 Hello. I will be talking about a KS anomaly trigger attack on secure operations for cryptographic key storage. The cat socks attack is based off of a KS anomaly trigger attack on secure operations for cryptographic key storage known as socks that use the Turing unresolvable numeric algorithm, TUNA, for key protection. In particular, an implementation of the cryptographic allocation of nonces the CAN is studied. And we show that a heuristic approach using a performance adaptive workload scripts, also known as PAUSE, can be used to penetrate the secure storage. So we will now present the acronyms. We have KS anomaly trigger, secure operations for cryptographic key storage, Turing unresolvable numeric algorithm, cryptographic allocation of nonces, and performance adaptive workload script. The problem description is to protect the cryptographic keys using socks in the cipher mode, preventing the cat PAUSE from penetrating the security container and accessing the TUNA CAN. In this instance, the TUNA CAN holds a two fish key because blockchain. Here is a graphical overview. I know it's been a long day. I wanted to make it very clear for you. We are demonstrating that the cat PAUSE are able to penetrate the socks layer through the secure container into the TUNA CAN and obtain the two fish key material because blockchain again. And I will now demonstrate the heuristic attack that was used in order to penetrate the secure container with 100% reliability. False try. And then we have achieved success. So thank you.