Original topic:

Samsung shares latest security technologies

(Topic created on: 08-29-2022 02:21 AM)
Expert Level 5
Tech Talk


The event was organized under the theme “Trust with Samsung: Across All Your Experience”. In this event, the company shares Samsung’s latest security technologies.

It is a place where academics and industry officials participate to share the latest technologies and trends in the security technology field of Samsung.

In order to expand the information security technology base and develop talent, the “Samsung Security Technology Forum” event is organized by Samsung Electronics every year since 2017.

About 6th Samsung Security Tech Forum:

Firstly, the President of Samsung Research Lab Seung Hyun Joon welcomed everyone by saying, “Samsung Electronics always puts the highest priority on customer security and personal information protection. We are building a foundation of trust for our products.”

After that, he said that build a secure foundation with a hardware root of trust, and use automated tools and techniques to eliminate security vulnerabilities and create a seamless and seamless integration into various Internet of Things (IoT) devices to provide a secure user experience.

Hwang Yong-ho, head of Samsung’s research security and privacy team, delivered a keynote speech, introducing Samsung Electronics’ efforts to protect users’ personal information based on powerful security technologies, and highlighting the security and safety of Samsung Electronics’ website.

Georgia Institute of Technology Prof. Daniel Jenkin introduced speculative execution attacks such as Specter and Meltdown and web browser-based side-channel attacks. Side Channel Attack method in computer security is based on physical acquisition process information, such as timing information, power consumption, emitted electromagnetic waves, etc., rather than the design flaws of a protocol or algorithm in computer security.

Georgetown University’s Prof. Mutu Benakita Subramaniam described secure multi-party computation and zero-knowledge proofs related to Blockchain. Zero-knowledge proof means the other party verifier that knows the information without revealing the secret information that only he has.

Wei Dong, Trend Manager at Microsoft Research Institute, shared program analysis techniques and used Intel Processor Trace to find bugs in system code.

Professor Jihoon Kang of the Korea Academy of Science and Technology formally verified the core kernel of the operating system. He gave lectures on the problems and research materials that emerged in research.

Formal Verification is a technique that uses rigorous mathematical techniques to prove or disprove the correctness of an expected algorithm by checking whether a written program performs the desired function and necessarily terminates.
1 Comment
Beginner Level 2
Tech Talk
Waiting for it