Academic and Industry Talks
Day 1
-
everything is open source if you can reverse engineer, Low Level
- video demonstrating reverse engineering (14 minutes)
-
- Overview of the security and privacy risks of integrating technology into medical devices, cars, and other things (20 minutes)
-
- Shows how to jailbreak an LLM, with participants in a study succeeding even without much expertise (10 minutes)
Day 2
-
- introduction to return oriented programming (11.5 minutes)
Day 3
-
- Discusses security and privacy difficulties faced by victim-survivors of intimate partner violence (12 minutes)
-
- Examines security and privacy needs of refugees to the US (12 minutes)
-
- Examines views regarding non-consensual AI image generation (10 minutes)
Other Talks
Vulnerabilities
-
- Shows how a video decoder can be exploited to attack Firefox and VLC for Windows, multiple Android devices (11 minutes)
-
- Demonstrates a new type of attack that manipulates source code to hide a vulnerability (13 minutes)
Protective Technology
-
- Describes a tool that can be used to “cloak” art before an artist shares it, avoiding style mimicry by AI (12 minutes)
-
- Describe cache side-channel attacks and a technique to prevent them
Usable Security and Privacy
-
- Examines the motivation of bug hunters and the challenges they face (12 minutes)
-
Usable Security — The Source Awakens, Matthew Smith, USENIX Enigma 2016 (21 minutes)