SlideShare a Scribd company logo
‫ػ‬ցֶशΛྑ͘࢖͏ʹ͸
2021.01.31
)JSPNV:BLVSB
ਂ۷ΓηογϣϯWPM
w ॴଐஜ೾େֶത࢜લ‫ظ‬՝ఔ೥
w /8(PPHMF1I%'FMMPXTIJQ
w ࠷ۙͷझຯ޿ࣙԓͰ༡Ϳ
w ͨ΄͍΍‫ݟ‬ग़͠‫ޠ‬ͷِͷҙຯΛߟ͑ͯὃ͠߹͏ήʔϜ
w ʲ͜Γ͓ΒΜʳ
ϥϯՊ২෺ͷҰͭɻ౦ೆΞδΞʹ෼෍ɻ
ϕʔτʔϕϯͷ؅‫ۂָݭ‬ɻϑϥϯεͷఱจֶऀ
Ֆ༄քͰɺͳ͔ͳ͔‫ؼ‬Βͳ͍٬Λࢦ͢‫ޠ‬ɻ
ઘ‫ڸ‬ՖʹΑΔখઆɻେਖ਼೥͔Βʰଠཅʱʹ࿈ࡌɻ
w ୯७ʹؒͷ‫ݟ‬ग़͠‫ޠ‬Λ౰ͯΔΫΠζͳͲ΋ָ͍͠
w ᅏ޿᳴ʢϋγϏϩί΢ʣˠʓʓʓˠṟାʢ͸͠Ϳ͘Ζʣ
ࣗ‫঺ݾ‬հ
!IJSPNV
w தֶʹೖͬͨͱ͖ʹϓϩάϥϛϯάΛ࢝ΊΔ
w ౰ॳ͸ɺ‫ٕڝ‬ϓϩάϥϛϯά΍-JOVYΧʔωϧͳͲʹ৮ΕΔɹ
w ‫ٕڝ‬ϓϩάϥϛϯάֶशࢧԉͷγεςϜ։ൃͰ
தͷͱ͖ʹࠃͷະ౿ϓϩδΣΫτʹ࠾୒
w ߴߍͷؒ͸ηΩϡϦςΟʹͲͬ΀Γ
w $5'ͱ‫ݺ‬͹ΕΔίϯςετʹࢀՃͨ͠Γ
w OESPJEͷηΩϡϦςΟΛ৮͍ͬͯΔ͏ͪʹ
ւ֎ͷٕज़ຊͷ‫؂‬मΛ͢Δ͜ͱʹͳͬͨΓ
w େֶೖֶ͔Β‫ػ‬ցֶशͱώτͷؔΘΔྖҬͷ‫΁ڀݚ‬
ུྺ
%'$0/$5'
‫ػ‬ցֶशΛྑ͘࢖͏ʹ͸
2021.01.31
)JSPNV:BLVSB
ਂ۷ΓηογϣϯWPM
‫ػ‬ցֶशΛѱ͘࢖͏ʹ͸
2021.01.31
)JSPNV:BLVSB
ਂ۷ΓηογϣϯWPM
Robust Audio Adversarial
Example for a Physical Attack
Hiromu Yakura*†, Jun Sakuma*†
* University of Tsukuba, Japan
† RIKEN Center for Artificial Intelligence Project, Japan
IJCAI 2020
എ‫ܠ‬EWFSTBSJBMYBNQMFʹΑΔ‫ػ‬ցֶश΁ͷ߈ܸ
I. J. Goodfellow, et al. Explaining and harnessing adversarial examples. ICLR 2015.
͜͏͍ͬͨEWFSTBSJBMYBNQMFʹΑͬͯɺ
ਓؒʹ‫͔ͮؾ‬Εͣʹ*Λ༻͍ͨγεςϜΛѱ༻Ͱ͖Δ
w σʔλʹҙਤతʹখ͞ͳϊΠζΛՃ͑Δ͜ͱͰɺ
‫ػ‬ցֶशγεςϜΛؒҧΘͤΔ͜ͱ͕Ͱ͖Δ
w Լ‫ه‬ͷྫͰ͸ɺը૾෼ྨγεςϜʹύϯμͷσʔλΛ
ςφΨβϧͱೝࣝͤ͞Δ͜ͱ͕Ͱ͖Δ(PPEGFMMPX
എ‫ܠ‬VEJPEWFSTBSJBMYBNQMFʹΑΔ߈ܸՄೳੑ
N. Carlini, et al. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. IEEE DLS 2018.
w 4JSJͳͲͷԻ੠Ξγελϯτ΍
(PPHMF)PNFͳͲͷεϚʔτεϐʔΧ͕ී‫ٴ‬
w EWFSTBSJBMYBNQMFʹΑͬͯɺώτʹ‫͔ͮؾ‬ΕΔ͜ͱͳ͘
Ի੠ೝࣝσόΠεʹ໋ྩͰ͖ΔՄೳੑ΋͋Δ
w ը૾ͷ৔߹ͱҟͳΓɺςϨϏ΍ϥδΦͰ֦ࢄ͢Ε͹
େྔͷσόΠεΛಉ࣌ʹ߈ܸ͢Δ͜ͱ͕Ͱ͖Δ

