Normal view

There are new articles available, click to refresh the page.
Today — 18 May 2024Main stream

USENIX Security ’23 – Controlled Data Races In Enclaves: Attacks And Detection

18 May 2024 at 11:00

Authors/Presenters:Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Controlled Data Races In Enclaves: Attacks And Detection appeared first on Security Boulevard.

Yesterday — 17 May 2024Main stream

USENIX Security ’23 – EnigMap: External-Memory Oblivious Map for Secure Enclaves

17 May 2024 at 11:00

Authors/Presenters: Afonso Tinoco, Sixiang Gao, Elaine Shi

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – EnigMap: External-Memory Oblivious Map for Secure Enclaves appeared first on Security Boulevard.

Before yesterdayMain stream

USENIX Security ’23 – Reusable Enclaves For Confidential Serverless Computing

16 May 2024 at 15:00

Authors/Presenters:Shixuan Zhao, Pinshen Xu, Guoxing Chen, Mengya Zhang, TYinqian Zhang, Zhiqiang Lin

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Reusable Enclaves For Confidential Serverless Computing appeared first on Security Boulevard.

USENIX Security ’23 – It’s All In Your Head(Set): Side-Channel Attacks On AR/VR Systems – Source: securityboulevard.com

usenix-security-’23-–-it’s-all-in-your-head(set):-side-channel-attacks-on-ar/vr-systems-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: Marc Handelman Security Bloggers Network  Home » Security Bloggers Network » USENIX Security ’23 – It’s All In Your Head(Set): Side-Channel Attacks On AR/VR Systems by Marc Handelman on May 15, 2024 Authors/Presenters:Yicheng Zhang, Carter Slocum, Jiasi Chen, Nael Abu-Ghazaleh Many thanks to USENIX for publishing their outstanding USENIX Security ’23 […]

La entrada USENIX Security ’23 – It’s All In Your Head(Set): Side-Channel Attacks On AR/VR Systems – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

USENIX Security ’23 – It’s All In Your Head(Set): Side-Channel Attacks On AR/VR Systems

15 May 2024 at 15:00

Authors/Presenters:Yicheng Zhang, Carter Slocum, Jiasi Chen, Nael Abu-Ghazaleh

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – It’s All In Your Head(Set): Side-Channel Attacks On AR/VR Systems appeared first on Security Boulevard.

USENIX Security ’23 – PATROL: Provable Defense against Adversarial Policy in Two-player Games

14 May 2024 at 15:00

Authors/Presenters:Wenbo Guo, Xian Wu, Lun Wang, Xinyu Xing, Dawn Song

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

The post USENIX Security ’23 – PATROL: Provable Defense against Adversarial Policy in Two-player Games appeared first on Security Boulevard.

USENIX Security ’23 – A Peek Into The Metaverse: Detecting 3D Model Clones In Mobile Games

14 May 2024 at 11:00

Authors/Presenters: Chaoshun Zuo, Chao Wang, Zhiqiang Lin

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – A Peek Into The Metaverse: Detecting 3D Model Clones In Mobile Games appeared first on Security Boulevard.

USENIX Security ’23 – Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation

13 May 2024 at 15:00

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation appeared first on Security Boulevard.

USENIX Security ’23 – One Server For The Price Of Two: Simple And Fast Single-Server Private Information Retrieval

13 May 2024 at 11:00

Authors/Presenters: Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, Vinod Vaikuntanathan

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – One Server For The Price Of Two: Simple And Fast Single-Server Private Information Retrieval appeared first on Security Boulevard.

USENIX Security ’23 – GigaDORAM: Breaking the Billion Address Barrier

12 May 2024 at 11:00

Authors/Presenters: Brett Falk, Rafail Ostrovsky, Matan Shtepel, Jacob Zhang

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – GigaDORAM: Breaking the Billion Address Barrier appeared first on Security Boulevard.

USENIX Security ’23 – Don’t be Dense: Efficient Keyword PIR for Sparse Databases – Distinguished Paper Award Winner

11 May 2024 at 11:00

Authors/Presenters: Sarvar Patel, Joon Young Seo, Kevin Yeo

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Don’t be Dense: Efficient Keyword PIR for Sparse Databases – Distinguished Paper Award Winner appeared first on Security Boulevard.

USENIX Security ’23 – Authenticated Private Information Retrieval

10 May 2024 at 15:00

Authors/Presenters: Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, Bryan Ford

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Authenticated Private Information Retrieval appeared first on Security Boulevard.

