USENIX
USENIX
  • Видео 5 497
  • Просмотров 4 349 430

Видео

PEPR '24 - Measuring Privacy Risks in Mobile Apps at ScalePEPR '24 - Measuring Privacy Risks in Mobile Apps at Scale
PEPR '24 - Measuring Privacy Risks in Mobile Apps at Scale
Просмотров 9414 дней назад
PEPR '24 - Measuring Privacy Risks in Mobile Apps at Scale Lisa LeVasseur and Bryce Simpson, Internet Safety Labs Since 2022, Internet Safety Labs (ISL) has been measuring privacy behaviors in K-12 EdTech apps used in schools across the US. More than 120,000 data points and over 1000 apps worth of network traffic have been collected, analyzed, and presented in the form of app Safety Labels. Thi...
PEPR '24 - Being Intentional: AB Testing and Data MinimizationPEPR '24 - Being Intentional: AB Testing and Data Minimization
PEPR '24 - Being Intentional: AB Testing and Data Minimization
Просмотров 7314 дней назад
PEPR '24 - Being Intentional: AB Testing and Data Minimization Matt Gershoff, Conductrics Often in analytics and data science we have the 'big table' mental picture of customer data where we are continuously trying to append and link new bits of data back to each customer. It turns out, however, that for many of the statistics needed for tasks like AB Testing, if we are intentional about how th...
PEPR '24 - Building a Protocol to Improve DSR Flexibility and IntegrationPEPR '24 - Building a Protocol to Improve DSR Flexibility and Integration
PEPR '24 - Building a Protocol to Improve DSR Flexibility and Integration
Просмотров 6714 дней назад
PEPR '24 - Building a Protocol to Improve DSR Flexibility and Integration Prachi Khandekar, Sam Alexander, and Suejung Shin, Ketch In order to fulfill data subject requests (DSRs), a structure of the rights request must be created and maintained from the time of intake, to the propagation to all data systems where Personal Information (PI) resides. What should this structure contain to perform ...
PEPR '24 - Automating Technical Privacy Reviews Using LLMsPEPR '24 - Automating Technical Privacy Reviews Using LLMs
PEPR '24 - Automating Technical Privacy Reviews Using LLMs
Просмотров 9114 дней назад
PEPR '24 - Automating Technical Privacy Reviews Using LLMs Stefano Bennati, HERE Technologies; Engin Bozdag, Uber In the world of Trust-by-Design, technical privacy and security reviews are essential for ensuring systems not only meet privacy standards, but also integrate privacy from start. However, as companies grow and diversify their technology, the process of conducting these reviews becom...
PEPR '24 - Empowered User Control: Learnings from Building "Event Level Deletion"PEPR '24 - Empowered User Control: Learnings from Building "Event Level Deletion"
PEPR '24 - Empowered User Control: Learnings from Building "Event Level Deletion"
Просмотров 4414 дней назад
PEPR '24 - Empowered User Control: Learnings from Building "Event Level Deletion" Lingwei Meng and Yan Li, Meta Through a new privacy initiative, Meta gives users the ability to remove their historical ad-interaction events. For example, users can go to their "recent ad activities" page and "delete" an ad they have clicked on. After deletion, this particular interaction will no longer be used i...
PEPR '24 - Designing a Data Subject Access Rights ToolPEPR '24 - Designing a Data Subject Access Rights Tool
PEPR '24 - Designing a Data Subject Access Rights Tool
Просмотров 5014 дней назад
PEPR '24 - Designing a Data Subject Access Rights Tool Arthur Borem, University of Chicago The GDPR and US state privacy laws have strengthened data subjects' right to access personal data collected by companies. However, the data exports companies provide consumers in response to Data Subject Access Requests (DSARs) can be overwhelming and hard to understand. To identify directions for improvi...
PEPR '24 - FTC, Privacy, and YouPEPR '24 - FTC, Privacy, and You
PEPR '24 - FTC, Privacy, and You
Просмотров 6814 дней назад
PEPR '24 - FTC, Privacy, and You Jessica Colnago, Federal Trade Commission, Office of Technology The Federal Trade Commission (FTC) has a dual mandate to promote fair competition and to protect consumers. Data plays an important role in both, as it can be used (or restricted) in a way that illegally hinders competition or that harms consumers. In order to fulfill these duties, it is critical th...
PEPR '24 - Deleting Data at Organizational ScalePEPR '24 - Deleting Data at Organizational Scale
PEPR '24 - Deleting Data at Organizational Scale
Просмотров 5914 дней назад
