- Видео 5 497
- Просмотров 4 349 430
USENIX
США
Добавлен 1 дек 2008
As part of USENIX's commitment to the Open Access to research movement, slides, proceedings, and audio and video recordings from many of our events are now freely available to the general public shortly after they take place. Selected videos are added to this channel; additional recordings can be found on the USENIX Web site.
Видео
PEPR '24 - Measuring Privacy Risks in Mobile Apps at Scale
Просмотров 9414 дней назад
PEPR '24 - Measuring Privacy Risks in Mobile Apps at Scale Lisa LeVasseur and Bryce Simpson, Internet Safety Labs Since 2022, Internet Safety Labs (ISL) has been measuring privacy behaviors in K-12 EdTech apps used in schools across the US. More than 120,000 data points and over 1000 apps worth of network traffic have been collected, analyzed, and presented in the form of app Safety Labels. Thi...
PEPR '24 - Being Intentional: AB Testing and Data Minimization
Просмотров 7314 дней назад
PEPR '24 - Being Intentional: AB Testing and Data Minimization Matt Gershoff, Conductrics Often in analytics and data science we have the 'big table' mental picture of customer data where we are continuously trying to append and link new bits of data back to each customer. It turns out, however, that for many of the statistics needed for tasks like AB Testing, if we are intentional about how th...
PEPR '24 - Building a Protocol to Improve DSR Flexibility and Integration
Просмотров 6714 дней назад
PEPR '24 - Building a Protocol to Improve DSR Flexibility and Integration Prachi Khandekar, Sam Alexander, and Suejung Shin, Ketch In order to fulfill data subject requests (DSRs), a structure of the rights request must be created and maintained from the time of intake, to the propagation to all data systems where Personal Information (PI) resides. What should this structure contain to perform ...
PEPR '24 - Automating Technical Privacy Reviews Using LLMs
Просмотров 9114 дней назад
PEPR '24 - Automating Technical Privacy Reviews Using LLMs Stefano Bennati, HERE Technologies; Engin Bozdag, Uber In the world of Trust-by-Design, technical privacy and security reviews are essential for ensuring systems not only meet privacy standards, but also integrate privacy from start. However, as companies grow and diversify their technology, the process of conducting these reviews becom...
PEPR '24 - Empowered User Control: Learnings from Building "Event Level Deletion"
Просмотров 4414 дней назад
PEPR '24 - Empowered User Control: Learnings from Building "Event Level Deletion" Lingwei Meng and Yan Li, Meta Through a new privacy initiative, Meta gives users the ability to remove their historical ad-interaction events. For example, users can go to their "recent ad activities" page and "delete" an ad they have clicked on. After deletion, this particular interaction will no longer be used i...
PEPR '24 - Designing a Data Subject Access Rights Tool
Просмотров 5014 дней назад
PEPR '24 - Designing a Data Subject Access Rights Tool Arthur Borem, University of Chicago The GDPR and US state privacy laws have strengthened data subjects' right to access personal data collected by companies. However, the data exports companies provide consumers in response to Data Subject Access Requests (DSARs) can be overwhelming and hard to understand. To identify directions for improvi...
PEPR '24 - FTC, Privacy, and You
Просмотров 6814 дней назад
PEPR '24 - FTC, Privacy, and You Jessica Colnago, Federal Trade Commission, Office of Technology The Federal Trade Commission (FTC) has a dual mandate to promote fair competition and to protect consumers. Data plays an important role in both, as it can be used (or restricted) in a way that illegally hinders competition or that harms consumers. In order to fulfill these duties, it is critical th...
PEPR '24 - Deleting Data at Organizational Scale
Просмотров 5914 дней назад
PEPR '24 - Deleting Data at Organizational Scale Diogo Lucas, Stripe Deleting a million records from a dataset can be hard. Deleting one record from a million datasets can be even harder. Data has a tendency to sprawl. In today's information-hungry world, information is replicated and permutated in a myriad of ways in data marts, lakes, and warehouses. This proliferation can add massive volume ...
PEPR '24 - Cache-22: Doing Privacy Engineering with Privacy Standards
Просмотров 6814 дней назад
PEPR '24 - Cache-22: Doing Privacy Engineering with Privacy Standards Zachary Kilhoffer and Devyn Wilder, University of Illinois at Urbana-Champaign Data privacy stands as a pressing and critical concern for numerous organizations. The burgeoning field of privacy engineering has emerged to address this demand. Although there exists no universally agreed-upon definition of the roles or education...
PEPR '24 - Presto-Native Noisy Aggregations for Privacy-Preserving Workflows
Просмотров 2814 дней назад
PEPR '24 - Presto-Native Noisy Aggregations for Privacy-Preserving Workflows Kien Nguyen and Chen-Kuei Lee, Meta At Meta, large-scale data analysis happens constantly, across varied surfaces, platforms, and systems. Differential privacy (DP), because of its strong protection, is one of the privacy-enhancing technologies deployed by Meta to protect users' privacy. However, implementing DP in pra...
PEPR '24 - Empirical Privacy Metrics: The Bad, the Ugly… and the Good, Maybe?
Просмотров 10014 дней назад
PEPR '24 - Empirical Privacy Metrics: The Bad, the Ugly… and the Good, Maybe? Damien Desfontaines, Tumult Labs Synthetic data generation makes for a convincing pitch: create fake data that follows the same statistical distribution as your real data, so you can analyze it, share it, sell it… while claiming that this is all privacy-safe and compliant, because synthetic data is also "fully anonymo...
PEPR '24 - Compute Engine Testing with Synthetic Data Generation
Просмотров 2614 дней назад
PEPR '24 - Compute Engine Testing with Synthetic Data Generation Jiangnan Cheng and Eric Liu, Meta At Meta, we have developed a new testing framework that utilizes privacy-safe and production-like synthetic data to detect regressions in various compute engines, such as Presto, within the Meta Data Warehouse. In this talk, we will discuss the challenges and solutions we have implemented to opera...
