engineering and analysis of the exploit mitigations, secure random number generators and memory management internals of QNX versions up to and including 6.6 and the brand new 64-bit QNX 7.0 (released in March 2017) and uncover a variety of design issues and vulnerabilities.
  • Published: 2017
  • Publisher: Chaos Computer Club e.V.
  • Language: English
47:13 DEF CON English 2018

CRYPTO AND PRIVACY VILLAGE - Prototyping Cryptographic Protocols in Python With Charm

  • Published: 2018
  • Publisher: DEF CON
  • Language: English
1:01:13 Heidelberg Laureate Forum Foundation English 2017

The HLF Portraits: Vinton Gray Cerf

The Heidelberg Laureate Forum Foundation presents the HLF Portraits: Vinton Gray Cerf; ACM A.M. Turing Award, 2004 Recipients of the ACM A.M. Turing Award and the Abel Prize in discussion with Marc Pachter, Director Emeritus National Portrait Gallery, Smithsonian Institute, about their lives, their research, their careers and the circumstances that led to the awards. Video interviews produced for the Heidelberg Laureate Forum Foundation by the Berlin photographer Peter Badge. The opinions expressed in this video do not necessarily reflect the views of the Heidelberg Laureate Forum Foundation or any other person or associated institution involved in the making and distribution of the video. Background: The Heidelberg Laureate Forum Foundation (HLFF) annually organizes the Heidelberg Laureate Forum (HLF), which is a networking event for mathematicians and computer scientists from all over the world. The HLFF was established and is funded by the German foundation the Klaus Tschira Stiftung (KTS), which promotes natural sciences, mathematics and computer science. The HLF is strongly supported by the award-granting institutions, the Association for Computing Machinery (ACM: ACM A.M. Turing Award, ACM Prize in Computing), the International Mathematical Union (IMU: Fields Medal, Nevanlinna Prize), and the Norwegian Academy of Science and Letters (DNVA: Abel Prize). The Scientific Partners of the HLFF are the Heidelberg Institute for Theoretical Studies (HITS) and Heidelberg University.
  • Published: 2017
  • Publisher: Heidelberg Laureate Forum Foundation
  • Language: English
55:32 DEF CON English 2018

VOTING VILLAGE - State, Local Perspectives on Election Security

  • Published: 2018
  • Publisher: DEF CON
  • Language: English
44:26 Chaos Computer Club e.V. English 2018

No evidence of communication and morality in protocols: Off-the-Record protocol version 4

OTRv4 is the newest version of the Off-The-Record protocol. It is a protocol where the newest academic research intertwines with real-world implementations. It is also one of the first protocols that comes from the global south which makes the political discussion around protocols an urgency. This newest versions also asks us to revisit our definitions around deniability (online and offline) and how important is it to the world. In this talk we will try to start a discussion around the importance of protocols, its political/moral foundations, the real-world implementation of academic ideas, the importance of securely implementing them, the definition of deniability in the current world and the design of OTRv4.
  • Published: 2018
  • Publisher: Chaos Computer Club e.V.
  • Language: English
47:49 FOSDEM VZW English 2014

Keccak, More Than Just SHA3SUM

Recently, the American National Institute of Standards and Technology (NIST) announced the selection of Keccak as the winner of the SHA-3 Cryptographic Hash Algorithm Competition. This concluded an open competition that was remarkable both for its magnitude and the involvement of the cryptographic community. Public review is of paramount importance to increase the confidence in the new standard and to favor its quick adoption. The SHA-3 competition explicitly took this into account by giving open access to the candidate algorithms and everyone in the cryptographic community could try to break them, compare their performance, or simply give comments. In this talk the authors of Keccak will introduce and highlight the strengths of their cryptographic primitive and explain how it can benefit to the FOSS community. Although Keccak, as the SHA-3 standard, will coexist with the current standard SHA-2 hash function family, it is much more than just another "SHAxSUM" algorithm. Keccak relies at its core on a new construction, called the sponge construction, which allows for simpler and more flexible modes of use. The talk will illustrate this by giving various examples on how current software designs can benefit from this greater flexibility, e.g., for all the flavors of hashing, stream encryption, authentication, authenticated encryption and pseudo-random bit generation. This talk will also focus on the different aspects that make the design of Keccak open, from the open source implementations on various platforms to initiatives to keep encouraging third-party cryptanalysis, such as the KeccakTools cryptanalysis software and the Crunchy Crypto Collision and Pre-image Contest.
  • Published: 2014
  • Publisher: FOSDEM VZW
  • Language: English
45:49 DEF CON English 2018

