Laatste talks 2019 toegevoegd + foutjes verbeterd

This commit is contained in:
Patrick Reijnen 2023-07-23 16:34:56 +02:00
parent 8bb26ec8e1
commit c05230acbe
5 changed files with 126 additions and 2 deletions

View file

@ -122,7 +122,7 @@ event_schedule:
talk: talk:
speaker: Roland van Rijswijk-Deij speaker: Roland van Rijswijk-Deij
title: "QBC: The Quantum Blockchain Cloud —debunking quantum myths and fables" title: "QBC: The Quantum Blockchain Cloud —debunking quantum myths and fables"
link: link: talks/roland-van-rijswijk-deij-qbc-the-quantum-blockchain-cloud-debunking-quantum-myths-and-fables/
- column: - column:
talk: talk:
speaker: Carlo Meijer speaker: Carlo Meijer
@ -150,7 +150,7 @@ event_schedule:
talk: talk:
speaker: Thomas Attema speaker: Thomas Attema
title: Cryptographic applications of quantum mechanics title: Cryptographic applications of quantum mechanics
link: link: talks/thomas-attema-cryptographic-applications-of-quantum-mechanics/
- column: - column:
talk: talk:
speaker: Bram Cappers speaker: Bram Cappers
@ -175,6 +175,7 @@ event_schedule:
talk: talk:
speaker: Sebastian Österlund speaker: Sebastian Österlund
title: "RIDL: Rogue In-Flight Data Load" title: "RIDL: Rogue In-Flight Data Load"
link: talks/sebastian-osterlund-ridl-rogue-in-flight-data-load/
- column: - column:
talk: talk:
speaker: Debarshi Basak speaker: Debarshi Basak
@ -201,6 +202,7 @@ event_schedule:
talk: talk:
speaker: Wim ten Have speaker: Wim ten Have
title: What does vNUMA actually mean? title: What does vNUMA actually mean?
link: talks/wim-ten-have-what-does-vnuma-actually-mean/
- column: - column:
talk: talk:
speaker: Carlo Berto speaker: Carlo Berto

View file

@ -0,0 +1,38 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Roland van Rijswijk-Deij - QBC: The Quantum Blockchain Cloud — debunking quantum myths and fables"
speakers:
- roland-van-rijswijk-deij
presentation:
filename: 2019-11-21-roland-van-rijswijk-deij-qbc-the-quantum-blockchain-cloud-debunking-quantum-myths-and-fables.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=fC8yB5K_25A
---
## Abstract
In this talk I will focus on trying to discombobulate some of the common hypes and misunderstandings about the words quantum and cryptography in one sentence. This includes questions such as:
* Can everybody decrypt my TLS if quantum is a thing?
* Oh my god, quantum will be a thing next week, they're already selling 2000 qubit machines!
* Quantum cryptography will solve all my problems
* Post-quantum cryptography will solve all my problems
With a wink and a smile, the goal of this talk is to inform the audience about the real issues quantum computing may raise for Internet security and what they should and should not focus their energies on in dealing with this problem.
##v Biography
Roland is principal scientist at NLnet Labs, a not-for-profit foundation dedicated to research and development of core Internet protocols.
Next to his work at NLnet Labs, Roland is an assistant professor of computer network security at the University of Twente. His research interests include DNS(SEC), BGP and network security and stability. Roland obtained an M.Sc. in computer science from the University of Twente in 2001 and a cum laude PhD in computer science from the same university in 2017.
In his spare time, Roland very much enjoys finding new places to go scuba diving.

View file

@ -0,0 +1,28 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Sebastian Österlund - RIDL: Rogue In-Flight Data Load"
speakers:
- sebastian-osterlund
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=OWt05H1Ssak
---
## Abstract
Speculative execution bugs in modern CPUs popped up out of nowhere, but the worst of the nightmare appears to be over. While Spectre-style attacks will be with us forever, a variety of mitigations have been implemented to protect us against Intel CPU vulnerabilities such as Meltdown and Foreshadow. Browser vendors have implemented process isolation, and Intel even have silicon fixes in their latest CPUs. Do you feel safe?
We destroy these mitigations by taking a skeptical look at their assumptions, and reveal that unprivileged userspace applications can steal data by simply ignoring security boundaries -- after all, what do address spaces and privilege levels mean to Intel's CPU pipeline? Using our RIDL attacks, we'll steal secrets from SGX using just a bit of JavaScript in a web browser, grab /etc/shadow from another VM without even thinking about the hypervisor in the middle, and despair about our speculatively executed future.
## Biography
Sebastian is a Ph.D. student in the Systems and Network Security Group (VUSec) at the Vrije Universiteit Amsterdam. His interests include memory safety, operating systems defenses, and Fuzzing.
Previously he has worked on kMVX, a comprehensive kernel defense against information leaks using multi-variant execution, and more recently has worked on finding software bugs through directed fuzzing.

View file

@ -0,0 +1,28 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Thomas Attema - Cryptographic applications of quantum mechanics"
speakers:
- thomas-attema
presentation:
filename: 2019-11-21-thomas-attema-cryptographic-applications-of-quantum-mechanics.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=A0Df7T4y63s
---
## Abstract
It is well known that the quantum computer poses a significant threat to the security of many ICT systems. However, quantum technology is also capable of improving the security of these systems. As an example, quantum key distribution systems are already commercially available. But other applications such as quantum authentication and quantum coin flipping protocols have been developed as well. All these protocols achieve functionalities that are known to be impossible for conventional protocols.
In this talk I will explain some of these cryptographic applications of quantum technology and highlight the impossibilities that are circumvented by making use of quantum mechanical properties.
## Biography
In 2013, Thomas Attema started as a researcher in the Cyber Security and Robustness department of TNO. His research focus has been on (applied) cryptography, working mainly on Multi-Party Computation and Post-Quantum Cryptography.
In addition, in 2018 he started his PhD in the cryptology group of the CWI under the supervision of professor Ronald Cramer.

View file

@ -0,0 +1,28 @@
---
categories:
- presentaties
date: 2019-11-21T10:31:43+02:00
description: ""
layout: event-talk
tags:
title: "Wim ten Have - What does vNUMA actually mean?"
speakers:
- wim-ten-have
presentation:
filename: 2019-11-21-wim-ten-have-what-does-vnuma-actually-mean.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=guQlThaE2Cl
---
## Abstract
NUMA, Non-uniform memory access, is a computer memory design used in multiprocessing to build vast computer servers. Cloud environments often partition such server 'hosts' into smaller virtual 'guests' with the help of a virtualization management tool like libvirt. Libvirt supports a wide variety of virtualization technologies and allows to compose a vNUMA, virtual NUMA, model for its 'guest' representing and respecting the 'host' NUMA architecture for maximum performance.
There are many angles in which one can fail orchestrating such 'guests'. This presentation will walkthrough libvirt to implement a vNUMA 'guest' representation of the 'host' and how to compose such architecture describing it with the libvirt XML available elements and their designated attributes. It will focus on critical detail describing the NUMA induced distances of processor local- and remote memory, pinning a vCPU to a single or set of pCPUs and memory binding.
Last but not least important is the use and the composing of 'host-passthrough' (PCI passthrough) controllers under a vNUMA rendered architecture.
## Biography
Wim ten Have has embraced Open Source Software and deployed its use in various practical environments since 1992. He is currently working for Oracle in their Linux Virtualization Engineering group. Wim is implementing a mechanism to automatically partitioning 'host' provided capabilities and dynamically rendering those into multiple smaller 'guests' without the need for manual intervention. The goal of this automatic host partitioning is to respect all 'host' NUMA topology detail.