SlideShare une entreprise Scribd logo
1
•  Joint	work	with	
─ Freya	Gassmann,	University	of	Saarland,	Germany	
─ Robert	Landwirth,	FAU	of	Erlangen-Nuremberg,	Germany	
•  Acknowledgments	for	data	gathering	and	analysis		
─ Nadina	Hintz,	Andreas	Luder,	Anna	Girard,	Gaston	Pugliese	
2
•  Studied	math	(Russia)	&	computer	science	(Germany)	
•  PhD	in	computer	science	(2008),	Germany	
─ Access	control	protocols	for	wireless	sensor	networks	
•  Researcher	at	FAU,	Germany	
─ Friedrich-Alexander-Universität	Erlangen-Nürnberg	
•  Human	Factors	in	Security	&	Privacy	Group	
─ Group	leader	
3	
IntroducRon
Agenda	
•  Spear	phishing	studies	
─ Design	&	ethics	
─ Study	1	!	piTalls	&	lessons	learnt	
─ Study	2	!	recommendaRons	
•  Role	of	security	awareness	
•  Challenges	in	patching	human	vulnerabiliRes	
4
Technical	vs.	Human	VulnerabiliRes	
•  Technical	vulnerabiliRes	
─ Found	!	patch	/	redesign	/	accept	risk	
•  Human	vulnerabiliRes	
─ Know	how	to	exploit	
─ Do	we	know	how	to	patch?	
•  Is	security	awareness	THE	soluRon?	
5
Spear	Phishing	
•  Academic	research:	>	1000	papers	since	2004	
•  Phishing	as	a	service	(PhaaS)	
─ KnowBe4,	PhishMe,	Wombat	Security,	many	others	
─ PentesRng	the	humans	
6
What	don’t	we	know	yet?	
7
Research	QuesRons	
•  Email	vs.	Facebook	
─ Difference	in	clicking	rates?	
•  Reasons	for	clicking	and	not	clicking?	
─ Why	can	some	people	protect	themselves	beeer	than	their	peers?	
─ Would	knowing	this	provide	useful	informaRon	for	defenders?	
8
Study	Idea	
•  Simulated	aeack	
─ Send	spear	phishing	messages	with	a	link	
─ Senders:	non-exisRng	persons	
─ Recruit	university	students	for	parRcipaRng	in	the	study	
•  Email	/	Facebook	
•  Measure	clicking	behavior	
•  Ask	them	in	a	follow-up	survey	why	they	clicked	/	did	not	click	
9
Message	
Hey	<receiver’s	first	name>,	
	
here	are	the	pictures	from	the	last	week:		
hep://<IP	address>/photocloud/page.php?h=<USER	ID>		
	
Please	do	not	share	them	with	people	who	have	not		
been	there	:-)	
	
See	you	next	Rme!		
	
<firstname	of	the	sender>		
10	
access	
denied
Ethics:	Recruitment	
─ Don’t	experiment	with	people	without	their	consent!	
─ ParRcipants	recruited	for	a	survey	about	“online	behavior”	
•  Not	informed	beforehand	about	the	real	purpose	of	the	study	
─ IncenRve:	win	10x10	EUR	online	shopping	voucher	
─ Time:	August/September	2013	
11
Ethics:	ConnecRng	Behavior	with	Survey	
12	
send	message	
with	individual	link	
wait	Rll	“enough”	people	clicked	
send	survey	
with	individual	link	
Survey	should	be	anonymous	!	validity	of	the	answers
13	
send	message	
with	individual	link	
wait	3	weeks	 send	anonymous	survey	
ask:	clicked	or	not?	
Final	Design
Study	1:Clicked	
14	
0%	
50%	
100%	
email	 Facebook	
56%	
38%	
89/158	 90/240	
StaRsRcally	significant	difference
Study	1:	Survey	
Answered	survey:	85%	(339	out	of	398)	
15	
0%	
50%	
100%	
really	clicked	 reported	that	clicked	
68/339	179/398	
45%	
20%
Study	2:	Design	Changes	
16	
On	January	7th,	2014:	
Hey,	
the	New	Year	party	was	great!	here	are	the	pictures:		
hep://<IP	address>/photocloud/page.php?h=<USER	ID>		
	
