Display Shows:

My Language:

CERIAS Security Seminar Series

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.

Show all Visit Show Website http://www.cerias.purdue.edu/sec...

Recently Aired


  • HD

    Mihaela Vorvoreanu, Lorraine G. Kisselburgh, "Global Study of Web 2.0 Use in Organizations"

    In this seminar, we present results from a global study ...

    In this seminar, we present results from a global study about Web 2.0 use in organizations. The study, commissioned by McAfee, Inc., included a worldwide survey of over 1,000 organizational IT leaders, and in-depth interviews with industry experts. Data p

    Oct 7, 2010 Read more
  • HD

    Sergey Panasyuk, "Assured Processing through Obfuscation"

    In this seminar, an Obfuscation Module is discussed. This module ...

    In this seminar, an Obfuscation Module is discussed. This module provides a means to perform computation on untrusted computing systems while maintaining the confidentiality and integrity of the information. Being able to do so not only enables assured pr

    Sep 30, 2010 Read more
  • HD

    Petros Mouchtaris, "Security of Mobile Ad Hoc Networks (MANETs)"

    This talk will initially provide an overview of Telcordia's cyber ...

    This talk will initially provide an overview of Telcordia's cyber security research. The talk will then focus on Telcordia's research in securing MANETs. MANETs are networks that do not require a fixed infrastructure (like base stations or access points)

    Sep 23, 2010 Read more
  • HD

    Xiaofeng Wang, "Side Channel Threats in the Software-as-a-Service Era: Challenges and Responses"

    With software-as-a-service becoming mainstream, more and more applications are delivered ...

    With software-as-a-service becoming mainstream, more and more applications are delivered to the client through the Web. Unlike a desktop application, a web application is a "two-part" program, with its components deployed both in the browser and in the we

    Sep 16, 2010 Read more
  • HD

    Xeno Kovah, "Rootkits"

    This talk will examine the state of current and proposed ...

    This talk will examine the state of current and proposed rootkits, to try and answer the following question: are rootkits stupid and lame? The speaker will provide supporting evidence that most all rootkits are eminently detectable, in theory. But theory

    Sep 9, 2010 Read more
  • HD

    Ashish Kundu, "Data in the Cloud: Authentication Without Leaking"

    Assurance of authenticity as well as confidentiality of data is ...

    Assurance of authenticity as well as confidentiality of data is an important problem, in cloud computing and in third-party data distribution environments. Existing data authentication schemes for structured and semi-structured data such as trees and grap

    Sep 2, 2010 Read more
  • HD

    Cristina Nita-Rotaru, "Secure Network Coding for Wireless Mesh Networks"

    In this talk we identify two general frameworks (inter-flow and ...

    In this talk we identify two general frameworks (inter-flow and intra-flow) that encompass several network coding-based systems proposed in wireless mesh networks. Our systematic analysis of the components of these frameworks reveals vulnerabilities to a

    Aug 26, 2010 Read more
  • HD

    Victor Raskin & Julia Taylor, ""Ontological Semantic Technology for Detecting Insider Threat and Social Engineering""

    The paper describes a computational system, an application and implementation ...

    The paper describes a computational system, an application and implementation of the mature Ontological Semantic Technology, for detecting unintentional inferences in casual unsolicited and unrestricted verbal output of individuals, potentially responsibl

    Apr 29, 2010 Read more
  • HD

    Stephen Dill, "The role of System Security Engineering in the engineering lifecycle"

    This seminar will provide an overview of how Information Security ...

    This seminar will provide an overview of how Information Security (AKA Cyber Security, AKA INFOSEC) engineering, requirements analysis and security policies and other activities fit into the overall life cycle of an IT system. We will define an INFOSEC sy

    Apr 22, 2010 Read more
  • HD

    Christian Hammer, "Security of JavaScript in a Browser Environment"

    The power of modern websites emerges to a large extent ...

    The power of modern websites emerges to a large extent from the ability to combine content from different sources. As an example, a site may include a Google map next to business information a user had been searching for. Combining content from possibly u

    Apr 15, 2010 Read more
Loading...