USENIX Security ’23 – URET: Universal Robustness Evaluation Toolkit (for Evasion)

10 May 2024 at 11:00

Authors/Presenters: Kevin Eykholt, Taesung Lee, Douglas Schales, Jiyong Jang, Ian Molloy, Masha Zorin

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – URET: Universal Robustness Evaluation Toolkit (for Evasion) appeared first on Security Boulevard.

USENIX Security ’23 – SMACK: Semantically Meaningful Adversarial Audio Attack

9 May 2024 at 15:00

Authors/Presenters: Zhiyuan Yu, Yuanhaur Chang, Ning Zhang, Chaowei Xiao

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – SMACK: Semantically Meaningful Adversarial Audio Attack appeared first on Security Boulevard.

USENIX Security ’23 – The Space of Adversarial Strategies

7 May 2024 at 15:00

Authors/Presenters: Ryan Sheatsley, Blaine Hoak, Eric Pauley, Patrick McDaniel

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – The Space of Adversarial Strategies appeared first on Security Boulevard.

USENIX Security ’23 – Detecting API Post-Handling Bugs Using Code and Description in Patches

6 May 2024 at 15:00

Authors/Presenters: Miaoqian Lin, Kai Chen, Yang Xiao

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Detecting API Post-Handling Bugs Using Code and Description in Patches appeared first on Security Boulevard.

USENIX Security ’23 – Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs

6 May 2024 at 11:00

Authors/Presenters: Yudi Zhao, Yuan Zhang, Min Yang

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs appeared first on Security Boulevard.

In Memoriam: Ross Anderson, 1956–2024

10 April 2024 at 07:08

Last week, I posted a short memorial of Ross Anderson. The Communications of the ACM asked me to expand it. Here’s the longer version.

EDITED TO ADD (4/11): Two weeks before he passed away, Ross gave an 80-minute interview where he told his life story.

Ross Anderson

31 March 2024 at 20:21

Ross Anderson unexpectedly passed away Thursday night in, I believe, his home in Cambridge.

I can’t remember when I first met Ross. Of course it was before 2008, when we created the Security and Human Behavior workshop. It was well before 2001, when we created the Workshop on Economics and Information Security. (Okay, he created both—I helped.) It was before 1998, when we wrote about the problems with key escrow systems. I was one of the people he brought to the Newton Institute, at Cambridge University, for the six-month cryptography residency program he ran (I mistakenly didn’t stay the whole time)—that was in 1996.

I know I was at the first Fast Software Encryption workshop in December 1993, another conference he created. There I presented the Blowfish encryption algorithm. Pulling an old first-edition of Applied Cryptography (the one with the blue cover) down from the shelf, I see his name in the acknowledgments. Which means that sometime in early 1993—probably at Eurocrypt in Lofthus, Norway—I, as an unpublished book author who had only written a couple of crypto articles for Dr. Dobb’s Journal, asked him to read and comment on my book manuscript. And he said yes. Which means I mailed him a paper copy. And he read it. And mailed his handwritten comments back to me. In an envelope with stamps. Because that’s how we did it back then.

I have known Ross for over thirty years, as both a colleague and a friend. He was enthusiastic, brilliant, opinionated, articulate, curmudgeonly, and kind. Pick up any of his academic papers—there are many—and odds are that you will find a least one unexpected insight. He was a cryptographer and security engineer, but also very much a generalist. He published on block cipher cryptanalysis in the 1990s, and the security of large-language models last year. He started conferences like nobody’s business. His masterwork book, Security Engineering—now in its third edition—is as comprehensive a tome on cybersecurity and related topics as you could imagine. (Also note his fifteen-lecture video series on that same page. If you have never heard Ross lecture, you’re in for a treat.) He was the first person to understand that security problems are often actually economic problems. He was the first person to make a lot of those sorts of connections. He fought against surveillance and backdoors, and for academic freedom. He didn’t suffer fools in either government or the corporate world.

He’s listed in the acknowledgments as a reader of every one of my books from Beyond Fear on. Recently, we’d see each other a couple of times a year: at this or that workshop or event. The last time I saw him was last June, at SHB 2023, in Pittsburgh. We were having dinner on Alessandro Acquisti‘s rooftop patio, celebrating another successful workshop. He was going to attend my Workshop on Reimagining Democracy in December, but he had to cancel at the last minute. (He sent me the talk he was going to give. I will see about posting it.) The day before he died, we were discussing how to accommodate everyone who registered for this year’s SHB workshop. I learned something from him every single time we talked. And I am not the only one.

My heart goes out to his wife Shireen and his family. We lost him much too soon.

EDITED TO ADD (4/10): I wrote a longer version for Communications of the ACM.

❌
❌