As promised, Samsung held the 6th Samsung Security Tech Forum (SSTF) online on 23 August. The event was organized under the theme “Trust with Samsung: Across All Your Experience”. In this event, the company shares Samsung’s latest security technology.
It is a place where academics and industry executives participate to share the latest technologies and trends in Samsung’s security technology space.
Stay tuned via SFCNation Telegram
In order to expand the information security technology base and develop talent, the “Samsung Security Technology Forum” event is organized by Samsung Electronics every year since 2017.
About 6th Samsung Security Tech Forum:
First, Seung Hyun Joon, President of Samsung Research Lab, welcomed everyone by saying, “Samsung Electronics has always made customer safety and personal information security the top priority. We are building a foundation of trust for our products.”
After that, he said, build a secure foundation with a hardware root of trust, and use automated tools and techniques to eliminate security vulnerabilities and various Internet of Things (IoT) technologies to provide a secure user experience. ) Create a smooth and seamless integration across devices.
Hwang Yong-ho, head of Samsung’s research security and privacy team, delivered a keynote speech, introducing Samsung Electronics’ efforts to protect users’ personal information based on powerful security technologies, and the security and safety of Samsung Electronics’ website. Emphasis on safety.
Georgia Institute of Technology Prof. Daniel Jenkin introduced speculative execution attacks such as Specter and Meltdown and web browser-based side-channel attacks. The side channel attack method in computer security is based on information from the physical acquisition process, such as timing information, power consumption, emitted electromagnetic waves, etc., rather than the design flaws of a protocol or algorithm in computer security.
Georgetown University professor Mutu Benakita Subramaniam described secure multi-party computation and blockchain-related zero-knowledge proofs. Zero-knowledge proof means the other party’s verifier knows the information without revealing the secret information that only he has.
Wei Dong, Trend Manager at Microsoft Research Institute, shared program analysis techniques and used Intel Processor Trace to find bugs in system code.
Professor Jihoon Kang of the Korea Academy of Science and Technology formally verified the core kernel of the operating system. He gave lectures on the problems and research materials that emerged in research.
Formal verification is a technique that uses rigorous mathematical techniques to prove or disprove the correctness of an expected algorithm by checking whether a written program performs the desired function and necessarily ends.
( Source )
Leave a Reply