Trustworthy Machine Learning: Past, Present, and Future
For the fourth session of the Developing Secure Systems Summit Online Seminar Series, Somesh Jha talked about Trustworthy Machine Learning: Past, Present and Future.
De-Identifying Healthcare Data for Research
In order to meet HIPAA privacy guidelines for secondary use such as research and analytics, the healthcare data needs to be de-identified. HIPAA defines Protected Health Information (PHI) and proposes two methods for de-identifying data.…
Secret-Shared Shuffle
Web Security Panel
Charlie Reis (Google) on Improving Chrome’s Security Architecture Andreas Rossberg (Dfinity) on Security through Modularity in Web Assembly Ben Livshits (Imperial College and Brave) on Browser Privacy
Your Threat Model is Bad and You Should Feel Bad
This presentation will explain how to create bad threat models (just keep doing what you’re doing), why abstractions are the work of the devil (and a necessary evil), and what happens when processor flaws meet…