Thursday
Room 6
15:00 - 16:00
(UTC+02)
Talk (60 min)
Lightning Talks 4
Lightning talks (approx 10-15 minutes each)
Talk 1: More than 70 years of AI history in 15 minutes! - Tomas Hensrud Gulla
The launch of ChatGPT in 2022 was not the beginning of AI.
Deep Blue defeating Kasparov in 1997 was not the beginning of AI.
Even Eliza, the 1966 chatbot was not the beginning of AI.
Join me for a journey, from the very beginning of AI until today!
Talk 2: Computer vision on edge devices - Tom Daniel Sivertsen
AI is moving from digital interfaces into the physical world. Robotics, autonomous driving, and self-checkout systems require advanced models running on edge devices. This talk explores how computer vision can transform the supermarket experience and addresses the challenges of real-time object detection with limited storage and compute.
We will discuss the main hurdles of self-checkout counters in high-volume supermarkets and share how NorgesGruppen balances frictionless experiences with waste reduction. You’ll learn how we try to make large object detection models—recognizing tens of thousands of items—run efficiently on small, low-cost edge devices.
Talk 3: Performance improvements' and other lies: exposing hidden security fixes in Open Source - Mackenzie Jackson
Silent patching- fixing security vulnerabilities without disclosure—presents a critical blind spot in software supply chain security. With 1 in 6 vulnerabilities patched silently, traditional security tools relying on public vulnerability databases like CVE or NVD fall short, leaving organizations exposed to unknown risks. This presentation introduces an entirely novel approach that harnesses the power of Large Language Models (LLMs) to detect these hidden vulnerabilities in open-source software.
We'll show how our novel dual-LLM architecture analyses public changelog data to identify and classify silently patched vulnerabilities. Through a live demo, we'll show how this AI-driven method has allowed us to uncover hundreds of previously unknown vulnerabilities in major open-source projects, with 20% classified as critical or high severity.
Key points:
- The threat landscape of silent patching and its impact on supply chain security
- Detailed breakdown of our dual-LLM model architecture and methodology
- Real-world findings and their implications for the security community
- The crucial role of Human-in-the-Loop (HITL) verification in the AI-driven process
- Benchmarking results against traditional security research methods
- Limitations of the current approach and future improvements
Talk 4: Tech debt nomads and slash-and-burn development - Einar Høst
Many developers are tech debt nomads. When starting in a new role, we are righteously indignant about the shortcomings of existing solutions, preferring to burn them to the ground and start anew. A couple of years down the road, when the consequences of our own choices start to make themselves manifest and progress slows down, we find it's time to move on. To replace us come other tech debt nomads, and the process repeats itself. What fuels this process? And what are the effects on the systems we build? On the organizations that own them? On us?