Player is loading...

Embed

Embed code

Transcriptions

Note: this content has been automatically generated.
00:00:03
your friends do goodness
00:00:08
exactly seventy five years ago to the day the largest story parisian ever
00:00:13
was launched organised predominantly with a lie to us and and u. k.
00:00:19
the deliberate sacrifice of thousands of soldiers many of which of the age of
00:00:25
four students was deemed necessary to get rid of and not just re she
00:00:31
based on page speech and i hate speech and figures
00:00:37
on the western side the victory of the lice led to the creation of need to end of the you
00:00:44
uh so this is brought unprocessed unprecedented or or peace and prosperity to your
00:00:51
and simple principles and to be in these organisations are the first is the root of flow
00:00:58
which makes one thirty talks fast with the and the respect of facts which makes the press that's
00:01:07
and this principle has proved to be affected in nineteen eighty nine the soviet bloc collapsed
00:01:15
and the bait and success of wasn't democracies lead a modern feed
00:01:20
also for argument that we might have reached the end of history
00:01:29
and then came twenty sixty
00:01:32
with the brakes vote and to us presidential elections
00:01:38
since they're the two counters behind the normandy landing the mangy features of not season ends
00:01:45
of it is and find themselves internally for just victims of homemade teach that to us
00:01:52
of the body size
00:01:54
ah i would recommend the well documented the report on the topic produced
00:01:58
by the i. c. u. the british authority in charge of information right it's
00:02:04
the next speaker done walk would address really top notch vote and after coming up from coastal
00:02:10
we'll discuss a complex relationship between m. l. and data protection
00:02:16
but the whole concert
00:02:20
some national agencies have developed very power for a cyber what it's
00:02:25
and they have lost control of some of that one example
00:02:29
being eternal bloom that was torn function is eight twenty some tuna
00:02:34
and posted all i it has been hoops event by
00:02:37
nation states in by cyber criminal suitably for ransom where
00:02:43
uh so this ah attack targets and back my trust microsoft systems
00:02:51
and variations of it include the famous wanna try and not it yeah
00:02:57
this afternoon or not yes i will show
00:03:01
how to find vulnerabilities in large pieces of software
00:03:08
that's i don't war and cyber crime or major threat the business of like a jackass i some of that
00:03:16
actually trying to find solutions and they have to france should know w.
00:03:20
three c. c. initially but microsoft uh with the score for digital geneva convention
00:03:29
this is all the products are on the public side some governments are trying to look
00:03:34
for for trust and security into cyberspace has been signed by major companies are just face
00:03:41
imagine for a local intel and microsoft by sixty six states
00:03:47
yet so i'll stays have preferred non signing it and i mentioned this lie
00:03:56
on the side switzerland is making some progress um i mean
00:04:01
burn a more often than not and i'm afraid that the federal
00:04:05
government is fully aware of the challenges and as i'm actually
00:04:08
it has been related last year set of measures would read that
00:04:14
all the uh has side as of next year's as of
00:04:18
arteries of next year hospitals we have to support electronic health records
00:04:23
they don't don't not be it but they were not not going to be allowed short short incentive to do it
00:04:30
this reach the federal parliament is discussing the graphical related to
00:04:34
the electronic identity you know building block for just don't trust
00:04:40
the level of involvement of the private sector is however he debated for both
00:04:45
of you to follow a swiss politics uh you know that two days ago
00:04:49
the coast say it is a tough one of the two chambers of the of the button approve the draft
00:04:54
the test it the texas tech is actually a now in the hands of the consign us you know the other child
00:05:01
with all likelihood the tax is going to be approved by parliament but is also high uh
00:05:08
probability that is going to be referendum organised against it so we'll see what happens
00:05:15
actually the affair wrist and as what was mentioned by already uh attach different respond to the
00:05:21
strangers into explore the really good fortune it is that's yeah we have allowed to see for duty
00:05:28
salted block off last numeric where red dress many technical topics would you ditch interest
00:05:34
uh are you choose last week or two they refer to some of them notably block change and smack contracts to
00:05:41
forty benefits of the financial and multiple projects you all of
00:05:45
this will find c. and of was of our twelve perhaps
00:05:51
um now the centre is active on many fronts donations yeah i'm not going to go
00:05:57
through all of them but so it promotes bilateral projects between battles and the different labs
00:06:04
uh it does also advocacy organise these events and a trainee
00:06:10
and well so that's o. about our that's a activities on that front
00:06:16
come back to this uh this they the program is uh what you already know it but let's say this
00:06:22
is a what is in front of us and uh
00:06:26
the next speaker is done one arc officer at rice university
00:06:30
that is on an outstanding researcher uh done has made a similar
00:06:35
contributions notably disagreed you what code
00:06:38
i'm smart phones also electronic voting systems
00:06:44
is johnny welcoming that's well how

Share this talk: 


Conference Program

Welcome address
Martin Vetterli, President of EPFL
6 June 2019 · 9:48 a.m.
Introduction
James Larus, Dean of IC School, EPFL
6 June 2019 · 9:58 a.m.
Introduction
Jean-Pierre Hubaux, IC Research Day co-chair
6 June 2019 · 10:07 a.m.
Adventures in electronic voting research
Dan Wallach, Professor at Rice University, Houston, USA
6 June 2019 · 10:14 a.m.
When foes are friends: adversarial examples as protective technologies
Carmela Troncoso, Assistant Professor at EPFL
6 June 2019 · 11:09 a.m.
Low-Latency Metadata Protection for Organizational Networks
Ludovic Barman, LCA1|DeDiS, EPFL
6 June 2019 · noon
Interactive comparison-based search, and who-is-th.at
Daniyar Chumbalov, INDY 1, EPFL
6 June 2019 · 12:06 p.m.
Decentralized, Secure and Verifiable Data Sharing
David Froelicher, LCA1|DeDiS, EPFL
6 June 2019 · 12:09 p.m.
Communication Efficient Decentralised Machine Learning
Anastasia Koloskova, MLO, EPFL
6 June 2019 · 12:11 p.m.
Detecting the Unexpected via Image Resynthesis
Krzysztof Lis, CVLab, EPFL
6 June 2019 · 12:14 p.m.
Sublinear Algorithms for Graph Processing
Aida Mousavifar, THL4, EPFL
6 June 2019 · 12:16 p.m.
Protecting the Metadata of Your Secret Messages
Kirill Nikitin, DEDIS, EPFL
6 June 2019 · 12:18 p.m.
Teaching a machine learning algorithm faster
Farnood Salehi, INDY 2, EPFL
6 June 2019 · 12:21 p.m.
Secure Microarchitectural Design
Atri Bhattacharyya, PARSA/HexHive, EPFL
6 June 2019 · 12:23 p.m.
Security testing hard to reach code
Mathias Payer, Assistant Professor at EPFL
6 June 2019 · 1:50 p.m.
Best Research Presentation Award Ceremony
Bryan Ford, Jean-Pierre Hubaux, Deirdre Rochat, EPFL
6 June 2019 · 3:54 p.m.