Ի੠ೝࣝϞσϧ͸ը૾ೝࣝΑΓ΋ෳࡶͳͨΊ
ϊΠζͷӨ‫ڹ‬΋͋Δ࣮ੈքͰͷ߈ܸ͸೉͍͠$BSMJOJ
w ໊Λର৅ʹͨ͠ௌऔ࣮‫ݧ‬Λ࣮ࢪ͕ͨ͠ɺ
‫·ؚ‬Ε͍ͯΔ໋ྩʹ‫͚ͨͮؾ‬ਓ͸୭΋͍ͳ͔ͬͨ
w ߈ܸʹࡍͯ͠͸੍͍͔ͭ͘‫ݶ‬͸͋Δ΋ͷͷ
࣮ੈքͰͷ‫ڴ‬ҖͱͳΓ͏ΔՄೳੑ͕࣮ূ͞Εͨ

ఏҊ࣮ੈքͰ΋߈ܸՄೳͳVEJPEWFSTBSJBMYBNQMF
ϊΠζΛϞσϧԽ͢Δ͜ͱͰ࣮ੈքͰ࠶ੜͯ͠΋
߈ܸͰ͖ΔVEJPEWFSTBSJBMYBNQMFΛ࣮‫ݱ‬
Ճ޻͞Ε͍ͯͳ͍
Ի੠
IFMMPXPSMEͱ
ೝࣝ͞ΕΔԻ੠
PQFOUIFEPPSͱ
ೝࣝ͞ΕΔԻ੠
Generate (non-software) Bugs
to Fool Classifiers
Hiromu Yakura*†, Youhei Akimoto*†, Jun Sakuma*†
* University of Tsukuba, Japan
† RIKEN Center for Artificial Intelligence Project, Japan
AAAI 2020
ఏҊώτʹո͠·Εͳ͍ࣗಈӡసं΁ͷ߈ܸ
S. Chen, et al. Shapeshifter: Robust physical adversarial attack on faster RCNN object detector. ECML PKDD 2018.
w EWFSTBSJBMYBNQMF͸ࣗಈӡసं΁ͷ߈ܸͷϦεΫ΋͋Δ
w ʮࢭ·ΕʯΛʮ଎౓ʯͱ‫ޡ‬ೝࣝͤ͞Ε͹๫૸͢Δ͔΋
w Ͱ΋ࠨͷྫͷΑ͏ͳ໛༷ͩͱ͕͢͞ʹਓؒ΋‫ͮ͘ؾ‬