CRYPTO AND PRIVACY VILLAGE - Cloud Encryption: How to not suck at securing your encryption keys

  • Published: 2018
  • Publisher: DEF CON
  • Language: English
1:10:00 Chaos Computer Club e.V. English 2018

The year in post-quantum crypto

The world is finally catching on to the urgency of deploying post-quantum cryptography: cryptography designed to survive attacks by quantum computers. NIST's post-quantum competition is in full swing,and network protocols are exploring post-quantum extensions. This talk will take the audience on a journey through selected recent highlights from the post-quantum world.
  • Published: 2018
  • Publisher: Chaos Computer Club e.V.
  • Language: English
20:23 DEF CON English 2018

ICS VILLAGE - How can industrial IioT be protected from the great unwashed masses of IoT devices

  • Published: 2018
  • Publisher: DEF CON
  • Language: English
44:51 DEF CON English 2018

BLUE TEAM VILLAGE - Cloud Security Myths: Cutting through he BS-as-a-service

Cloud Security is a magical world of as-a-service miracles. Just spin up your intrusion-detection- as-a-service, SOC-as-a-service, incident-response-as-a-service, and start feeding it security- intelligence-as-a-service. Come hear from this CISO-as-a-service unwrap the onion of cloud access security brokers (CASB), cloud workload protection platforms (CWPP), microsegmentation, cloud security posture management (CSPM), software-defined perimeters (SDP), and bunch of other cloud related topics. What do they do? Do they really work? What do you with all those security appliances you’ve accumulated?
  • Published: 2018
  • Publisher: DEF CON
  • Language: English
26:48 DEF CON English 2018

CRYPTO AND PRIVACY VILLAGE - Revolutionizing Authentication with Oblivious Cryptography

  • Published: 2018
  • Publisher: DEF CON
  • Language: English
36:51 Chaos Computer Club e.V. English 2018

Modchips of the State

Hardware implants and supply chain attacks have been in the news recently, but how feasible are they and what can we do about them? In this talk we'll examine the design of a proof of concept SPI bus hardware implant that has similar capabilities to those described in the Bloomberg/Supermicro article as well as some countermeasures that we can use to try to detect these "modchips" and increase our trust in our systems.
  • Published: 2018
  • Publisher: Chaos Computer Club e.V.
  • Language: English
1:18:00 DEF CON English 2018

CRYPTO AND PRIVACY VILLAGE - Cryptography, Codes, and Secret Writing: An Introduction to Secret Communications

  • Published: 2018
  • Publisher: DEF CON
  • Language: English
47:47 DEF CON English 2018

CRYPTO AND PRIVACY VILLAGE - Two Steps to Owning MFA

  • Published: 2018
  • Publisher: DEF CON
  • Language: English
02:22 Institute of Physics (IOP), Deutsche Physikalische Gesellschaft (DPG) English 2014

X-ray measurements in helium-like atoms increased discrepancy between experiment and theoretical QED

