=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
DIMVA decisions were just sent out. Congratulations to all authors who got and accept!
If your paper was not accepted, the uASC deadline is in 22 hours (same length+format) and uASC is looking for interesting insights despite flaws in the threat model -> uasc.cc
=> More informations about this toot | View the thread
We updated the uASC deadline: it is January 28 AoE, which is 1 day after the DIMVA notification.
Take a look at our CFP. Any insights around microarchitecture security are interesting.
https://uasc.cc/
=> More informations about this toot | View the thread
hyperref unfortunately can add deanonymizing information to PDFs. I posted a patch + a two-liner cp/sed here: https://github.com/latex3/hyperref/issues/376
Run that and get an anonymized PDF that does not contain all your bibkeys.
=> More informations about this toot | View the thread
The uASC registration is open now:
https://uasc.cc/
Also the uASC deadline is approaching: January 27 AoE.
We accept papers, posters, and talks. We have conference proceedings. We're interested in any insights broadly around microarchitecture security.
Don't miss the deadline, don't miss the conference ;)
=> More informations about this toot | View the thread
It's kind of like werewolves (aka Mafia aka secret Hitler) but nothing is ever revealed. No one learns anyone else's role at any point in the game. Any arguments and votes are handed in in written form.
The only thing that is revealed is how the process concluded, i.e., with one or the other outcome.
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
Can I ask you all for a quick review of this idea?
Threat Model and Attack Scenario:
PC member A and B agree to not mark each other as a conflict and write each other favorable reviews and fight for each others papers.
Proposed Mitigation:
Conclusion:
Our approach solves the problem. PC member A and B cannot write each other favorable reviews or fight for each other's paper anymore.
Hoping for typical reviews from security folks here that identify any weaknesses or potential side effects ;)
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
CFP for uASC 25 is still open. We have rolling reviews, and 1 submission is already accepted. If you have interesting results on microarchitecture security (incl. weak threat models or reproducing prior work), check out the CFP at http://uasc.cc
The CFP closes Jan 28
We look for contributions from academia and industry and accept papers, posters, and talks. Or just attend uASC 25 on February 19 in Bochum and meet fellow microarchitecture security researchers.
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> This profile without reblog | Go to lavados@infosec.exchange account This content has been proxied by September (3851b).Proxy Information
text/gemini