[Chen+, '18]
Proposed
w ಛʹɺӡసதʹ‫ͨ͑ݟ‬ಓ࿏ඪࣝʹի͕ࢭ·͍ͬͯͯ΋
ଟ͘ͷਓ͸͋΍͍͠ͱ͸ࢥΘͳ͍͸ͣ
իͷΑ͏ͳεςοΧʔͰ‫ػ‬ցֶशϞσϧΛὃ͢͜ͱͰ
ώτʹҧ࿨‫ײ‬Λ࣋ͨͤͣʹѱ༻Ͱ͖ΔՄೳੑΛࣔͨ͠
ఏҊௗͷ͑ͣ͞ΓͰԻ੠ೝࣝσόΠεΛὃ͢

w ಉ༷ʹɺௗͷ͑ͣ͞ΓΛ࢖ͬͯɺ
ώτʹҧ࿨‫ײ‬Λ࣋ͨͤͣʹԻ੠ೝࣝγεςϜΛὃͤΔ




w ͜͏ͯؒ͠ҧ͑ͯ͠·ͬͨྫΛ࢖ֶͬͯश͠ͳ͓͢͜ͱͰ
͋Δఔ౓͸๷͛Δ͕ɺࠜຊతͳରࡦ͸೉͍͠4IBGBIJ
YES +
STOP
YES
ؒҧ͑Δ͜ͱΛલఏʹͨ͠ώτͱ‫ػ‬ցֶशͱͷؔ܎࡞Γ͕ඞཁ
A. Shafahi, et al.: Are adversarial examples inevitable?. ICLR 2019.
‫ػ‬ցֶशΛྑ͘࢖͏ʹ͸
2021.01.31
)JSPNV:BLVSB
ਂ۷ΓηογϣϯWPM
‫ج‬ຊతͳΞΠσΞ
ͲΕ͚ͩਫ਼౓޲্͕ਐΜͰ΋ɺ‫ػ‬ցֶशγεςϜ͸ؒҧ͑Δ
w େྔͷσʔλ͔Β܏޲Λ‫ֶ͚ͯͭݟ‬श͢Δͱ͍͏࢓૊Έ্ɺ
߈ܸ͠ͳ͔ͬͨͱͯ͠΋ؒҧ͑ΔՄೳੑ͸൱ఆͰ͖ͳ͍
w ͔͠΋ࢥͬͨ௨Γʹֶशͯ͘͠ΕΔͱ͸‫ݶ‬Βͳ͍
ଟগؒҧͬͯ΋͏·͘‫͖Ͱ༻׆‬ΔγνϡΤʔγϣϯΛ୳͢
ߴ͍ਫ਼౓ͰഏԌΛ‫ݕ‬஌͢Δ͸ͣͷγεςϜ͕
‫ݱ‬৔Ͱ͸શવ࢖͑ͳ͍ͷͰௐ΂ͯΈͨΒ
ӈ্ʹөΓࠐΜͩපӃ*%Ͱ༗ແΛ൑அ͍ͯͨ͠
;FDI
J. R. Zech, et al.: Variable generalization performance of a deep learning model to detect pneumonia in chest radiographs. PLoS Medicine 15(e1002683). 2018.
FocusMusicRecommender:
A System for Recommending Music
to Listen to While Working
Hiromu Yakura†, Tomoyasu Nakano‡, Masataka Goto‡
† University of Tsukuba, Japan
‡ AIST, Japan
ACM IUI 2018
എ‫༻ۀ࡞ܠ‬#(.ʹ‫ٻ‬ΊΒΕΔ΋ͷ

