Laatste talks 2019 toegevoegd + foutjes verbeterd
This commit is contained in:
parent
8bb26ec8e1
commit
c05230acbe
|
@ -122,7 +122,7 @@ event_schedule:
|
|||
talk:
|
||||
speaker: Roland van Rijswijk-Deij
|
||||
title: "QBC: The Quantum Blockchain Cloud —debunking quantum myths and fables"
|
||||
link:
|
||||
link: talks/roland-van-rijswijk-deij-qbc-the-quantum-blockchain-cloud-debunking-quantum-myths-and-fables/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Carlo Meijer
|
||||
|
@ -150,7 +150,7 @@ event_schedule:
|
|||
talk:
|
||||
speaker: Thomas Attema
|
||||
title: Cryptographic applications of quantum mechanics
|
||||
link:
|
||||
link: talks/thomas-attema-cryptographic-applications-of-quantum-mechanics/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Bram Cappers
|
||||
|
@ -175,6 +175,7 @@ event_schedule:
|
|||
talk:
|
||||
speaker: Sebastian Österlund
|
||||
title: "RIDL: Rogue In-Flight Data Load"
|
||||
link: talks/sebastian-osterlund-ridl-rogue-in-flight-data-load/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Debarshi Basak
|
||||
|
@ -201,6 +202,7 @@ event_schedule:
|
|||
talk:
|
||||
speaker: Wim ten Have
|
||||
title: What does vNUMA actually mean?
|
||||
link: talks/wim-ten-have-what-does-vnuma-actually-mean/
|
||||
- column:
|
||||
talk:
|
||||
speaker: Carlo Berto
|
||||
|
|
|
@ -0,0 +1,38 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Roland van Rijswijk-Deij - QBC: The Quantum Blockchain Cloud — debunking quantum myths and fables"
|
||||
speakers:
|
||||
- roland-van-rijswijk-deij
|
||||
presentation:
|
||||
filename: 2019-11-21-roland-van-rijswijk-deij-qbc-the-quantum-blockchain-cloud-debunking-quantum-myths-and-fables.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=fC8yB5K_25A
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
In this talk I will focus on trying to discombobulate some of the common hypes and misunderstandings about the words quantum and cryptography in one sentence. This includes questions such as:
|
||||
|
||||
* Can everybody decrypt my TLS if quantum is a thing?
|
||||
|
||||
* Oh my god, quantum will be a thing next week, they're already selling 2000 qubit machines!
|
||||
|
||||
* Quantum cryptography will solve all my problems
|
||||
|
||||
* Post-quantum cryptography will solve all my problems
|
||||
|
||||
With a wink and a smile, the goal of this talk is to inform the audience about the real issues quantum computing may raise for Internet security and what they should and should not focus their energies on in dealing with this problem.
|
||||
|
||||
##v Biography
|
||||
|
||||
Roland is principal scientist at NLnet Labs, a not-for-profit foundation dedicated to research and development of core Internet protocols.
|
||||
|
||||
Next to his work at NLnet Labs, Roland is an assistant professor of computer network security at the University of Twente. His research interests include DNS(SEC), BGP and network security and stability. Roland obtained an M.Sc. in computer science from the University of Twente in 2001 and a cum laude PhD in computer science from the same university in 2017.
|
||||
|
||||
In his spare time, Roland very much enjoys finding new places to go scuba diving.
|
|
@ -0,0 +1,28 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Sebastian Österlund - RIDL: Rogue In-Flight Data Load"
|
||||
speakers:
|
||||
- sebastian-osterlund
|
||||
presentation:
|
||||
filename:
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=OWt05H1Ssak
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
Speculative execution bugs in modern CPUs popped up out of nowhere, but the worst of the nightmare appears to be over. While Spectre-style attacks will be with us forever, a variety of mitigations have been implemented to protect us against Intel CPU vulnerabilities such as Meltdown and Foreshadow. Browser vendors have implemented process isolation, and Intel even have silicon fixes in their latest CPUs. Do you feel safe?