PEPR '24 - Deleting Data at Organizational Scale Diogo Lucas, Stripe Deleting a million records from a dataset can be hard. Deleting one record from a million datasets can be even harder. Data has a tendency to sprawl. In today's information-hungry world, information is replicated and permutated in a myriad of ways in data marts, lakes, and warehouses. This proliferation can add massive volume ...
PEPR '24 - Cache-22: Doing Privacy Engineering with Privacy StandardsPEPR '24 - Cache-22: Doing Privacy Engineering with Privacy Standards
PEPR '24 - Cache-22: Doing Privacy Engineering with Privacy Standards
Просмотров 6814 дней назад
PEPR '24 - Cache-22: Doing Privacy Engineering with Privacy Standards Zachary Kilhoffer and Devyn Wilder, University of Illinois at Urbana-Champaign Data privacy stands as a pressing and critical concern for numerous organizations. The burgeoning field of privacy engineering has emerged to address this demand. Although there exists no universally agreed-upon definition of the roles or education...
PEPR '24 - Presto-Native Noisy Aggregations for Privacy-Preserving WorkflowsPEPR '24 - Presto-Native Noisy Aggregations for Privacy-Preserving Workflows
PEPR '24 - Presto-Native Noisy Aggregations for Privacy-Preserving Workflows
Просмотров 2814 дней назад
PEPR '24 - Presto-Native Noisy Aggregations for Privacy-Preserving Workflows Kien Nguyen and Chen-Kuei Lee, Meta At Meta, large-scale data analysis happens constantly, across varied surfaces, platforms, and systems. Differential privacy (DP), because of its strong protection, is one of the privacy-enhancing technologies deployed by Meta to protect users' privacy. However, implementing DP in pra...
PEPR '24 - Empirical Privacy Metrics: The Bad, the Ugly… and the Good, Maybe?PEPR '24 - Empirical Privacy Metrics: The Bad, the Ugly… and the Good, Maybe?
PEPR '24 - Empirical Privacy Metrics: The Bad, the Ugly… and the Good, Maybe?
Просмотров 10014 дней назад
PEPR '24 - Empirical Privacy Metrics: The Bad, the Ugly… and the Good, Maybe? Damien Desfontaines, Tumult Labs Synthetic data generation makes for a convincing pitch: create fake data that follows the same statistical distribution as your real data, so you can analyze it, share it, sell it… while claiming that this is all privacy-safe and compliant, because synthetic data is also "fully anonymo...
PEPR '24 - Compute Engine Testing with Synthetic Data GenerationPEPR '24 - Compute Engine Testing with Synthetic Data Generation
PEPR '24 - Compute Engine Testing with Synthetic Data Generation
Просмотров 2614 дней назад
PEPR '24 - Compute Engine Testing with Synthetic Data Generation Jiangnan Cheng and Eric Liu, Meta At Meta, we have developed a new testing framework that utilizes privacy-safe and production-like synthetic data to detect regressions in various compute engines, such as Presto, within the Meta Data Warehouse. In this talk, we will discuss the challenges and solutions we have implemented to opera...
PEPR '24 - "A Big Deal": How Privacy Engineering Can Streamline the M&A ProcessPEPR '24 - "A Big Deal": How Privacy Engineering Can Streamline the M&A Process
PEPR '24 - "A Big Deal": How Privacy Engineering Can Streamline the M&A Process
Просмотров 5814 дней назад
PEPR '24 - "A Big Deal": How Privacy Engineering Can Streamline the M&A Process Shlomi Pasternak, Google The challenges of conducting privacy assessments of acquisitions are significant: tight timelines, competing priorities, and limited initial visibility. Yet, early proactive privacy assessments are critical to mitigate risks and streamline the integration process. Privacy Engineering's "Priv...
PEPR '24 - Governing Identity, RespectfullyPEPR '24 - Governing Identity, Respectfully
PEPR '24 - Governing Identity, Respectfully
Просмотров 1614 дней назад
PEPR '24 - Governing Identity, Respectfully Wendy Seltzer, Tucows User-centric or self-sovereign identity envisions a world in which individuals are at the center of their data and its uses. The challenge is getting all the other users of this data to agree! The challenge is more than the technical hurdles of incomplete or incompatible standards, but also the steeplechase of social, economic, a...
PEPR '24 - How We Can Save AnonymizationPEPR '24 - How We Can Save Anonymization
PEPR '24 - How We Can Save Anonymization
Просмотров 6314 дней назад
PEPR '24 - How We Can Save Anonymization Daniel Simmons-Marengo, Tumult Labs When we claim data is anonymous, we offer a simple promise to users: "This data cannot harm you. You don't need to worry about it." We've broken that promise again and again when datasets that we claimed were safe have been reidentified. There is now growing skepticism that anonymization is possible, and a belief that ...

