Display Shows:

My Language:

CERIAS Security Seminar Series

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.

Show all Visit Show Website http://www.cerias.purdue.edu/sec...

Recently Aired


  • HD

    Ashish Kamra, "Responding to Anomalous Database Requests"

    Organizations have recently shown increased interest in database activity monitoring ...

    Organizations have recently shown increased interest in database activity monitoring and anomaly detection techniques to safeguard their internal databases. Once an anomaly is detected, a response from the database is needed to contain the effects of the

    Sep 25, 2008 Read more
  • HD

    Shimon Modi, "Fingerprint Sensor Interoperability: Analysis of Error Rates for Fingerprint Datasets Acquired from Multiple Fingerprint Sensors"

    The last decade has witnessed a huge increase in deployment ...

    The last decade has witnessed a huge increase in deployment of biometric systems, and while most of these systems have been single vendor, monolithic architectures the issue of interoperability is bound to arise as distributed architectures are considered

    Sep 18, 2008 Read more
  • HD

    Dennis Moreau, "Virtualization: Resource Coupling and Security across the Stack"

    Virtualization technology can deliver better IT asset utilization, more agile ...

    Virtualization technology can deliver better IT asset utilization, more agile IT asset allocation, more efficient use of resources, while supporting a potentially more secure IT infrastructure. Virtualization accomplishes these benefits by leveraging mech

    Sep 11, 2008 Read more
  • HD

    Gabriel Ghinita, "Private Queries in Location Based Services: Anonymizers are not Necessary"

    Mobile devices equipped with positioning capabilities (e.g., GPS) can ask ...

    Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must not be disclosed. Existing solutions utilize a trusted anonymizer between the

    Sep 4, 2008 Read more
  • HD

    Minaxi Gupta, "Exploitable Redirects on the Web: Identification, Prevalence, and Defense"

    Web sites on the Internet often use redirection. Unfortunately, without ...

    Web sites on the Internet often use redirection. Unfortunately, without additional security, many of the redirection links can be manipulated and abused to mask phishing attacks. In this work, we prescribe a set of heuristics to identify redirects that ca

    Aug 28, 2008 Read more
  • HD

    Jacob West, "Static source code analysis"

    Creating secure code requires more than just good intentions. Programmers ...

    Creating secure code requires more than just good intentions. Programmers need to know how to make their code safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review their work with

    Apr 17, 2008 Read more
  • HD

    Jack Jones, "Shifting focus: Aligning security with risk management"

    With few exceptions, executive management doesn�t care about security. They ...

    With few exceptions, executive management doesn�t care about security. They care about risk. In this session, Jack will discuss the differences and share his experiences in taking the information security program at a Fortune 100 financial services compan

    Apr 10, 2008 Read more
  • HD

    Hao Chen, "Exploiting Opportunistic Scheduling in Cellular Data Networks"

    Third Generation (3G) cellular networks utilize time-varying and location-dependent channel ...

    Third Generation (3G) cellular networks utilize time-varying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to efficiently utilize spectrum under fairness or QoS constraints. Opportunistic sch

    Apr 3, 2008 Read more
  • HD

    Sencun Zhu, "Towards Event Source Location Privacy in Wireless Sensor Networks"

    For sensor networks deployed to monitor and report real events, ...

    For sensor networks deployed to monitor and report real events, event source location privacy is an attractive and critical security property, which unfortunately is also very difficult and expensive to achieve. This is not only because adversaries may at

    Mar 27, 2008 Read more
  • HD

    Daniel Hoffman, "Hacking the Mobile Workforce"

    Companies spend millions of dollars implementing security technologies to protect ...

    Companies spend millions of dollars implementing security technologies to protect their corporate networks. Laptop computers and other mobile devices lose this protection once they leave the confines of the corporate office. This presentation will define

    Mar 6, 2008 Read more
Loading...