send	message	
with	
individual	link	
if	clicked	!	wait	24h	 send	different	survey	links	
via	email	and	on	Facebook	
ask:	clicked	or	not?	if	did	not	click	!	wait	7	days
Study	2:	Clicked	
17	
0%	
50%	
100%	
email	 Facebook	
119/280	
194/975	
20%	
42.5%	
StaRsRcally	significant	difference
Addressing	by	Name	
Important	via	email,	but	not	on	Facebook?	
Disclaimer:	Study	1	≠	Study	2!!!	
!	Different	messages	
18	
0%	
50%	
100%	
Study	1:	email	 Study	2:	email	 Study	1:	Facebook	 Study	2:	Facebook	
20%	
42.5%	
56%	
38%	
StaRsRcally	significant	
Not	significant
Both	Studies:	
Factors	Not	StaRsRcally	Correlated	to	Clicking	
•  Gender	of	sender	
•  Gender	of	receiver	
•  Friend	request	on	Facebook	
•  Amount	of	informaRon	on	sender’s	Facebook	profile	
19
20
Study	1	vs.	Study	2:	Survey	Reliability	
21	
0%	
50%	
100%	
Study	1:	actually	
clicked	
Study	1:	reported	
that	clicked	
Study	2:	actually	
clicked	
Study	2:	reported	
that	clicked	
25%	
16%	
45%	
20%
Study	1	vs.	Study	2:	Survey	Reliability	
22	
0%	
50%	
100%	
Study	1:	actually	
clicked	
Study	1:	reported	
that	clicked	
Study	2:	actually	
clicked	
Study	2:	reported	
that	clicked	
25%	
16%	
45%	
20%
0%	
50%	
100%	
Email:	actually	
clicked	
Email:	reported	that	
clicked	
Facebook:	actually	
clicked	
Facebook:	reported	
that	clicked	
Study	2:	Email	vs.	Facebook	Survey	Reliability	
•  Email:	ok	
•  Facebook:	???	
23	
15.5%	
20%	
18%	
42.5%
Reasons	for	Clicking:	Results	
•  Curiosity:	34%	
24
“Curiosity”	
•  “I	was	curious”	
•  “I	wanted	to	see	what	is	there”	
•  “Out	of	interest”	
•  “I	wanted	to	find	out	more	about	the	pictures”	
•  “I	did	not	know	the	sender,	but	wanted	to	see	who	is	on	the	pictures”	
25
Reasons	for	Clicking:	Results	
(some	people	reported	mulRple	reasons)	
•  Curiosity:	34%	
•  Fits	my	New	Year	party:	27%	
•  InvesRgaRon:	17%	
•  Known	sender:	16%	
•  Trust	into	technical	context:	11%	
26
“Trust	Into	Technical	Context”	
•  “My	computer	blocks	access	if	there	is	a	virus	problem”	
•  “I	knew,	if	this	was	something	dangerous,	my	Kaspersky	would	protect	me”	
•  “I	use	Firefox	and	MacOS,	so	I’m	not	afraid	of	the	viruses”	
•  “I	used	Tor	Bundle”	
•  “AOer	I	googled,	photocloud	seemed	to	be	a	clean	website”	
•  “I	googled	the	email	address	[…]	I	found	nothing”	
•  “IP	came	from	the	university”	
•  “I	consider	the	webmail	of	the	university	to	be	safe”	
27
Reasons	for	Clicking:	Results	
(some	people	reported	mulRple	reasons)	
•  Curiosity:	34%	
•  Fits	my	New	Year	party:	27%	
•  InvesRgaRon:	17%	
•  Known	sender:	16%	
•  Trust	into	system:	11%	
•  Really	pictures	of	me?	7%	
28
Reasons	for	Non-Clicking	
(some	people	reported	mulRple	reasons)	
•  Unknown	sender:	51%	
•  Virus	/	Spam	/	Phishing	/	Scam	/	Fake:	44%	
•  Does	not	fit	my	New	Year	celebraRon:	36%	
•  Does	not	fit	my	way	of	life:	12%	
•  InvesRgaRon:	6%	
─ FB	profile:	2%	
29
Did	Not	Click	Because	Of	Privacy	(6%)	
•  “It	(the	message)	seemed	to	be	private”	
•  “I	though	the	message	was	genuine	and	wanted	protect	privacy”	
•  “It	said:	please	don’t	click	if	you	don’t	know	me”	
•  “The	message	was	not	for	me”	
•  “I	did	not	see	any	reason	to	look	up	private	pictures	of	a	stranger	who	
obviously	made	a	mistake”	
30
Factors	Not	StaRsRcally	Correlated	
with	Reported	Clicking	
•  IT	security	knowledge	(self-assessed)	
•  Knowledge	that	email	sender	can	be	spoofed	
•  Knowledge	that	links	can	be	dangerous	
31
Avtude	towards	ParRcipaRon	in	the	Study	
(-3=very	negaRve,	3=very	posiRve)	
32	
0	
10	
20	
30	
-3	 -2	 -1	 0	 1	 2	 3	
non-clickers	
clickers	
%	
%	
%	
%
Should	Such	Studies	be	Conducted	in	The	Future?	