Комментарии

  • @ananddesai404
    @ananddesai404 14 часов назад

    Excellent talk lol, I didn't fall asleep

  • @SaudBako
    @SaudBako День назад

    Say "go ahead" again

  • @sholalove6478
    @sholalove6478 5 дней назад

    This is a very good talk, a perfect introductory beginning that ramps up to complex results presented in a palatable manner. Will learn from this on how to present ideas efficiently. Kudos to the speaker!

  • @user-uo5bc5hd8q
    @user-uo5bc5hd8q 10 дней назад

    请问是否有中文版视频?

  • @CHLOEDEATHGOD
    @CHLOEDEATHGOD 18 дней назад

    This is so fasinating. I've wanted to see which one PMA to use and couldn't decide. So thank you for the help.

  • @zebrasavant1188
    @zebrasavant1188 22 дня назад

    😅 funny analogy Sis 🤟🏼Katie

  • @niektolen
    @niektolen Месяц назад

    i dont understand shait what this guy says

  • @JapanoiseBreakfast
    @JapanoiseBreakfast Месяц назад

    Is it really a tmu@ talk if he is not walking at a treadmill desk, though?

  • @Sioslayer
    @Sioslayer Месяц назад

    Can we use this to bypass kslar on ps5?

  • @mysticknight9711
    @mysticknight9711 Месяц назад

    Part of the formal spec of the OS needs to be the actual Verilog or VHDL specification for the SOC - however, this needs to be extended to CXL at a data center scope with heterogenous arrays of processors

  • @mysticknight9711
    @mysticknight9711 Месяц назад

    Very few commenters getting the point - (1) how to make a single security policy framework work across multiple components that speak different languages , (2) same for resource management and methods for different components to share resources without stomping on each other … and all beginning form a zero-trust context

  • @Mrperusyaneko
    @Mrperusyaneko Месяц назад

    thank you for this great work. interestring "The more ML model learns, the easier to be fooled", also we need to pay attention to this threat.

  • @adenyo462
    @adenyo462 Месяц назад

    I just want to point out that today, 12 years later, IPv6 is still indeed optional 🤣

  • @lilefevertical
    @lilefevertical Месяц назад

    Interesting.

  • @thepianist7379
    @thepianist7379 Месяц назад

    At 5:45, how do attackers know that x is a property and then tamper with it?

  • @ricp
    @ricp 2 месяца назад

    This is a great, and the concept of $ cost of decisions made in the game it's a great concept! I've tried the "Labtainers" created by this same author, team, and those are great for Cybersecurity hands-on practice

  • @vivek2319
    @vivek2319 2 месяца назад

    My two cents - if the research or work is done by a team of three, it's not a good practice for one person to give the entire presentation alone. Everyone should contribute.

  • @petermarshall8750
    @petermarshall8750 2 месяца назад

    Your formula for the area of a parallelogram is incorrect. It should be A = S*W*sin(angle)

  • @coochiedestroyerr
    @coochiedestroyerr 2 месяца назад

    no idea why my college decided to include this in our "Cloud computing" subject ??

  • @vanshjangir_
    @vanshjangir_ 3 месяца назад

    At 25:23 how does the decapsulation happens on the L7 load balancer.

  • @user-mr5hq8md1z
    @user-mr5hq8md1z 3 месяца назад

    Bruh this vid had literally no comment 😂

  • @mjdxp5688
    @mjdxp5688 3 месяца назад

    Fork Oracle!

  • @InabaNitohbe
    @InabaNitohbe 3 месяца назад

    Hello, is your project code open source?

  • @alexkaouris6755
    @alexkaouris6755 3 месяца назад

    very nice.

