Theory Plus Practice in Computer Security: Radio Frequency Identification and Whitebox Fuzzing [1/4]

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=APRD00w7lao



Duration: 1:02:21
99 views
0


I will describe two areas in computer security that demonstrate the wide range of techniques, from both theory and practice, we need to make impact. First, I treat privacy and security in Radio Frequency Identification (RFID). RFID refers to a range of technologies where a small device with an antenna, or tag is attached to an item and can be queried later wirelessly by a reader. While proponents of RFID promise security and efficiency benefits, the technology also raises serious security concerns. I will describe my work on practical security analysis of RFID in library books and the United States e-passport deployments. These deployments in turn uncover a new theoretical problem, that of scalable




Other Videos By Microsoft Research


2016-09-08The Quest: Energy, Security, and the Remaking of the Modern World
2016-09-08How TodayΓÇÖs Entrepreneurs Use Continuous Innovation to Create Radically Successful Businesses
2016-09-08The Infinity Puzzle: Quantum Field Theory and the Hunt for an Orderly Universe
2016-09-08In the Plex: How Google Thinks, Works, and Shapes Our Lives
2016-09-08When Gadgets Betray Us: The Dark Side of our Infatuation with New Technologies
2016-09-08Modernist Cuisine: The Art and Science of Cooking
2016-09-08An Optimist's Tour of the Future: One Curious Man Sets Out to Answer What's
2016-09-08The Net Delusion: The Dark Side of Internet Freedom
2016-09-08A Rigorous Perspective on Liouville Quantum Gravity & KPZ
2016-09-08Computing class polynomials with the Chinese Remainder Theorem
2016-09-08Theory Plus Practice in Computer Security: Radio Frequency Identification and Whitebox Fuzzing [1/4]
2016-09-08Why the Rich Get Richer, Cheaters Get Caught and Your Neighbor Usually Looks Like You [1/2]
2016-09-08Embedded Memory in Nanometer Regime
2016-09-08Incentivizing Outsourced Computation
2016-09-08Random Sorting Networks
2016-09-08SOLAR REVOLUTION: THE ECONOMIC TRANSFORMATION OF THE GLOBAL ENERGY INDUSTRY
2016-09-08Are You Ready to Succeed? Unconventional Strategies to Achieving Mastery in Business and Life [1/2]
2016-09-08Counting independent sets up to the tree threshold
2016-09-08Randomly coloring planar graphs with fewer colors than the maximum degree
2016-09-07Drop Dead Healthy: One Man's Humble Quest for Bodily Perfection
2016-09-07Corner percolation and the square root of 17



Tags:
microsoft research