33	
yes	
no	
not	sure	
2%	
85%	
13%
LimitaRons	
•  Study	1	≠	Study	2	
─ Only	tentaRve	comparisons	across	two	studies!	
•  Validity	of	the	reasons	
─ Cannot	look	into	people’s	heads	at	the	moment	of	clicking	
•  “reported	clickers”	≠	“real	clickers”	
34
Lesson	1:	TargeRng	
•  Curiosity	/	Interest	
─ 78%	knew	that	links	can	be	dangerous	
•  Context	
─ Known	sender	
•  82%	knew	that	sender	can	be	spoofed	
─ Plausibility:	situaRon	&	expectaRons	
•  Facebook:	do	people	noRce	that	they	clicked?	
35
Lesson	2:	Requirements	on	Users	
•  Be	suspicious:	
─ Even	if	you	know	the	sender	
─ Even	if	the	message	fits	your	current	situaRon	
─ Even	if	the	message	fits	your	work	and	life	pracRces	
•  Be	suspicious	of	everything!	
36
DecepRon	Mode	
37
Let	me	introduce…	
•  Highly	trained	special	agent	
•  A	lot	of	people	want	to	kill	him	
•  (Almost)	any	person	in	his	life	can	be	a	traitor	
•  Has	to	be	in	decepRon	mode	in	every	life	situaRon	
•  Does	his	job	excellently	
•  Does	not	exist	"	
38
Want	Your	Employees	Be	Aware	of	Spear	Phishing?	
•  Want	themto	be	in	James	Bond	mode	every	Rme	they	read	a	message?	
39	
•  Add	this	to	job	descripRons	
•  Make	sure	to	pay	them	adequately	
accounRng	
sales	
human	resources	 customer	support	
public	relaRons
Being	Security	Aware:	Personal	Adventures	
40
Personal	Example	1:	Curiosity	/	Interest	
(anonymized)	
41
From:	john.smith@turner.com	
To:	zinaida.benenson@fau.de	
Subject:	CNN	request	--	about	your	upcoming	Black	Hat	talk	
Zinaida,	
John	at	CNN	here.	I’m	the	news	network’s	cybersecurity	reporter.	Here’s	a	link	to	my	work,	in	case	
you’re	not	familiar	with	it.	
I	saw	the	descripRon	of	your	upcoming	Black	Hat	talk.	Your	topic	looks	fantasRc!	
Can	we	get	an	exclusive	look	at	your	research	and	write	the	first	news	story	about	it?	
Cheers,	
John	Smith	
john.smith@CNN.com	
	 42
Personal	Example	2:	Context	
(anonymized)	
43
From:	Journal	of	Experiments	(EXPE)	exp@editorial-expe.com	
To:	zinaida.benenson@fau.de	
Subject:	InvitaRon	to	Peer	Review	EXPE-M-35-00737	
Dear	Dr.	Benenson,	In	view	of	your	experRse	[…]	
[…]	
If	you	would	like	to	review	this	paper,	please	click	this	link:		
hep://expe.editorial-expe.com/l.asp?i=35189&l=GKXKMQK	
If	you	do	not	wish	to	review	this	paper,	please	click	this	link:		
hep://expe.editorial-expe.com/l.asp?i=87665&l=6HN7KK	
Best	regards,	
Editor	
<name	I’ve	never	heard	of>	 44
From:	Journal	of	Experiments	(EXPE)	exp@editorial-expe.com	
To:	zinaida.benenson@fau.de	
Subject:	InvitaRon	to	Peer	Review	EXPE-M-35-00737	
Dear	Dr.	Benenson,	In	view	of	your	experRse	[…]	
[…]	
If	you	would	like	to	review	this	paper,	please	click	this	link:		
hep://expe.editorial-expe.com/l.asp?i=35189&l=GKXKMQ	
If	you	do	not	wish	to	review	this	paper,	please	click	this	link:		
hep://expe.editorial-expe.com/l.asp?i=87665&l=6HN7KK	
Best	regards,	
Editor	
<name	I’ve	never	heard	of>	
	 45
First	Click,	Then	NoRce:	Messages	to	Helpdesk	
D.	Caputo	et	al.	"Going	spear	phishing:	Exploring	embedded	training	and	awareness.“	
IEEE	Security	&	Privacy	Magazine,	2014	
•  “I	clicked	on	it	inadvertently	without	thinking	and	exited	Explorer	without	
reading	the	link.”	
•  “I	just	opened	this.	Then	followed	link	like	an	idiot.	Then	killed	the	process	
using	Task	Manager.	Please	advise	as	what	to	do.”	
•  “I	can’t	believe	I	actually	clicked	on	the	link!	Let	me	know	if	there’s	
something	I	need	to	do	to	ensure	my	laptop	isn’t	infected,	or	if	this	is	just	a	
prank.”	
	 46
Personal	Example	3:	An	Aeachment	
(anonymized)	
47
From:	setup@company-I’m-dealing-with.com	
To:	zinaid.benenson@fau.de	
	
