CERIAS Security Seminar Series
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.
Show all Visit Show Website http://www.cerias.purdue.edu/sec...Recently Aired
-
HD
Jim Gallagher, "Microsemi Security Solutions and Threat Driven Security"
Threat-driven security is a systematic system-level approach that is driven ...
Threat-driven security is a systematic system-level approach that is driven by a clear understanding of the security need � it is not arbitrary application of security technologies based on their perceived effectiveness or hype. Using this systematic appr
-
HD
Aniket Kate, " Preventing or Penalizing Equivocation in Decentralized Environments"
Making conflicting statements to others, or equivocation, is a simple ...
Making conflicting statements to others, or equivocation, is a simple yet remarkably powerful tool of malicious participants in distributed systems of all kinds. In distributed computing protocols, equivocation leads to Byzantine faults and fairness issue
-
HD
Balamurugan Anandan, "Secure Multiparty Computation and Differential Privacy"
Secure multiparty computation (MPC) and differential privacy are two notions ...
Secure multiparty computation (MPC) and differential privacy are two notions of privacy that deal respectively with how and what functions can be privately computed. In this talk, I will first give an overview of MPC and differential privacy. Then, I will
-
HD
Kate Seigfried-Spellar, " Case Study of the Authur Pendragon Cyber Threat at The University of Alabama"
This presentation is a detailed case study of the Authur ...
This presentation is a detailed case study of the Authur Pendragon cyber threat that occurred at The University of Alabama on September 21, 2014. The Authur Pendragon threat instigated mass fear, social media hyperactivity, and rumor mongering, all of whi
-
HD
Koray Mancuhan, "Anonymized Data"
Privacy has been a hot issue since early 2000s, in ...
Privacy has been a hot issue since early 2000s, in particular with the rise of social network and data outsourcing. Data privacy is a big concern in data outsourcing because it involves sharing personal data with third parties. In this talk, I will give a
-
HD
Fang-Yu Rao, "A Hybrid Private Record Linkage Scheme: Separating Differentially Private Synopses FromMatching Records"
Private record linkage protocols allow multiple parties to exchange matching ...
Private record linkage protocols allow multiple parties to exchange matching records, which refer to the same entities or have similar values, while keeping the non-matching ones secret. Conventional protocols are based on computationally expensive crypto
-
HD
Kevin McPeak, "The Five W�s of Mobile Malware: Examining the Who, What, When, Where, and Why"
Mobile malware is a growing menace, even though many Cybersecurity ...
Mobile malware is a growing menace, even though many Cybersecurity practitioners don�t fully grasp the situation. This presentation will address the Five W�s of mobile malware, namely: Who is developing it? Who is being affected by it? What exactly is it?
-
HD
Jianjun Huang, "SUPOR: Precise and Scalable Sensitive User Input Detection for Mobile Apps"
While smartphones and mobile apps have been an essential part ...
While smartphones and mobile apps have been an essential part of our lives, privacy is a serious concern. Previous mobile privacy related research efforts have largely focused on predefined known sources managed by smartphones. Sensitive user inputs throu
-
HD
Samuel Jero, "Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations"
Network transport protocols, like TCP, underlie the vast majority of ...
Network transport protocols, like TCP, underlie the vast majority of Internet communication, from email to web browsing to instant messaging to file transfer. Despite their importance, these protocols are difficult to implement correctly, leading to a lon
-
HD
Steve Bellovin, "Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet"
For years, legal wiretapping was straightforward: the officer doing the ...
For years, legal wiretapping was straightforward: the officer doing the intercept connected a tape recorder or the like to a single pair of wires. By the 1990s, though, the changing structure of telecommunications � there was no longer just �Ma Bell� to t