|
||||
|
||||
We destroy these mitigations by taking a skeptical look at their assumptions, and reveal that unprivileged userspace applications can steal data by simply ignoring security boundaries -- after all, what do address spaces and privilege levels mean to Intel's CPU pipeline? Using our RIDL attacks, we'll steal secrets from SGX using just a bit of JavaScript in a web browser, grab /etc/shadow from another VM without even thinking about the hypervisor in the middle, and despair about our speculatively executed future.
|
||||
|
||||
## Biography
|
||||
|
||||
Sebastian is a Ph.D. student in the Systems and Network Security Group (VUSec) at the Vrije Universiteit Amsterdam. His interests include memory safety, operating systems defenses, and Fuzzing.
|
||||
|
||||
Previously he has worked on kMVX, a comprehensive kernel defense against information leaks using multi-variant execution, and more recently has worked on finding software bugs through directed fuzzing.
|
|
@ -0,0 +1,28 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Thomas Attema - Cryptographic applications of quantum mechanics"
|
||||
speakers:
|
||||
- thomas-attema
|
||||
presentation:
|
||||
filename: 2019-11-21-thomas-attema-cryptographic-applications-of-quantum-mechanics.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=A0Df7T4y63s
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
It is well known that the quantum computer poses a significant threat to the security of many ICT systems. However, quantum technology is also capable of improving the security of these systems. As an example, quantum key distribution systems are already commercially available. But other applications such as quantum authentication and quantum coin flipping protocols have been developed as well. All these protocols achieve functionalities that are known to be impossible for conventional protocols.
|
||||
|
||||
In this talk I will explain some of these cryptographic applications of quantum technology and highlight the impossibilities that are circumvented by making use of quantum mechanical properties.
|
||||
|
||||
## Biography
|
||||
|
||||
In 2013, Thomas Attema started as a researcher in the Cyber Security and Robustness department of TNO. His research focus has been on (applied) cryptography, working mainly on Multi-Party Computation and Post-Quantum Cryptography.
|
||||
|
||||
In addition, in 2018 he started his PhD in the cryptology group of the CWI under the supervision of professor Ronald Cramer.
|
|
@ -0,0 +1,28 @@
|
|||
---
|
||||
categories:
|
||||
- presentaties
|
||||
date: 2019-11-21T10:31:43+02:00
|
||||
description: ""
|
||||
layout: event-talk
|
||||
tags:
|
||||
title: "Wim ten Have - What does vNUMA actually mean?"
|
||||
speakers:
|
||||
- wim-ten-have
|
||||
presentation:
|
||||
filename: 2019-11-21-wim-ten-have-what-does-vnuma-actually-mean.pdf
|
||||
recording:
|
||||
platform: youtube
|
||||
url: https://www.youtube.com/watch?v=guQlThaE2Cl
|
||||
---
|
||||
|
||||
## Abstract
|
||||
|
||||
NUMA, Non-uniform memory access, is a computer memory design used in multiprocessing to build vast computer servers. Cloud environments often partition such server 'hosts' into smaller virtual 'guests' with the help of a virtualization management tool like libvirt. Libvirt supports a wide variety of virtualization technologies and allows to compose a vNUMA, virtual NUMA, model for its 'guest' representing and respecting the 'host' NUMA architecture for maximum performance.
|
||||
|
||||
There are many angles in which one can fail orchestrating such 'guests'. This presentation will walkthrough libvirt to implement a vNUMA 'guest' representation of the 'host' and how to compose such architecture describing it with the libvirt XML available elements and their designated attributes. It will focus on critical detail describing the NUMA induced distances of processor local- and remote memory, pinning a vCPU to a single or set of pCPUs and memory binding.
|
||||
|
||||
Last but not least important is the use and the composing of 'host-passthrough' (PCI passthrough) controllers under a vNUMA rendered architecture.
|
||||
|
||||
## Biography
|
||||
|
||||
Wim ten Have has embraced Open Source Software and deployed its use in various practical environments since 1992. He is currently working for Oracle in their Linux Virtualization Engineering group. Wim is implementing a mechanism to automatically partitioning 'host' provided capabilities and dynamically rendering those into multiple smaller 'guests' without the need for manual intervention. The goal of this automatic host partitioning is to respect all 'host' NUMA topology detail.
|
Reference in a new issue