CERIAS Security Seminar Series
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.
Show all Visit Show Website http://www.cerias.purdue.edu/sec...Recently Aired
-
HD
Ben Calloni, "Vulnerability Path and Assessment"
US Government, Department of Defense, and Enterprise computer systems must ...
US Government, Department of Defense, and Enterprise computer systems must be trusted to protect data with varying levels of sensitivity / security. Affordability requirements are driving the need to incorporate many diverse commercial software products o
-
HD
Simson Garfinkel, "Forensic Carving of Network Packets with bulk_extractor and tcpflow"
Using validated carving techniques, we show that popular operating systems ...
Using validated carving techniques, we show that popular operating systems (\eg Windows, Linux, and OSX) frequently have residual IP packets, Ethernet frames, and associated data structures present in system memory from long-terminated network traffic. Su
-
HD
Kelley Misata, "Digital Citizenship: A Target's View of Security and Life Online"
As technological advancements continue to expand the range of information ...
As technological advancements continue to expand the range of information access, issues of privacy and cyber security have risen to the forefront. Technology is only one part of a larger conversation. Looking through a different lens, consider the humans
-
HD
George Vanecek, "Is it time to add Trust to the Future Internet/Web?"
The future web, and Internet, are undergoing a humanization of ...
The future web, and Internet, are undergoing a humanization of their technologies which increasingly make their services more personalized, individualized and transparent. This is jointly fueled by the inexpensive yet easily accessible huge computing and
-
HD
Frank Tompa, "A Flexible System for Access Control"
A variety of mechanisms have been used in access control ...
A variety of mechanisms have been used in access control systems to support enterprises' diverse security needs. For example, some enterprises might allow individual users to assign privileges on files that they own, whereas others might require that perm
-
HD
Salmin Sultana, " Secure Provenance Transmission for Data Streams"
Many application domains, such as real-time financial analysis, e-healthcare systems, ...
Many application domains, such as real-time financial analysis, e-healthcare systems, sensor networks, are characterized by continuous data streaming from multiple sources and through intermediate processing by multiple aggregators. Keeping track of data
-
HD
Stephen Elliott, ""Introduction to Biometrics""
A discussion about biometrics, performance and error. Learn more about ...
A discussion about biometrics, performance and error. Learn more about biometric technologies and challenges related to performance.
-
HD
Apu Kapadia, "Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones"
We introduce Soundcomber, a "sensory malware" for smartphones that uses ...
We introduce Soundcomber, a "sensory malware" for smartphones that uses the microphone to steal private information from phone conversations. Soundcomber is lightweight and stealthy. It uses targeted profiles to locally analyze portions of speech likely t
-
HD
Loukas Lazos, "Jam me if you can: Mitigating the Impact of Inside Jammers"
The open nature of the wireless medium leaves wireless communications ...
The open nature of the wireless medium leaves wireless communications exposed to interference caused by the concurrent operation of co-located wireless devices over the same frequency bands. While unintentional signal interference is managed at the physic
-
HD
Zhongshu Gu, "Process Implanting: A New Active Introspection Framework for Virtualization"
Previous research on virtual machine introspection proposed "out-of-box" approach by ...
Previous research on virtual machine introspection proposed "out-of-box" approach by moving out security tools from the guest operating system. However, compared to the traditional "in-the-box" approach, it remains a challenge to obtain a complete semanti