PEPR '24 - "A Big Deal": How Privacy Engineering Can Streamline the M&A Process
Просмотров 5814 дней назад
PEPR '24 - "A Big Deal": How Privacy Engineering Can Streamline the M&A Process Shlomi Pasternak, Google The challenges of conducting privacy assessments of acquisitions are significant: tight timelines, competing priorities, and limited initial visibility. Yet, early proactive privacy assessments are critical to mitigate risks and streamline the integration process. Privacy Engineering's "Priv...
PEPR '24 - Governing Identity, Respectfully
Просмотров 1614 дней назад
PEPR '24 - Governing Identity, Respectfully Wendy Seltzer, Tucows User-centric or self-sovereign identity envisions a world in which individuals are at the center of their data and its uses. The challenge is getting all the other users of this data to agree! The challenge is more than the technical hurdles of incomplete or incompatible standards, but also the steeplechase of social, economic, a...
PEPR '24 - How We Can Save Anonymization
Просмотров 6314 дней назад
PEPR '24 - How We Can Save Anonymization Daniel Simmons-Marengo, Tumult Labs When we claim data is anonymous, we offer a simple promise to users: "This data cannot harm you. You don't need to worry about it." We've broken that promise again and again when datasets that we claimed were safe have been reidentified. There is now growing skepticism that anonymization is possible, and a belief that ...
Excellent talk lol, I didn't fall asleep
Say "go ahead" again
This is a very good talk, a perfect introductory beginning that ramps up to complex results presented in a palatable manner. Will learn from this on how to present ideas efficiently. Kudos to the speaker!
请问是否有中文版视频?
This is so fasinating. I've wanted to see which one PMA to use and couldn't decide. So thank you for the help.
😅 funny analogy Sis 🤟🏼Katie
i dont understand shait what this guy says
Is it really a tmu@ talk if he is not walking at a treadmill desk, though?
Can we use this to bypass kslar on ps5?
Part of the formal spec of the OS needs to be the actual Verilog or VHDL specification for the SOC - however, this needs to be extended to CXL at a data center scope with heterogenous arrays of processors
Very few commenters getting the point - (1) how to make a single security policy framework work across multiple components that speak different languages , (2) same for resource management and methods for different components to share resources without stomping on each other … and all beginning form a zero-trust context
thank you for this great work. interestring "The more ML model learns, the easier to be fooled", also we need to pay attention to this threat.
I just want to point out that today, 12 years later, IPv6 is still indeed optional 🤣
Interesting.
At 5:45, how do attackers know that x is a property and then tamper with it?
This is a great, and the concept of $ cost of decisions made in the game it's a great concept! I've tried the "Labtainers" created by this same author, team, and those are great for Cybersecurity hands-on practice
My two cents - if the research or work is done by a team of three, it's not a good practice for one person to give the entire presentation alone. Everyone should contribute.
Your formula for the area of a parallelogram is incorrect. It should be A = S*W*sin(angle)
no idea why my college decided to include this in our "Cloud computing" subject ??
At 25:23 how does the decapsulation happens on the L7 load balancer.
Bruh this vid had literally no comment 😂
Fork Oracle!
Hello, is your project code open source?
very nice.
9 years later, and the community is trying to phase out FFS for ZFS, without regard for the issues Dr Marshall McKusick talks about, with mirroring filesystems. I can't find tools for using any BSD filesystem in linux, except for ZFS. I can barely find meaningful resources on the subject; and any help I'm offered for my laptops and desktops and routers and external drives, amounts to "use ZFS" or "you don't want to use FFS, use ext4 or ZFS" or "UFS is bad, use ZFS", or "you need ext4 or better, ZFS" or "*ignores question about implimenting FFS* ZFS is really cool, you should try ZFS". And then, I'm instantly shunned.
Why am I getting this? Type: LA_NFCID1 (7), Value: 0x0E014790D2422E Type: LA_SEL_INFO, Value: 0x20 Type: LA_BIT_FRAME_SDD, Value: 0x44 Type: LA_PLATFORM_CONFIG, Value: 0x00 Type: LA_HIST_BY (3),
Very nice presentation.
Thanks Chip for explaining definitely going to read the paper.
Interesting project and results. nice!. Also take a look at rutabaga_gfx(fully supported in crosvm, and partial support in qemu). most recent versions support command serialization at the kernel api level(drm calls in linux). Basically they run a copy of the host gpu driver in the guest, and just submit the kernel calls to the host. this way, the user-space graphics stack is fully isolated from the host, and also has a reduction of api call numbers, and they use drm fences for synchronization. they also claim near native graphics performance on chromeos for their android compatibility layer. the feature is called "virtgpu drm native context"
Finally a good explanation
Great presentation @usenix
Very interesting work! Can you provide the CNN coding that was used for key extraction?
That's interesting
this is really interesting
really cool that the jobs can be run on spot instances across clouds
Genuinely better than most professional comedians
Brilliant.. as usual. I'd like to hire James Menckin to deliver the eulogy at my funeral, but I'm afraid he'll take my family on a road trip to save the planet from Rust.
1:00
1:00
This presentation is too technical and very monotonous. I would have preferred something more live than someone reading a scripts. Thank you for sharing...
A good short video on sampling
Content is wrong... plz update this video
I'd like to know how the probability values for each field are determined at the 10:06 mark in the video.
Cool!
This sounds like an incredibly fun project. Many questions remain to be answered, but I enjoyed the presentation.
Great Talk!
Mine all surfaces
Tools Nunn
Titt Titt y tutti tutti
Fantastic talk, thank you!