w 4QPUJGZͳͲͷετϦʔϛϯάαʔϏεͷී‫ٴ‬΋͋Γ
ଟ͘ͷਓ͕࡞‫ۀ‬தʹ#(.Λௌ͘Α͏ʹͳͬͨ
w େֶੜͷ͕࡞‫༻ۀ‬#(.Λௌऔ-POTEBMF
w ࣮͸ɺͱͯ΋‫ۂͳ͍ݏ‬ͷΈͳΒͣͱͯ΋޷͖ͳ‫ۂ‬Λௌ͘ͱ
Կ΋ௌ͍͍ͯͳ͍࣌ΑΓूதྗ͕௿͘ͳΔ)VBOH
w ࡞‫ूʹۀ‬த͢Δʹ͸ඍົͳ‫ۂ‬Λฉ͘΄͏͕Α͍
‫ػ‬ցֶशΛ࢖ͬͯɺࣗ෼ʹͱͬͯඍົͳ‫ۂ‬Λ୳ͯ͘͠ΕΔ
࡞‫༻ۀ‬#(.޲ָ͚‫ۂ‬ਪનγεςϜΛఏҊ
R. Huang, et al.: Effects of background music on concentration of workers. Work 38(4). 2011.
A. Londdale, et al.: Why do we listen to music? A uses and gratifications analysis. British Journal of Psychology 102(1). 2011.
ఏҊ‫ػ‬ցֶशΛ༻͍ͨ࡞‫༻ۀ‬#(.ਪનγεςϜ

w ࠶ੜதͷεΩοϓ΍1$Ͱͷ࡞‫ۀ‬ϩάͱɺָ‫ۂ‬ͷԻ‫ڹ‬৘ใͰ
Ϣʔβͷᅂ޷౓Λਪఆ͢Δ‫ػ‬ցֶशϞσϧΛ࡞੒
w ࡞‫ۀ‬தʹ࢖༻͢ΔͨΊɺ໌ࣔతͳϑΟʔυόοΫͳ͠Ͱ
Ϟσϧ͕‫͍ͯͬ͘ͳ͘ݡ‬ΠϯλϥΫγϣϯΛઃ‫ܭ‬
Ұൠతͳָ‫ۂ‬ਪન ࡞‫༻ۀ‬#(.ͷਪન
w ϢʔβͷϕετνϡʔϯΛ୳͢
w ඍົͳ‫͕ۂ‬ग़ͯ͘Δͱ
Ϣʔβ͸Πϥοͱͯ͠͠·͏
w γεςϜͳ͠Ͱ΋ɺࣗ෼Ͱ
ΞʔςΟετͳͲ͔Β୳ͤΔ
w ࢗ͞Βͳͦ͞͏ͳ‫ۂ‬Λ୳͢
w ଟগɺ޷͖ͳ‫͕ͯͬࠞ͟ۂ‬΋
ผʹΠϥοͱ͠ͳ͍
w ͔͠΋ɺώτʹͱͬͯ
ඍົͳ‫ۂ‬Λ୳͢ͷ͸೉͍͠
Neural Malware Analysis
with Attention Mechanism
Hiromu Yakura*†, Shinnosuke Shinozaki*, Reon Nishimura*,
Yoshihiro Oyama*, Jun Sakuma*†
* University of Tsukuba, Japan
† RIKEN Center for Artificial Intelligence Project, Japan
ACM CODASPY 2018 / Computers and Security 2019
എ‫ܠ‬Ϛϧ΢ΣΞͷ‫ڍ‬ಈղੳͷඞཁੑͱେม͞

w ৘ใ࿙Ӯͷௐࠪ౳Ͱ͸ɺϚϧ΢ΣΞͷ‫ڍ‬ಈղੳ͕ඞཁͱͳΔ
w ͲΜͳ৘ใ͕࿙Ε͔ͨΛ͢΂ͯτϨʔεͤͶ͹ͳΒͳ͍
w ΞηϯϒϦΛߦͣͭ௥͍͔͚͍ͯ͘ඇৗʹେมͳ࡞‫ۀ‬
σΟε
ΞηϯϒϦ
ਓखͰͷ
ղੳ
w Ϛϧ΢ΣΞͷ෼ྨͱҟͳΓɺ‫ػ‬ցֶशͰͷࣗಈղੳ͸೉͍͠
w ͔͠΋ɺൈ͚͕͋ͬͯ͸ͳΒͳ͍ͷͰɺͲ͏ͯ͠΋
ઐ໳Ո͕ղੳͨ͠ͱ͍͏୲อ͕‫ٻ‬ΊΒΕΔ
Ϛϧ΢ΣΞ ઐ໳Ո
Ͳ͜ʹͲΜͳ৘ใΛૹ͔ͬͨચ͍ग़͢
ఏҊ‫ػ‬ցֶशʹΑΔ‫ڍ‬ಈղੳͷώϯτఏ‫ڙ‬

