CERIAS Security Seminar Series
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.
Show all Visit Show Website http://www.cerias.purdue.edu/sec...Recently Aired
-
HD
Rohit Ranchal & Payuna Uday & Zhemei Fang, "CERIAS Poster Contest Winners"
"Increasing robustness and resilience: assessing disruptions and dependencies in analysis ...
"Increasing robustness and resilience: assessing disruptions and dependencies in analysis of System-of-Systems alternatives" Researchers: Prof. Daniel Delaurentis, Karen Marais, Navindran Davendralingam, Zhemei Fang, Cesare Guariniello, Payuna Uday "PD3:
-
HD
Yan Huang, "Engineering Secure Computation -- Efficiently"
Secure Multiparty Computation offers cryptographically strong guarantees on the secrecy ...
Secure Multiparty Computation offers cryptographically strong guarantees on the secrecy of data used in collaborative computing among untrusted parties. It has many important applications ranging from peer-to-peer secure auction to privacy-preserving data
-
HD
Rebecca Herold, "Privacy Potpourri: Changing Privacy from the Bottom Up"
Rebecca will provide a brief discussion of the general consideration ...
Rebecca will provide a brief discussion of the general consideration of what �privacy� and �personal information� really are, in addition to important factors when making privacy risk assessment. She will also discuss some of her work and research in rece
-
HD
Kui Ren, "Breaking Mobile Social Networks for Automated User Location Tracking"
Location-based social networks (LBSNs) feature location-based friend discovery services attracting ...
Location-based social networks (LBSNs) feature location-based friend discovery services attracting hundreds of millions of active users world-wide. While leading LBSN providers claim the well-protection of their users� location privacy, in this talk we sh
-
HD
Michelle Dennedy, "Symposium/Michelle Dennedy, Intel"
We will discuss how the known practives and inspirations of ...
We will discuss how the known practives and inspirations of the past can enlighten our path forward into the uncertain seas of Big Data, Clouds and Things that absorb data and even talk back. Privacy engineering as a set of methodologies and cross discipl
-
HD
Andrew Pyles, "Virtual Android Malware Detection and Analysis (VAMDA)"
Mobile application vetting is pivotal to preserve the integrity of ...
Mobile application vetting is pivotal to preserve the integrity of mobile platforms. Existing frameworks typically rely on virtual environments which are easily detected by malware. Advanced malware can avoid detection within existing vetting processes by
-
HD
Xinming Ou, "Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology"
Research on new technologies to help security analysts defend networks ...
Research on new technologies to help security analysts defend networks and systems from attacks has unique challenges --- the ad-hoc nature of attacks and their mitigation makes formal modeling elusive; the diverse threat scenarios of organizations makes
-
HD
Kami Vaniea, "Software updates: decisions and security implications"
Installing security-relevant software updates is one of the best computer ...
Installing security-relevant software updates is one of the best computer protection mechanisms available to end users. Unfortunately, users frequently decide not to install future updates, regardless of whether they are important for security, after nega
-
HD
Ninghui Li, "Privacy Notions for Data Publishing and Analysis"
Data collected by organizations and agencies are a key resource ...
Data collected by organizations and agencies are a key resource in today's information age. The use of sophisticated data mining techniques makes it possible to extract relevant knowledge that can then be used for a variety of purposes, such as research,
-
HD
Mathias Payer, "Code-Pointer Integrity"
Programs are full of bugs, leading to vulnerabilities. We'll discuss ...
Programs are full of bugs, leading to vulnerabilities. We'll discuss power and limitations of code-pointer integrity (CPI), a strong but practical security policy that enforces memory safety for all code pointers, protecting against any form of control-fl