University of Cambridge > Talks.cam > Computer Laboratory Security Group meeting presentations > Informal talk about Wassenaar and/or work at our lab

Informal talk about Wassenaar and/or work at our lab

Add to your list(s) Download to your calendar using vCal

If you have a question about this talk, please contact eireann.leverett.

Are our USENIX WOOT “weird machines” papers from various years regulated arms under the Dec. 2013 Wassenaar Arrangement definitions? They certainly seem to fit the bill, along with fuzzers, instrumentation frameworks, and any tools that automate vulnerability and exploitability analysis. If implemented as written, these rules control the basic artifacts and methods of security research, and will drastically chill the current security scene. When “modifying a program’s standard execution path” becomes a matter of export control, 1990s “Crypto Wars” may seem like a walk in the park by comparison; academic research will hardly remain unaffected.

This talk is part of the Computer Laboratory Security Group meeting presentations series.

Tell a friend about this talk:

This talk is included in these lists:

Note that ex-directory lists are not shown.

 

© 2006-2024 Talks.cam, University of Cambridge. Contact Us | Help and Documentation | Privacy and Publicity