Ch. Bertrand V-o (@chbertrandvo) 's Twitter Profile
Ch. Bertrand V-o

@chbertrandvo

PostDoc @UCLouvain_be cybersecurity and machine learning 🤖 CTF player

ID: 2596644169

calendar_today30-06-2014 16:51:14

42 Tweet

34 Followers

250 Following

Fabio (@degrigis) 's Twitter Profile Photo

In other news, I've recently put together a big state of the art regarding symbolic execution techniques used in system research. Check out the slides here! 1/2 docs.google.com/presentation/d…

Lê Nguyên Hoang bsky.app/profile/science4all.org (@le_science4all) 's Twitter Profile Photo

La montée du nationalisme, de l'autoritarisme et de la haine ne semble pas être un accident circonstanciel limité à un pays. Selon les rapports Varieties of Democracy Institute auquel 3000+ chercheurs contribuent, il s'agit d'une tendance alarmante à l'échelle planétaire. v-dem.net/democracy_repo…

La montée du nationalisme, de l'autoritarisme et de la haine ne semble pas être un accident circonstanciel limité à un pays.

Selon les rapports <a href="/vdeminstitute/">Varieties of Democracy Institute</a> auquel 3000+ chercheurs contribuent, il s'agit d'une tendance alarmante à l'échelle planétaire.
v-dem.net/democracy_repo…
Christoph Molnar 🦋 christophmolnar.bsky.social (@christophmolnar) 's Twitter Profile Photo

In a perfect world, you could effortlessly switch between modeling mindsets (statistics, machine learning, causal inference, ...). Realistically, you only have time to master a few mindsets. So what to do? A thread 🧵

Christoph Molnar 🦋 christophmolnar.bsky.social (@christophmolnar) 's Twitter Profile Photo

Machine learning sucks at uncertainty quantification. But there is a solution that almost sounds too good to be true: conformal prediction • works for any black box model • requires few lines of code • is fast • comes with statistical guarantees A thread 🧵

Alex D (@alex_dhondt) 's Twitter Profile Photo

Awesome Executable Packing - A curated list of resources related to the packing of various executable formats and its detection. github.com/dhondta/awesom… #awesomelists #malware #malwareresearch #executablepacking #cybersecurity #infosec

Thorsten Holz (@thorstenholz) 's Twitter Profile Photo

Systems for automatic paper-reviewer assignments (e.g., TPMS - mila.quebec/en/publication…) are used during the reviewing process of conferences such as ICML Conference. In arxiv.org/abs/2303.14443, we explore how authors might try to game these systems. We propose an attack that adapts...

Systems for automatic paper-reviewer assignments (e.g., TPMS - mila.quebec/en/publication…) are used during the reviewing process of conferences such as <a href="/icmlconf/">ICML Conference</a>. In arxiv.org/abs/2303.14443, we explore how authors might try to game these systems. We propose an attack that adapts...
Soledad Galli (@soledad_galli) 's Twitter Profile Photo

6️⃣ Python libraries to help you interpret machine learning models. How many of them are you using already? Read on and find out 👇 🧵

Guillaume Cabanac ⟨here and elsewhere⟩ (@gcabanac) 's Twitter Profile Photo

🤖 oopsie in a 2023 Elsevier journal paper: “Please note that as an AI language model, I am unable to generate specific tables or conduct tests, so the actual results should be included in the table.” 🤡 #ChatGPT

🤖 oopsie in a 2023 <a href="/ElsevierConnect/">Elsevier</a> journal paper: “Please note that as an AI language model, I am unable to generate specific tables or conduct tests, so the actual results should be included in the table.” 🤡 #ChatGPT
Konrad Rieck 🌈 (@mlsec) 's Twitter Profile Photo

Get rid of bad reviewers? 🤔 Today, Thorsten Eisenhofer presents our work USENIX Security on misleading the automatic assignment of reviewers at large conferences (e.g. #CVPR or #NeurIPS). Our attack generates adversarial papers that select their own reviewers. BIFOLD CASA - Cluster of Excellence for Cyber Security 1/5

Cameron Jones (@camrobjones) 's Twitter Profile Photo

Can you tell the difference between a human and an AI? Really excited to share turingtest.live, a site where you can play the Turing Test with GPT-4. You get randomly matched with either a human or an AI, and you have 5 minutes to decide which it is.

Max 'Libra' Kersten (@libranalysis) 's Twitter Profile Photo

The most recent Ghidra update by NSA Cyber allows one to use fuzzy function recognition. The documentation along with it is of great use: github.com/NationalSecuri…

Christoph Molnar 🦋 christophmolnar.bsky.social (@christophmolnar) 's Twitter Profile Photo

Happy to publish our book project “Supervised Machine Learning for Science” today 🥳 Read it for free here: ml-science-book.com The book is about the philosophical and pragmatic justification for using supervised machine learning in science.

Marcel Böhme👨‍🔬 (@mboehme_) 's Twitter Profile Photo

What kind of guarantees can our tooling & processes really provide about the security of our software systems? Here are 9 *fundamental* challenges that are routinely exploited to attack a system despite credible assurances about its security. Preprint: arxiv.org/abs/2402.01944

What kind of guarantees can our tooling &amp; processes really provide about the security of our software systems?

Here are 9 *fundamental* challenges that are routinely exploited to attack a system despite credible assurances about its security.

Preprint: arxiv.org/abs/2402.01944
Flipper Zero (@flipper_zero) 's Twitter Profile Photo

Btw, you don't need a Flipper Zero to "hack" dumb radio protocols. The piece of wire is enough. Check out how to receive and decode 433MHz radio signal just with a PC sound card.

Alex D (@alex_dhondt) 's Twitter Profile Photo

Awesome Drone Hacking - A curated list of resources related to drone hacking. github.com/dronesploit/aw… #awesomelists #drone #hacking #cybersecurity #infosec