Player is loading...

Embed

Embed code

Transcriptions

Note: this content has been automatically generated.
00:00:02
almost everyone up to right now have a device connected to give us not just how private audio communications
00:00:12
we know it's very easy to eavesdrop on organisational networks such as e. p. f. l.'s
00:00:16
but also other organisations and companies and many entities conducive insiders outsiders and even my where
00:00:25
typically of course communications are encrypted but doesn't always suspicion
00:00:29
as you can see this example on the left you see patterns of the human voice doing this guy
00:00:34
cool and on the right you see the corresponding perfectly well encrypted between from the network which everybody can see
00:00:43
future correlation which is how to remove it is possible in
00:00:46
this example to cover english words and sentences from these encrypted communication
00:00:54
both techniques accord traffic analysis they enable to recover information but also to fingerprint and track users
00:01:00
and they also enable targeted attacks what is the see
00:01:04
you doing right now what is this doctor now discussed it
00:01:11
sources exist but they all have a common drawback which is to protect through they need to
00:01:15
route your traffic a few times over the internet naturally just introduces latency and makes them so
00:01:24
would be the social corporate fine it's a communication network tailored organisations and companies
00:01:31
it creates channels between the users and access point would probably protects against these traffic analysis attacks
00:01:38
but also we use and or construction call this nets in a new way to
00:01:42
avoid the drawback to just mention any in our case the traffic remain within the organisation
00:01:48
this allows us to achieve much lower latency and higher speed which is critical for the end use
00:01:54
companies is very brief presentation i want you to our website perfect but for more

Share this talk: 


Conference Program

Welcome address
Martin Vetterli, President of EPFL
6 June 2019 · 9:48 a.m.
Introduction
James Larus, Dean of IC School, EPFL
6 June 2019 · 9:58 a.m.
Introduction
Jean-Pierre Hubaux, IC Research Day co-chair
6 June 2019 · 10:07 a.m.
Adventures in electronic voting research
Dan Wallach, Professor at Rice University, Houston, USA
6 June 2019 · 10:14 a.m.
When foes are friends: adversarial examples as protective technologies
Carmela Troncoso, Assistant Professor at EPFL
6 June 2019 · 11:09 a.m.
Low-Latency Metadata Protection for Organizational Networks
Ludovic Barman, LCA1|DeDiS, EPFL
6 June 2019 · noon
Interactive comparison-based search, and who-is-th.at
Daniyar Chumbalov, INDY 1, EPFL
6 June 2019 · 12:06 p.m.
Decentralized, Secure and Verifiable Data Sharing
David Froelicher, LCA1|DeDiS, EPFL
6 June 2019 · 12:09 p.m.
Communication Efficient Decentralised Machine Learning
Anastasia Koloskova, MLO, EPFL
6 June 2019 · 12:11 p.m.
Detecting the Unexpected via Image Resynthesis
Krzysztof Lis, CVLab, EPFL
6 June 2019 · 12:14 p.m.
Sublinear Algorithms for Graph Processing
Aida Mousavifar, THL4, EPFL
6 June 2019 · 12:16 p.m.
Protecting the Metadata of Your Secret Messages
Kirill Nikitin, DEDIS, EPFL
6 June 2019 · 12:18 p.m.
Teaching a machine learning algorithm faster
Farnood Salehi, INDY 2, EPFL
6 June 2019 · 12:21 p.m.
Secure Microarchitectural Design
Atri Bhattacharyya, PARSA/HexHive, EPFL
6 June 2019 · 12:23 p.m.
Security testing hard to reach code
Mathias Payer, Assistant Professor at EPFL
6 June 2019 · 1:50 p.m.
Best Research Presentation Award Ceremony
Bryan Ford, Jean-Pierre Hubaux, Deirdre Rochat, EPFL
6 June 2019 · 3:54 p.m.