Display Shows:

My Language:

CERIAS Security Seminar Series

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.

Show all Visit Show Website http://www.cerias.purdue.edu/sec...

Recently Aired


  • HD

    Ben Calloni, "Vulnerability Path and Assessment"

    US Government, Department of Defense, and Enterprise computer systems must ...

    US Government, Department of Defense, and Enterprise computer systems must be trusted to protect data with varying levels of sensitivity / security. Affordability requirements are driving the need to incorporate many diverse commercial software products o

    Feb 23, 2012 Read more
  • HD

    Simson Garfinkel, "Forensic Carving of Network Packets with bulk_extractor and tcpflow"

    Using validated carving techniques, we show that popular operating systems ...

    Using validated carving techniques, we show that popular operating systems (\eg Windows, Linux, and OSX) frequently have residual IP packets, Ethernet frames, and associated data structures present in system memory from long-terminated network traffic. Su

    Feb 16, 2012 Read more
  • HD

    Kelley Misata, "Digital Citizenship: A Target's View of Security and Life Online"

    As technological advancements continue to expand the range of information ...

    As technological advancements continue to expand the range of information access, issues of privacy and cyber security have risen to the forefront. Technology is only one part of a larger conversation. Looking through a different lens, consider the humans

    Feb 9, 2012 Read more
  • HD

    George Vanecek, "Is it time to add Trust to the Future Internet/Web?"

    The future web, and Internet, are undergoing a humanization of ...

    The future web, and Internet, are undergoing a humanization of their technologies which increasingly make their services more personalized, individualized and transparent. This is jointly fueled by the inexpensive yet easily accessible huge computing and

    Feb 2, 2012 Read more
  • HD

    Frank Tompa, "A Flexible System for Access Control"

    A variety of mechanisms have been used in access control ...

    A variety of mechanisms have been used in access control systems to support enterprises' diverse security needs. For example, some enterprises might allow individual users to assign privileges on files that they own, whereas others might require that perm

    Jan 26, 2012 Read more
  • HD

    Salmin Sultana, " Secure Provenance Transmission for Data Streams"

    Many application domains, such as real-time financial analysis, e-healthcare systems, ...

    Many application domains, such as real-time financial analysis, e-healthcare systems, sensor networks, are characterized by continuous data streaming from multiple sources and through intermediate processing by multiple aggregators. Keeping track of data

    Jan 19, 2012 Read more
  • HD

    Stephen Elliott, ""Introduction to Biometrics""

    A discussion about biometrics, performance and error. Learn more about ...

    A discussion about biometrics, performance and error. Learn more about biometric technologies and challenges related to performance.

    Jan 12, 2012 Read more
  • HD

    Apu Kapadia, "Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones"

    We introduce Soundcomber, a "sensory malware" for smartphones that uses ...

    We introduce Soundcomber, a "sensory malware" for smartphones that uses the microphone to steal private information from phone conversations. Soundcomber is lightweight and stealthy. It uses targeted profiles to locally analyze portions of speech likely t

    Dec 1, 2011 Read more
  • HD

    Loukas Lazos, "Jam me if you can: Mitigating the Impact of Inside Jammers"

    The open nature of the wireless medium leaves wireless communications ...

    The open nature of the wireless medium leaves wireless communications exposed to interference caused by the concurrent operation of co-located wireless devices over the same frequency bands. While unintentional signal interference is managed at the physic

    Nov 17, 2011 Read more
  • HD

    Zhongshu Gu, "Process Implanting: A New Active Introspection Framework for Virtualization"

    Previous research on virtual machine introspection proposed "out-of-box" approach by ...

    Previous research on virtual machine introspection proposed "out-of-box" approach by moving out security tools from the guest operating system. However, compared to the traditional "in-the-box" approach, it remains a challenge to obtain a complete semanti

    Nov 10, 2011 Read more
Loading...