Subject:	Message	ID:23519-0297:FRT-92362.	Workitem	Number:	
CMPVDM24062016157789020297	
		
	
Aeachment:	aeach/15072016/29375.docx	
48
Hi,	Please	see	request	details	below.	Please	provide	the	required	informaRon	
by	replying	to	this	email.		
Query	Reason:	Banking	details	
Workitem	Number:	CMPVDM24062016157789020297	
Created	Date:	15-Jul-2016		
Name:	Zinaida	Benenson		
Comments:	Dear	Sir/Madam	In	order	for	us	to	complete	the	set	up	of	your	account	within	
our	system,	we	need	your	bank	account	details	to	which	seelement	of	your	invoices	
should	be	made.	Please	complete	the	aeached	form	in	full	and	return	to	us,	ensuring	it	has	
been	signed	by	an	authorized	signatory.		
49
Lesson	3:	PentesRng	&	Patching	Humans	
•  What	are	the	reasons	for	ineffecRveness	of	an	awareness	training?	
─  Curiosity	/	interest	!	natural	&	creaRve	human	traits	
─  “This	message	fits	my	current	situaRon”	/	“I	know	the	sender”	!	useful	decisional	heurisRcs	
•  What	price	users	pay	for	an	effecRve	awareness	training?	
─  James	Bond	mode	
─  False	posiRves?	Work	slowdown?	
─  Breakdown	of	social	relaRonships?	Atmosphere	of	distrust?	
─  Embarrassment?	Shame?	Anger?	
50
Feasible	User	Involvement?	
•  Report	suspicious	messages?	
─ Be	prepared	to	get	“amateur	security”!		
(Bruce	Schneier	about	“If	you	see	something,	say	something”)	
•  Reliable	indicators	for	switching	into	“James	Bond	mode”	
─ False	posiRves	destroy	trust	into	the	indicator		
─ Digitally	sign	messages	
•  Non-experts	misinterpret	meaning	/	don’t	noRce	
•  Can	be	social	engineered	into	accepRng	an	invalid	signature	
•  Stop	sending	“phishy”	legiRmate	messages	
•  Expect	mistakes	 51
Key	Takeaways	
•  Spear	phishing:	what	defense	is	feasible	and	beneficial	for	humans?	
─  People	won’t	and	can’t	abstain	from	decisional	heurisRcs	
─  Don’t	require	permanent	James	Bond	mode	
•  PentesRng	and	patching	humans	is	tricky	
─  What	do	you	want	people	to	do?	
─  Think	about	consequences	for	people	&	for	company	
─  Always	ask	consent	
•  Talk	to	the	users	
─  Automated	observaRon	and	measurement	are	not	enough	
─  Ask	directly	about	their	experiences,	opinions,	work	pracRces	
52
Thank	you!	QuesRons?	
	
Please	complete	the	Speaker	Feedback	Surveys	
Zinaida	Benenson	
zinaida.benenson@fau.de	
53	
Research	&	evidence	needed!	
If	your	company	is	interested,	please	talk	to	me

Contenu connexe

Similaire à Exploiting Curiosity and Context

Ethics and Privacy in the Application of Learning Analytics (#EP4LA)
Ethics and Privacy in the Application of Learning Analytics (#EP4LA)Ethics and Privacy in the Application of Learning Analytics (#EP4LA)
Ethics and Privacy in the Application of Learning Analytics (#EP4LA)
Hendrik Drachsler
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
BAINIDA
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
cavapyta
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
cavapyta
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
BAINIDA
 
Cybercrime: Understanding the Offender, Victim and Managers
Cybercrime: Understanding the Offender, Victim and ManagersCybercrime: Understanding the Offender, Victim and Managers
Cybercrime: Understanding the Offender, Victim and Managers
Michigan State University Research
 
