CERIAS Security Seminar Series
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.
Show all Visit Show Website http://www.cerias.purdue.edu/sec...Recently Aired
-
HD
Mihaela Vorvoreanu, Lorraine G. Kisselburgh, "Global Study of Web 2.0 Use in Organizations"
In this seminar, we present results from a global study ...
In this seminar, we present results from a global study about Web 2.0 use in organizations. The study, commissioned by McAfee, Inc., included a worldwide survey of over 1,000 organizational IT leaders, and in-depth interviews with industry experts. Data p
-
HD
Sergey Panasyuk, "Assured Processing through Obfuscation"
In this seminar, an Obfuscation Module is discussed. This module ...
In this seminar, an Obfuscation Module is discussed. This module provides a means to perform computation on untrusted computing systems while maintaining the confidentiality and integrity of the information. Being able to do so not only enables assured pr
-
HD
Petros Mouchtaris, "Security of Mobile Ad Hoc Networks (MANETs)"
This talk will initially provide an overview of Telcordia's cyber ...
This talk will initially provide an overview of Telcordia's cyber security research. The talk will then focus on Telcordia's research in securing MANETs. MANETs are networks that do not require a fixed infrastructure (like base stations or access points)
-
HD
Xiaofeng Wang, "Side Channel Threats in the Software-as-a-Service Era: Challenges and Responses"
With software-as-a-service becoming mainstream, more and more applications are delivered ...
With software-as-a-service becoming mainstream, more and more applications are delivered to the client through the Web. Unlike a desktop application, a web application is a "two-part" program, with its components deployed both in the browser and in the we
-
HD
Xeno Kovah, "Rootkits"
This talk will examine the state of current and proposed ...
This talk will examine the state of current and proposed rootkits, to try and answer the following question: are rootkits stupid and lame? The speaker will provide supporting evidence that most all rootkits are eminently detectable, in theory. But theory
-
HD
Ashish Kundu, "Data in the Cloud: Authentication Without Leaking"
Assurance of authenticity as well as confidentiality of data is ...
Assurance of authenticity as well as confidentiality of data is an important problem, in cloud computing and in third-party data distribution environments. Existing data authentication schemes for structured and semi-structured data such as trees and grap
-
HD
Cristina Nita-Rotaru, "Secure Network Coding for Wireless Mesh Networks"
In this talk we identify two general frameworks (inter-flow and ...
In this talk we identify two general frameworks (inter-flow and intra-flow) that encompass several network coding-based systems proposed in wireless mesh networks. Our systematic analysis of the components of these frameworks reveals vulnerabilities to a
-
HD
Victor Raskin & Julia Taylor, ""Ontological Semantic Technology for Detecting Insider Threat and Social Engineering""
The paper describes a computational system, an application and implementation ...
The paper describes a computational system, an application and implementation of the mature Ontological Semantic Technology, for detecting unintentional inferences in casual unsolicited and unrestricted verbal output of individuals, potentially responsibl
-
HD
Stephen Dill, "The role of System Security Engineering in the engineering lifecycle"
This seminar will provide an overview of how Information Security ...
This seminar will provide an overview of how Information Security (AKA Cyber Security, AKA INFOSEC) engineering, requirements analysis and security policies and other activities fit into the overall life cycle of an IT system. We will define an INFOSEC sy
-
HD
Christian Hammer, "Security of JavaScript in a Browser Environment"
The power of modern websites emerges to a large extent ...
The power of modern websites emerges to a large extent from the ability to combine content from different sources. As an example, a site may include a Google map next to business information a user had been searching for. Combining content from possibly u