w ‫ػ‬ցֶशʹΑΔࣗಈղੳΛ໨ࢦ͢ͷͰ͸ͳ͘ɺ
ઐ໳ՈʹώϯτΛఏ‫ͯ͠ڙ‬ɺղੳΛޮ཰Խ͢Δ
w Ϛϧ΢ΣΞͷ෼ྨख๏Λ֦ு͢Ε͹ɺ
‫ػ‬ցֶशϞσϧ͕Ͳ͜ʹண໨͔ͨ͠Λ஌Δ͜ͱ͕Ͱ͖Δ




w Ϟσϧ͕ண໨ͨ͠఺͔ΒղੳΛ࢝ΊΕ͹
ޮ཰తʹͦͷ‫ڍ‬ಈʹؔ࿈͢ΔՕॴΛḷΔ͜ͱ͕Ͱ͖Δ
෼ྨͷࠜ‫ڌ‬
ՕॴΛநग़
ղੳऀʹ
ఏࣔ
ࣗಈ෼ྨ
Ϟσϧ
ண໨ͨ͠ՕॴΛϋΠϥΠτ ઐ໳Ո
ೖྗ
Ϛϧ΢ΣΞ
REsCUE: A framework for
REal-time feedback on behavioral CUEs
using multimodal anomaly detection
Riku Arakawa† and Hiromu Yakura‡
(equal contribution)
† The University of Tokyo, Japan
‡ University of Tsukuba, Japan
ACM CHI 2019
എ‫ݱܠ‬ঢ়ͷձ࿩αϙʔτٕज़ͷ‫ݶ‬ք

w Χ΢ϯηϦϯά΍ίʔνϯάͷձ࿩Ͱ͸ɺ
૬खͷඇ‫ޠݴ‬γάφϧ͔Β‫ػ‬ඍΛಡΈऔΔ͜ͱ͕‫ٻ‬ΊΒΕΔ
w ‫ػ‬ցֶशΛ༻͍ͯձ࿩தͷಈ͖͔Β
૬खͷ‫ײ‬৘ΛಡΈऔΔͱ͍͏ख๏΋ఏҊ͞Ε͍ͯΔ
w ͔͠͠ɺ‫ݱ‬৔Ͱ͸ͦ͏ͨ͠ख๏͕
໾ʹཱͨͳ͍ͱ‫ݴ‬ΘΕΔ
w ͦ΋ͦ΋ɺ‫ݸ‬ਓ΍จ຺ʹΑͬͯ
γάφϧͷҙຯ͕มΘͬͯ͘Δ
w ͦͯ͠௚‫ײ‬΍‫ͱݧܦ‬ໃ६͢Δग़ྗΛ͢Δͱແࢹ͞Εͯ͠·͏
I. Damian, et al. Augmenting Social Interactions: Realtime Behavioural Feedback using Social Signal Processing Techniques. ACM CHI 2015.
%BNJBO
ఏҊ‫ͱ࡯؍‬൑அͷ෼཭ʹΑΔίϯϐϡʔλͱͷ‫ڠ‬ௐ