A recent 15 parts per million (ppm) experiment on muonic hydrogen () found a major discrepancy with quantum electrodynamics (QED) and independent nuclear size determinations. Here we find a significant discrepancy in a different type of exotic atom: a medium-Z nucleus with two electrons. Investigation of the data collected is able to discriminate between available QED formulations and reveals a pattern of discrepancy of almost six standard errors of experimental results from the most recent theoretical predictions, with a functional dependence proportional to Zn where . In both the muonic and highly charged systems, the sign of the discrepancy is the same, with the measured transition energy higher than predicted. Some consequences are possible or probable, and some are more speculative. This may give insight into effective nuclear radii, the Rydberg, the fine-structure constant, or unexpectedly large QED terms.
  • Published: 2014
  • Publisher: Institute of Physics (IOP), Deutsche Physikalische Gesellschaft (DPG)
  • Language: English
18:09 DEF CON English 2018

PACKET HACKING VILLAGE - Collaborative / Teaching SOC

Effective security monitoring is an ongoing process. How do you get everyone participating? How do you on-board junior colleagues to continuous improvement? The purpose of this presentation is to show methods for encouraging participation from all members of the security monitoring team as well as tactics for communicating effective with the organization.
  • Published: 2018
  • Publisher: DEF CON
  • Language: English
46:45 DEF CON English 2018

CRYPTO AND PRIVACY VILLAGE - Integrating post-quantum crypto into real-life applications

  • Published: 2018
  • Publisher: DEF CON
  • Language: English
27:23 FOSDEM VZW English 2009

Zypper - openSUSE's command line software manager

FOSDEM (Free and Open Source Development European Meeting) is a European event centered around Free and Open Source software development. It is aimed at developers and all interested in the Free and Open Source news in the world. Its goals are to enable developers to meet and to promote the awareness and use of free and open source software.
  • Published: 2009
  • Publisher: FOSDEM VZW
  • Language: English
41:05 Chaos Computer Club e.V. English 2015

Crypto Dawn

Crypto seems to be the last line of defence in a wired world. "We mustimplement it, actively research it." (Eduard Snowden). So let us at least discuss some To Do things. • How we can eliminate weak crypto algorithms from the last millennium from our daily protocols? • How can we deal with the standardisation mess in the field of elliptic curves cryptography? • Which protocols and algorithms are needed in a post quantum world? • How "opportunistic" should we encrypt the masses? Could we provide a "moral, philosophical and technical commitment to enforce and defend our liberties" Eduard Snowden has ask us for?
  • Published: 2015
  • Publisher: Chaos Computer Club e.V.
  • Language: English
1:01:20 Chaos Computer Club e.V. English 2018

Enclosure-PUF

We are presenting an innovative technology, which allows verifying the authenticity, integrity and/or the physical state of an item by employing the propagation behaviour of electromagnetic waves. In particular, it enables to check for any tamper attempts for larger structures, such as off-the-shelf computers and their periphery. The technology extends existing tamper proof approaches from the chip/PCB to a system level and is easily retrofittable. In this presentation, we are demonstrating exemplary tamper proofing in order to protect secret information without an attack-detection or data-deletion circuit (!), which is a known difficult problem and an imperfect undertaking. Therefore, we demonstrate the simplicity and effectiveness using a very cheap self-made testbed (using alumium foil) to protect standard hardware against invasive attacks, such as needle probing through the case.
  • Published: 2018
  • Publisher: Chaos Computer Club e.V.
  • Language: English
19:56 DEF CON English 2018

