Player is loading...


Embed code


Note: this content has been automatically generated.
almost everyone up to right now have a device connected to give us not just how private audio communications
we know it's very easy to eavesdrop on organisational networks such as e. p. f. l.'s
but also other organisations and companies and many entities conducive insiders outsiders and even my where
typically of course communications are encrypted but doesn't always suspicion
as you can see this example on the left you see patterns of the human voice doing this guy
cool and on the right you see the corresponding perfectly well encrypted between from the network which everybody can see
future correlation which is how to remove it is possible in
this example to cover english words and sentences from these encrypted communication
both techniques accord traffic analysis they enable to recover information but also to fingerprint and track users
and they also enable targeted attacks what is the see
you doing right now what is this doctor now discussed it
sources exist but they all have a common drawback which is to protect through they need to
route your traffic a few times over the internet naturally just introduces latency and makes them so
would be the social corporate fine it's a communication network tailored organisations and companies
it creates channels between the users and access point would probably protects against these traffic analysis attacks
but also we use and or construction call this nets in a new way to
avoid the drawback to just mention any in our case the traffic remain within the organisation
this allows us to achieve much lower latency and higher speed which is critical for the end use
companies is very brief presentation i want you to our website perfect but for more

Share this talk: 

Conference Program

Welcome address
Martin Vetterli, President of EPFL
6 June 2019 · 9:48 a.m.
James Larus, Dean of IC School, EPFL
6 June 2019 · 9:58 a.m.
Jean-Pierre Hubaux, IC Research Day co-chair
6 June 2019 · 10:07 a.m.
Adventures in electronic voting research
Dan Wallach, Professor at Rice University, Houston, USA
6 June 2019 · 10:14 a.m.
When foes are friends: adversarial examples as protective technologies
Carmela Troncoso, Assistant Professor at EPFL
6 June 2019 · 11:09 a.m.
Low-Latency Metadata Protection for Organizational Networks
Ludovic Barman, LCA1|DeDiS, EPFL
6 June 2019 · noon
Interactive comparison-based search, and
Daniyar Chumbalov, INDY 1, EPFL
6 June 2019 · 12:06 p.m.
Decentralized, Secure and Verifiable Data Sharing
David Froelicher, LCA1|DeDiS, EPFL
6 June 2019 · 12:09 p.m.
Communication Efficient Decentralised Machine Learning
Anastasia Koloskova, MLO, EPFL
6 June 2019 · 12:11 p.m.
Detecting the Unexpected via Image Resynthesis
Krzysztof Lis, CVLab, EPFL
6 June 2019 · 12:14 p.m.
Sublinear Algorithms for Graph Processing
Aida Mousavifar, THL4, EPFL
6 June 2019 · 12:16 p.m.
Protecting the Metadata of Your Secret Messages
Kirill Nikitin, DEDIS, EPFL
6 June 2019 · 12:18 p.m.
Teaching a machine learning algorithm faster
Farnood Salehi, INDY 2, EPFL
6 June 2019 · 12:21 p.m.
Secure Microarchitectural Design
Atri Bhattacharyya, PARSA/HexHive, EPFL
6 June 2019 · 12:23 p.m.
Security testing hard to reach code
Mathias Payer, Assistant Professor at EPFL
6 June 2019 · 1:50 p.m.
Best Research Presentation Award Ceremony
Bryan Ford, Jean-Pierre Hubaux, Deirdre Rochat, EPFL
6 June 2019 · 3:54 p.m.