w ίϯϐϡʔλ͕ྫྷ੩ͳࢹ఺Ͱɺ૬खͷγάφϧΛ‫͚ͭݟ‬ग़͢
w γάφϧ͕Ͳ͏͍͏ҙຯΛ͔࣋ͭ͸ώτ͕൑அ͢Δ
ώτ ίϯϐϡʔλ
👍ίϯςΩετΛཧղ͍ͯ͠Δ
👎ओ‫؍‬΍ਫ਼ਆతͳෛՙͷͨΊʹ
ɹྫྷ੩ͳࢹ఺ͷҡ͕࣋೉͍͠
👍ύϑΥʔϚϯε͸Ұఆ
👎ίϯςΩετΛѻ͑ͳ͍
‫ͱ࡯؍‬൑அΛ෼཭ͤ͞Ε͹
ώτͱίϯϐϡʔλ͏·͘‫ڠ‬ௐͰ͖ΔͷͰ͸ͳ͍͔ʁ
ఏҊҟৗ‫ݕ‬஌Λ༻͍ͨձ࿩αϙʔτٕज़

w ಛఆͷγάφϧΛ‫͘ߦʹ͚ͭݟ‬ͷͰ͸ͳ͘ɺ‫ػ‬ցֶशϕʔεͷ
ҟৗ‫ݕ‬஌Ͱ૬खͷͦΕ·Ͱͷ܏޲͔Β֎ΕͨॠؒΛ‫͚ͭݟ‬ग़͢



w ͦͷมԽΛՄࢹԽ্ͨ͠Ͱ
Ͳ͏͍͏ҙຯΛ͔࣋ͭͷղऍ͸ҕͶΔ
૬खʹ߹ΘͤͨదԠతͳ‫ݕ‬஌ͱɺώτ͕൑அ͢ΔͨΊͷ
ࠜ‫ڌ‬ͷఏࣔͱ͍͏࿮૊ΈͷಋೖͰɺώτͷෳࡶ͞ʹ޲͖߹͏
(..Ͱ
܏޲Λֶश
‫ͳٸ‬มԽΛ
‫͚ͭݟ‬ग़͢
Mindless Attractor: A False-Positive Resistant
Intervention for Drawing Attention
Using Auditory Perturbation
ACM CHI 2021
Riku Arakawa† and Hiromu Yakura‡
(equal contribution)
† The University of Tokyo, Japan
‡ University of Tsukuba, Japan

More Related Content

More from Hiromu Yakura

Arduinoでプログラミングに触れてみよう 続編
Arduinoでプログラミングに触れてみよう 続編Arduinoでプログラミングに触れてみよう 続編
Arduinoでプログラミングに触れてみよう 続編
Hiromu Yakura
 
Arduinoでプログラミングに触れてみよう
Arduinoでプログラミングに触れてみようArduinoでプログラミングに触れてみよう
Arduinoでプログラミングに触れてみよう
Hiromu Yakura
 
機械学習コン講評
機械学習コン講評機械学習コン講評
機械学習コン講評
Hiromu Yakura
 
NPCA夏合宿 2014 講義資料
NPCA夏合宿 2014 講義資料NPCA夏合宿 2014 講義資料
NPCA夏合宿 2014 講義資料
Hiromu Yakura
 
イタリアでパスタを食べた話
イタリアでパスタを食べた話イタリアでパスタを食べた話
イタリアでパスタを食べた話
Hiromu Yakura
 
Why don't you learn programming?
Why don't you learn programming?Why don't you learn programming?
Why don't you learn programming?
Hiromu Yakura
 
CTF, What's in it for me?
CTF, What's in it for me?CTF, What's in it for me?
CTF, What's in it for me?
Hiromu Yakura
 
Arrow Judge
Arrow JudgeArrow Judge
Arrow Judge
Hiromu Yakura
 
CTFはとんでもないものを 盗んでいきました。私の時間です…
CTFはとんでもないものを 盗んでいきました。私の時間です…CTFはとんでもないものを 盗んでいきました。私の時間です…
CTFはとんでもないものを 盗んでいきました。私の時間です…Hiromu Yakura
 