AI VILLAGE - StuxNNet: Practical Live Memory Attacks on Machine Learning Systems

Like all software systems, the execution of machine learning models is dictated by logic represented as data in memory. Unlike traditional software, machine learning systems’ behavior is defined by the model’s weight and bias parameters, rather than precise machine opcodes. Thus patching network parameters can achieve the same ends as traditional attacks, which have proven brittle and prone to errors. Moreover, this attack provides powerful obfuscation as neural network weights are hard to interpret, making it difficult for security professionals to determine what a malicious patch does. We demonstrate that one can easily compute a trojan patch, which when applied causes a network to behave incorrectly only on inputs with a given trigger. An attacker looking to compromise an ML system can patch these values in live memory with minimal risk of system malfunctions or other detectable side-effects. In this presentation, we demonstrate proof of concept attacks on TensorFlow and a framework we wrote in C++ on both Linux and Windows systems. An attack of this type relies on limiting the amount of network communication to reduce to the likelyhood of detection. Accordingly, we attempt to minimize the size of the patch, in terms of number of changed parameters needed to introduce trojan behavior. On an MNIST handwritten digit classification network and on a malicious PDF detection network, we prove that the desired trojan behavior can be introduced with patches on the order of 1% of the total network size, using roughly 1% of the total training data, proving that the attack is realistic. I am a recent graduate from Columbia Univserity with a BA in Computer Science and MS in Machine Learning, and an incoming engineer on the Acropolis Hypervisor team at Nutanix. I have experience with Linux Kernel development, data science and malware analysis. I have interned at Google, Drawbridge and Nimbledroid, and have published research with Columbia’s Wireless and Mobile Networking lab. For fun, I like to be outdoors and train Brazilian Ju-Jitsu.
  • Published: 2018
  • Publisher: DEF CON
  • Language: English
1:15:05 Heidelberg Laureate Forum Foundation English 2018

6th HLF – Laureate Lectures: Time, Einstein and the Coolest Stuff in the Universe

William D. Phillips: "Time, Einstein and the coolest stuff in the universe" At the beginning of the 20th century Einstein changed the way we think about Time. Now, early in the 21st century, the measurement of Time is being revolutionized by the ability to cool a gas of atoms to temperatures millions of times lower than any naturally occurring temperature in the universe. Atomic clocks, the best timekeepers ever made, are one of the scientific and technological wonders of modern life. Such super-accurate clocks are essential to industry, commerce, and science; they are the heart of the Global Positioning System (GPS), which guides cars, airplanes, and hikers to their destinations. Today, the best primary atomic clocks use ultra-cold atoms, achieve accuracies of about one second in 300 million years, and are getting better all the time, while a new generation of atomic clocks is leading us to re-define what we mean by time. Super-cold atoms, with temperatures that can be below a billionth of a degree above absolute zero, use, and allow tests of, some of Einstein's strangest predictions. This will be a lively, multimedia presentation, including exciting experimental demonstrations and down-to-earth explanations about some of today's hottest (and coolest) science.
  • Published: 2018
  • Publisher: Heidelberg Laureate Forum Foundation
  • Language: English
out of 2 pages
Loading...
Feedback

Timings

  275 ms - page object
  190 ms - search
   10 ms - highlighting
    1 ms - highlighting/39822
    2 ms - highlighting/34701
    3 ms - highlighting/38118
    4 ms - highlighting/39866
    3 ms - highlighting/39865
    2 ms - highlighting/18670
    7 ms - highlighting/39290
    3 ms - highlighting/34838
    4 ms - highlighting/39212
    3 ms - highlighting/19957
    4 ms - highlighting/34935
    4 ms - highlighting/18657
    2 ms - highlighting/39900
    2 ms - highlighting/39916
    4 ms - highlighting/39211
    4 ms - highlighting/40301
    2 ms - highlighting/20444
    3 ms - highlighting/39979
    4 ms - highlighting/20100
    0 ms - highlighting/38700
    2 ms - highlighting/39861
    2 ms - highlighting/40225
    3 ms - highlighting/39860
    1 ms - highlighting/35326
    2 ms - highlighting/39784
    4 ms - highlighting/35303
    3 ms - highlighting/39217
    1 ms - highlighting/39546
    2 ms - highlighting/39855
    1 ms - highlighting/39874
    2 ms - highlighting/19994
    3 ms - highlighting/40183
    2 ms - highlighting/18018
    6 ms - highlighting/18037
    1 ms - highlighting/18684
    2 ms - highlighting/18851

Version

AV-Portal 3.8.0 (dec2fe8b0ce2e718d55d6f23ab68f0b2424a1f3f)