  • @TheLinuxGallery-qz2vs
    @TheLinuxGallery-qz2vs 3 месяца назад

    9 years later, and the community is trying to phase out FFS for ZFS, without regard for the issues Dr Marshall McKusick talks about, with mirroring filesystems. I can't find tools for using any BSD filesystem in linux, except for ZFS. I can barely find meaningful resources on the subject; and any help I'm offered for my laptops and desktops and routers and external drives, amounts to "use ZFS" or "you don't want to use FFS, use ext4 or ZFS" or "UFS is bad, use ZFS", or "you need ext4 or better, ZFS" or "*ignores question about implimenting FFS* ZFS is really cool, you should try ZFS". And then, I'm instantly shunned.

  • @killerferplay614
    @killerferplay614 3 месяца назад

    Why am I getting this? Type: LA_NFCID1 (7), Value: 0x0E014790D2422E Type: LA_SEL_INFO, Value: 0x20 Type: LA_BIT_FRAME_SDD, Value: 0x44 Type: LA_PLATFORM_CONFIG, Value: 0x00 Type: LA_HIST_BY (3),

  • @jr.snowkai9493
    @jr.snowkai9493 3 месяца назад

    Very nice presentation.

  • @vineetbhargava4141
    @vineetbhargava4141 4 месяца назад

    Thanks Chip for explaining definitely going to read the paper.

  • @MadushanNishantha
    @MadushanNishantha 4 месяца назад

    Interesting project and results. nice!. Also take a look at rutabaga_gfx(fully supported in crosvm, and partial support in qemu). most recent versions support command serialization at the kernel api level(drm calls in linux). Basically they run a copy of the host gpu driver in the guest, and just submit the kernel calls to the host. this way, the user-space graphics stack is fully isolated from the host, and also has a reduction of api call numbers, and they use drm fences for synchronization. they also claim near native graphics performance on chromeos for their android compatibility layer. the feature is called "virtgpu drm native context"

  • @yosihashamen1
    @yosihashamen1 4 месяца назад

    Finally a good explanation

  • @openclass4all
    @openclass4all 4 месяца назад

    Great presentation @usenix

  • @JJGhostHunters
    @JJGhostHunters 4 месяца назад

    Very interesting work! Can you provide the CNN coding that was used for key extraction?

  • @Abu_khalid1
    @Abu_khalid1 4 месяца назад

    That's interesting

  • @user-el4cw3of2i
    @user-el4cw3of2i 4 месяца назад

    this is really interesting

  • @rogeryau8798
    @rogeryau8798 4 месяца назад

    really cool that the jobs can be run on spot instances across clouds

  • @yairmorgenstern416
    @yairmorgenstern416 4 месяца назад

    Genuinely better than most professional comedians

  • @The-KP
    @The-KP 4 месяца назад

    Brilliant.. as usual. I'd like to hire James Menckin to deliver the eulogy at my funeral, but I'm afraid he'll take my family on a road trip to save the planet from Rust.

  • @forheuristiclifeksh7836
    @forheuristiclifeksh7836 4 месяца назад

    1:00

  • @forheuristiclifeksh7836
    @forheuristiclifeksh7836 4 месяца назад

    1:00

  • @terrylawrence3726
    @terrylawrence3726 5 месяцев назад

    This presentation is too technical and very monotonous. I would have preferred something more live than someone reading a scripts. Thank you for sharing...

  • @OverLord3693
    @OverLord3693 5 месяцев назад

    A good short video on sampling

  • @user-zw2td4jq4f
    @user-zw2td4jq4f 5 месяцев назад

    Content is wrong... plz update this video

  • @user-w0806x
    @user-w0806x 5 месяцев назад

    I'd like to know how the probability values for each field are determined at the 10:06 mark in the video.

  • @victorsmirnov876
    @victorsmirnov876 5 месяцев назад

    Cool!

  • @fiberplz
    @fiberplz 5 месяцев назад

    This sounds like an incredibly fun project. Many questions remain to be answered, but I enjoyed the presentation.

  • @HarshTandon-kn6md
    @HarshTandon-kn6md 5 месяцев назад

    Great Talk!

  • @dannychapman9167
    @dannychapman9167 5 месяцев назад

    Mine all surfaces

  • @dannychapman9167
    @dannychapman9167 5 месяцев назад

    Tools Nunn

  • @dannychapman9167
    @dannychapman9167 5 месяцев назад

    Titt Titt y tutti tutti

  • @julietibshirani6052
    @julietibshirani6052 5 месяцев назад

    Fantastic talk, thank you!