ぃぬ速@LKML
ぃぬ速@LKMLぃぬ速@LKML
ぃぬ速@LKML
Hiromu Yakura
 
プラトン
プラトンプラトン
プラトン
Hiromu Yakura
 
ナウいAndroidセキュリティ
ナウいAndroidセキュリティナウいAndroidセキュリティ
ナウいAndroidセキュリティ
Hiromu Yakura
 
Trendmicro Security Award 2012 Final Presentation
Trendmicro Security Award 2012 Final PresentationTrendmicro Security Award 2012 Final Presentation
Trendmicro Security Award 2012 Final Presentation
Hiromu Yakura
 
Androidにおける強制アクセス制御
Androidにおける強制アクセス制御Androidにおける強制アクセス制御
Androidにおける強制アクセス制御Hiromu Yakura
 
SEAndroid -AndroidのアーキテクチャとSE化について-
SEAndroid -AndroidのアーキテクチャとSE化について-SEAndroid -AndroidのアーキテクチャとSE化について-
SEAndroid -AndroidのアーキテクチャとSE化について-
Hiromu Yakura
 
Nyarlathotep
NyarlathotepNyarlathotep
Nyarlathotep
Hiromu Yakura
 
検証、SEAndroid
検証、SEAndroid検証、SEAndroid
検証、SEAndroid
Hiromu Yakura
 

More from Hiromu Yakura (20)

Arduinoでプログラミングに触れてみよう 続編
Arduinoでプログラミングに触れてみよう 続編Arduinoでプログラミングに触れてみよう 続編
Arduinoでプログラミングに触れてみよう 続編
 
Arduinoでプログラミングに触れてみよう
Arduinoでプログラミングに触れてみようArduinoでプログラミングに触れてみよう
Arduinoでプログラミングに触れてみよう
 
機械学習コン講評
機械学習コン講評機械学習コン講評
機械学習コン講評
 
NPCA夏合宿 2014 講義資料
NPCA夏合宿 2014 講義資料NPCA夏合宿 2014 講義資料
NPCA夏合宿 2014 講義資料
 
イタリアでパスタを食べた話
イタリアでパスタを食べた話イタリアでパスタを食べた話
イタリアでパスタを食べた話
 
Why don't you learn programming?
Why don't you learn programming?Why don't you learn programming?
Why don't you learn programming?
 
CTF, What's in it for me?
CTF, What's in it for me?CTF, What's in it for me?
CTF, What's in it for me?
 
Arrow Judge
Arrow JudgeArrow Judge
Arrow Judge
 
CTFとは
CTFとはCTFとは
CTFとは
 
CTFはとんでもないものを 盗んでいきました。私の時間です…
CTFはとんでもないものを 盗んでいきました。私の時間です…CTFはとんでもないものを 盗んでいきました。私の時間です…
CTFはとんでもないものを 盗んでいきました。私の時間です…
 
ぃぬ速@LKML
ぃぬ速@LKMLぃぬ速@LKML
ぃぬ速@LKML
 
プラトン
プラトンプラトン
プラトン
 
How to lick Miku
How to lick MikuHow to lick Miku
How to lick Miku
 
ICTのちから
ICTのちからICTのちから
ICTのちから
 
ナウいAndroidセキュリティ
ナウいAndroidセキュリティナウいAndroidセキュリティ
ナウいAndroidセキュリティ
 
Trendmicro Security Award 2012 Final Presentation
Trendmicro Security Award 2012 Final PresentationTrendmicro Security Award 2012 Final Presentation
Trendmicro Security Award 2012 Final Presentation
 
Androidにおける強制アクセス制御
Androidにおける強制アクセス制御Androidにおける強制アクセス制御
Androidにおける強制アクセス制御
 
SEAndroid -AndroidのアーキテクチャとSE化について-
SEAndroid -AndroidのアーキテクチャとSE化について-SEAndroid -AndroidのアーキテクチャとSE化について-
SEAndroid -AndroidのアーキテクチャとSE化について-
 
Nyarlathotep
NyarlathotepNyarlathotep
Nyarlathotep
 
検証、SEAndroid
検証、SEAndroid検証、SEAndroid
検証、SEAndroid
 

Recently uploaded

UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

機械学習を"良く"使うには