CERIAS Security Seminar Series
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.
Show all Visit Show Website http://www.cerias.purdue.edu/sec...Recently Aired
-
HD
Torsten Braun, "User and Machine Authentication and Authorization Infrastructure for Distributed Testbeds"
The Wisebed wireless sensor network testbed provides a federated experimentation ...
The Wisebed wireless sensor network testbed provides a federated experimentation facility covering several European universities. For scalable management of access control we have designed and implemented a single-sign-on and attribute-based authenticatio
-
HD
Somesh Jha, "Retrofitting Legacy Code for Security"
Research in computer security has historically advocated Design for Security, ...
Research in computer security has historically advocated Design for Security, the principle that security must be proactively integrated into the design of a system. While examples exist in the research literature of systems that have been designed for se
-
HD
Fariborz Farahmand, "Risk Perception and Trust in Cloud"
Many companies today are paying attention to cloud computing and ...
Many companies today are paying attention to cloud computing and new aspects of large-scale, distributed computing. This emerging paradigm of the information age offers exciting benefits to companies and users, but cloud computing, like any other innovati
-
HD
Matthew Hashim, "Nudging the Digital Pirate: Behavioral Issues in the Piracy Context"
Piracy is a significant source of concern facing software developers, ...
Piracy is a significant source of concern facing software developers, music labels, and movie production companies. Firms continue to invest in digital rights management technologies to thwart piracy, but their efforts are quickly defeated by hackers and
-
HD
Michael Kirkpatrick, "Security Applications for Physically Unclonable Functions"
Physically unclonable functions (PUFs) are hardware structures that create unique ...
Physically unclonable functions (PUFs) are hardware structures that create unique characteristics for distinct copies of a device. Specifically, the physical nature of manufacturing a device introduces slight variations that can be neither controlled nor
-
HD
Nikita Borisov, "Detecting Coordinated Attacks with Traffic Analysis"
Coordinated attacks, such as botnets, present a major threat to ...
Coordinated attacks, such as botnets, present a major threat to today's computing infrastructures. They are able to evade traditional detection techniques by using zero-day and polymorphic exploits, partitioning misbehavior, and encrypting communications.
-
HD
Trent Jaeger, "Tackling System-Wide Integrity"
Computing system compromises occur because system integrity is not managed ...
Computing system compromises occur because system integrity is not managed effectively. The various parties that contribute to a system, programmers, OS distributors, and system administrators, do not account for integrity threats comprehensively, leading
-
HD
P. Madhusudan, "The role of automata theory in software verification"
The 80s and 90s saw a revolution in hardware verification, ...
The 80s and 90s saw a revolution in hardware verification, where automata theory played a prominent role, formalizing model-checking and establishing the basis of verification using the logic-automata connection. We shift focus to software verification an
-
HD
Sam King, "Trust and Protection in the Illinois Browser Operating System"
Current web browsers are complex, have enormous trusted computing bases, ...
Current web browsers are complex, have enormous trusted computing bases, and provide attackers with easy access to modern computer systems. In this talk we introduce the Illinois Browser Operating System (IBOS), a new operating system and a new browser th
-
HD
Alex Liu, "Fast Regular Expression Matching using Small TCAMs for Network Intrusion Detection and Prevention Systems"
Regular expression (RegEx) matching is a core component of deep ...
Regular expression (RegEx) matching is a core component of deep packet inspection in modern networking and security devices. Prior RegEx matching algorithms are either software-based or FPGA-based. Software-based solutions have to be implemented in custom