CERIAS Security Seminar Series
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.
Show all Visit Show Website http://www.cerias.purdue.edu/sec...Recently Aired
-
HD
Scott Hollenbeck, "Provisioning Protocol Challenges in an Era of gTLD Expansion"
The number of generic top-level domains in the Internet's Domain ...
The number of generic top-level domains in the Internet's Domain Name System has been increasing slowly since 2000. In July 2011 the Internet Corporation for Assigned Names and Numbers (ICANN) approved a long-awaited plan to significantly increase the num
-
HD
Eric Katz, "Mobile Phones and Evidence Preservation"
-
HD
Jose Fernandez, ""Semantic Security: or How I Learned to Stop Worrying and Looooooove the Internet""
My late friend Robert Garigue, a pioneer of Information Warfare ...
My late friend Robert Garigue, a pioneer of Information Warfare and one of the most original and visionary corporate Chief Information Security Officer, first described the notion a "semantic attack" as the eventual non plus ultra in the hacking arsenal.
-
HD
Ronda R. Henning, "FuzzyFusion™, an application architecture for multisource information fusion"
The correlation of information from disparate sources has long been ...
The correlation of information from disparate sources has long been an issue in data fusion research. Traditional data fusion addresses the correlation of information from sources as diverse as single-purpose sensors to all-source multi-media information.
-
HD
Carter Bullard, "Society, Law Enforcement and the Internet: Models for Give and Take"
Krannert Auditorium, Purdue University, West Lafayette, IN The interaction of ...
Krannert Auditorium, Purdue University, West Lafayette, IN The interaction of society, law enforcement and telecommunications has evolved over the last 140 years to a successful balance of give and take. Society gives, providing well-defined processes and
-
HD
Kim Trieu, "Wireless Technologies and how it relates to cyber security research"
If you are interested in what cyber-related technologies will be ...
If you are interested in what cyber-related technologies will be most relevant at the time you graduate, and where many of the cutting-edge jobs will be, then this talk will be of interest. This presentation will be a high level view of where Lockheed Mar
-
HD
Michael Schearer, "Exploiting Banners for Fun and Profits"
SHODAN is a computer search engine. But it is unlike ...
SHODAN is a computer search engine. But it is unlike any other search engine. While other search engines scour the web for content, SHODAN scans for information about the sites themselves. The result is a search engine that aggregates banners from well-kn
-
HD
Casey Deccio, ""Modeling DNS Security: Misconfiguration, Availability, and Visualization""
The Domain Name System (DNS) is one of the components ...
The Domain Name System (DNS) is one of the components most critical to Internet functionality. The ubiquity of the DNS necessitates both the accuracy and availability of responses. While the DNS Security Extensions (DNSSEC) add authentication to the DNS,
-
HD
Jan Vitek, "A couple of results about JavaScript"
This talk will summarize two recent results on JavaScript. "The ...
This talk will summarize two recent results on JavaScript. "The Eval that Men Do": Transforming text into executable code with a function such as JavaScript�s eval endows programmers with the ability to extend applications, at any time, and in almost any
-
HD
Fariborz Farahmand, "Understanding insiders: An analysis of risk-taking behavior *"
There is considerable research being conducted on insider threats directed ...
There is considerable research being conducted on insider threats directed to developing new technologies. At the same time, existing technology is not being fully utilized because of non-technological issues that pertain to economics and the human dimens