BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Informal talk about Wassenaar and/or work at our lab - Sergey Brat
 us\, Dartmouth College
DTSTART:20150605T150000Z
DTEND:20150605T152000Z
UID:TALK59733@talks.cam.ac.uk
CONTACT:42515
DESCRIPTION:Are our USENIX WOOT "weird machines" papers from various years
  regulated arms under the Dec. 2013 Wassenaar Arrangement definitions? The
 y certainly seem to fit the bill\, along with fuzzers\, instrumentation fr
 ameworks\, and any tools that automate vulnerability and exploitability an
 alysis. If implemented as written\, these rules control the basic artifact
 s and methods of security research\, and will drastically chill the curren
 t security scene. When "modifying a program's standard execution path" bec
 omes a matter of export control\, 1990s "Crypto Wars" may seem like  a wal
 k in the park by comparison\; academic research will hardly remain unaffec
 ted. 
LOCATION:Computer Laboratory\, William Gates Building\, Room SS03
END:VEVENT
END:VCALENDAR
