Display Shows:

My Language:

CERIAS Security Seminar Series

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.

Show all Visit Show Website http://www.cerias.purdue.edu/sec...

Recently Aired


  • HD

    Ibrahim Baggili, "Extending anonymity research to high-tech white collar crimes and IT Insider threat: A critical step"

    Theories of deindividuation share common grounds, one of which is ...

    Theories of deindividuation share common grounds, one of which is anonymity. For decades, it has been hypothesized that anonymity affects human behavior. With the rise of the popularity and development of personal computing, claims are made that individua

    Dec 11, 2008 Read more
  • HD

    Weidong Cui, "Automatic Signature Generation for Unknown Vulnerabilities"

    In this talk, I will present a new approach to ...

    In this talk, I will present a new approach to automatically generate a vulnerability signature for an unknown vulnerability, given a zero-day attack instance. Our approach is based on two systems we developed: Tupni and ShieldGen. Tupni takes one or more

    Dec 4, 2008 Read more
  • HD

    Sylvia Osborn, "The Role Graph Model and its Extensions"

    The Role Graph Model was first introduced by Nyanchama and ...

    The Role Graph Model was first introduced by Nyanchama and Osborn in 1994. It has been extended over the years to include parameterized roles, an administrative model and a delegation model. We will show how the semantics of our role graph operations diff

    Nov 20, 2008 Read more
  • HD

    John Oritz, "John Oritz, SRA International"

    Steganography is a discipline of computer science whose aim is ...

    Steganography is a discipline of computer science whose aim is to conceal the existence of information. Steganography synergizes various technologies including data compression, digital signal processing, information theory, data networks, cryptography, c

    Nov 13, 2008 Read more
  • HD

    Scott Orton, "The "merge" of Anti-Tamper and Information Assurance - lessons learned from the Anti-Tamper discipline"

    Scott Orton is the Anti-Tamper (AT) subject matter expert at ...

    Scott Orton is the Anti-Tamper (AT) subject matter expert at Raytheon and was previously responsible for establishing the DOD AT executive agency. Scott will discuss the trends in information security driving the merge of AT and IA. He will also discuss v

    Nov 6, 2008 Read more
  • HD

    Kenji Takahashi, "Trends in Identity Management"

    Currently many initiatives are being proposed for identity management, such ...

    Currently many initiatives are being proposed for identity management, such as OpenID, SAML, CardSpace/Information Cards, and OAuth, as its importance is becoming apparent. Identity management is as an integral part of service infrastructures to make iden

    Oct 30, 2008 Read more
  • HD

    Federica Paci, "Access Control and Resiliency for WS-BPEL"

    Business processes �the next generation workflows- have attracted considerable research ...

    Business processes �the next generation workflows- have attracted considerable research interest in the last fifteen years. More recently, several XML-based languages have been proposed for specifying and orchestrating business processes, resulting in the

    Oct 23, 2008 Read more
  • HD

    Adam Dugger, "Signature Analysis Coupled With Slicing Analysis for the Validation of Software"

    What if you could determine exactly where, in any compiled ...

    What if you could determine exactly where, in any compiled binary, a security threat existed? Answering this question has been the fundamental goal of anti-virus software for many years past, with limited success. Instead, what if you could determine not

    Oct 16, 2008 Read more
  • HD

    Yuecel Karabulut, "Measuring the Attack Surfaces of Enterprise Software Systems"

    Software vendors have traditionally focused on improving code quality for ...

    Software vendors have traditionally focused on improving code quality for improving software security and quality. The code quality improvement effort aims toward reducing the number of design and coding errors in software. In principle, we can use formal

    Oct 9, 2008 Read more
  • HD

    Dave Keppler, "Resilient Systems for Mission Assurance"

    The ability for information services to continue operating despite attacks ...

    The ability for information services to continue operating despite attacks is a core enabler of mission assurance goals. Existing security techniques lack this concept of resilience and are inadequate for protecting critical services and data against targ

    Oct 2, 2008 Read more
Loading...