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
Matthew Rosenquist
 
My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015
Anwar F.A. Dafa-Alla
 
Ou leverhulme gt
Ou leverhulme gtOu leverhulme gt
Ou leverhulme gt
Anne Adams
 

Similaire à Exploiting Curiosity and Context (9)

Ethics and Privacy in the Application of Learning Analytics (#EP4LA)
Ethics and Privacy in the Application of Learning Analytics (#EP4LA)Ethics and Privacy in the Application of Learning Analytics (#EP4LA)
Ethics and Privacy in the Application of Learning Analytics (#EP4LA)
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
Cybercrime: Understanding the Offender, Victim and Managers
Cybercrime: Understanding the Offender, Victim and ManagersCybercrime: Understanding the Offender, Victim and Managers
Cybercrime: Understanding the Offender, Victim and Managers
 
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
 
My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015
 
Ou leverhulme gt
Ou leverhulme gtOu leverhulme gt
Ou leverhulme gt
 

Plus de mark-smith

How Your DRAM Becomes a Security Problem
How Your DRAM Becomes a Security ProblemHow Your DRAM Becomes a Security Problem
How Your DRAM Becomes a Security Problem
mark-smith
 
Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox
Remotely Compromising iOS via Wi-Fi and Escaping the SandboxRemotely Compromising iOS via Wi-Fi and Escaping the Sandbox
Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox
mark-smith
 
Applied Machine Learning for Data exfil and other fun topics
Applied Machine Learning for Data exfil and other fun topicsApplied Machine Learning for Data exfil and other fun topics
Applied Machine Learning for Data exfil and other fun topics
mark-smith
 
JailBreak DIY- Fried Apple
JailBreak DIY- Fried AppleJailBreak DIY- Fried Apple
JailBreak DIY- Fried Apple
mark-smith
 
The linux kernel hidden inside windows 10
The linux kernel hidden inside windows 10The linux kernel hidden inside windows 10
The linux kernel hidden inside windows 10
mark-smith
 
Greed for Fame Benefits Large Scale Botnets
Greed for Fame Benefits Large Scale BotnetsGreed for Fame Benefits Large Scale Botnets
Greed for Fame Benefits Large Scale Botnets
mark-smith
 
How your smartphone cpu breaks software level security and privacy
How your smartphone cpu breaks software level security and privacyHow your smartphone cpu breaks software level security and privacy
How your smartphone cpu breaks software level security and privacy
mark-smith
 
Attacking Network Infrastructure to Generate a 4 Tbs DDoS
Attacking Network Infrastructure to Generate a 4 Tbs DDoSAttacking Network Infrastructure to Generate a 4 Tbs DDoS
Attacking Network Infrastructure to Generate a 4 Tbs DDoS
mark-smith
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
mark-smith
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
mark-smith
 

Plus de mark-smith (10)

How Your DRAM Becomes a Security Problem
How Your DRAM Becomes a Security ProblemHow Your DRAM Becomes a Security Problem
How Your DRAM Becomes a Security Problem
 
Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox
Remotely Compromising iOS via Wi-Fi and Escaping the SandboxRemotely Compromising iOS via Wi-Fi and Escaping the Sandbox
Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox
 
Applied Machine Learning for Data exfil and other fun topics
Applied Machine Learning for Data exfil and other fun topicsApplied Machine Learning for Data exfil and other fun topics
Applied Machine Learning for Data exfil and other fun topics
 
JailBreak DIY- Fried Apple
JailBreak DIY- Fried AppleJailBreak DIY- Fried Apple
JailBreak DIY- Fried Apple
 
The linux kernel hidden inside windows 10
The linux kernel hidden inside windows 10The linux kernel hidden inside windows 10
The linux kernel hidden inside windows 10
 
Greed for Fame Benefits Large Scale Botnets
Greed for Fame Benefits Large Scale BotnetsGreed for Fame Benefits Large Scale Botnets
Greed for Fame Benefits Large Scale Botnets
 
How your smartphone cpu breaks software level security and privacy
How your smartphone cpu breaks software level security and privacyHow your smartphone cpu breaks software level security and privacy
How your smartphone cpu breaks software level security and privacy
 
Attacking Network Infrastructure to Generate a 4 Tbs DDoS
Attacking Network Infrastructure to Generate a 4 Tbs DDoSAttacking Network Infrastructure to Generate a 4 Tbs DDoS
Attacking Network Infrastructure to Generate a 4 Tbs DDoS
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
 

Dernier

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 

Dernier (20)

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 

Exploiting Curiosity and Context