COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Security Group meeting presentations > Informal talk about Wassenaar and/or work at our lab
Informal talk about Wassenaar and/or work at our labAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact eireann.leverett. Are our USENIX WOOT “weird machines” papers from various years regulated arms under the Dec. 2013 Wassenaar Arrangement definitions? They certainly seem to fit the bill, along with fuzzers, instrumentation frameworks, and any tools that automate vulnerability and exploitability analysis. If implemented as written, these rules control the basic artifacts and methods of security research, and will drastically chill the current security scene. When “modifying a program’s standard execution path” becomes a matter of export control, 1990s “Crypto Wars” may seem like a walk in the park by comparison; academic research will hardly remain unaffected. This talk is part of the Computer Laboratory Security Group meeting presentations series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsEurocrisis Conference 14-15 June Beyond Profit Think Tank Chemistry Legal Histories beyond the State Andrew Marr and Jackie Ashley in Conversation with Sarah Smith (Scotland Editor, BBC) RCEAL occasional seminarsOther talksAdvanced NMR applications Cafe Synthetique: Synthetic Biology Industry Night Aspects of adaptive Galerkin FE for stochastic direct and inverse problems |