CERIAS Security Seminar Series
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.
Show all Visit Show Website http://www.cerias.purdue.edu/sec...Recently Aired
-
HD
Nora Rifon, "Network Security Begins at Home: Changing Consumer Behavior for i-Safety"
Virus and worm attacks that spread through holes in popular ...
Virus and worm attacks that spread through holes in popular consumer software emphasize the role the online public must play in preserving the safety and integrity of the Internet. To protect the network commons, more users must engage in safe online beha
-
HD
Danfeng Yao, "Verification of Integrity for Outsourced Content Publishing and Database Queries"
In outsourced content publishing, the data owner gives the content ...
In outsourced content publishing, the data owner gives the content to a service provider who answers requests from users. Similarly, in outsourced databases, the data owner delegates a service provider to answer queries. Outsourcing enables fast and fault
-
HD
Ravi Sandhu, "The Secure Information Sharing Problem and Solution Approaches"
The secure information sharing problem is one of the oldest ...
The secure information sharing problem is one of the oldest and most fundamental and elusive problems in information security. Mission objectives dictate that Information must be shared and made available to authorized recipients, and yet information must
-
HD
Gene Kim, " Prioritizing Processes and Controls for Effective and Measurable Security"
Are your security & IT controls really effective? Do you ...
Are your security & IT controls really effective? Do you know how your security & IT operations compare to high performers? In this presentation, Gene Kim will share the work he has been doing over the last six years with the IT Process Institute
-
HD
Hyogon Kim, "Real-Time Visualization of Network Attacks on High-Speed Links"
In this talk, we will see that malicious traffic flows ...
In this talk, we will see that malicious traffic flows such as denial-of-service attacks and various scanning activities can be visualized in an intuitive manner. A simple but novel idea of plotting a packet using its source IP address, destination IP add
-
HD
Ed Finkler, "A Multi-layered Approach to Web Application Defense"
Defending against attacks on a web application is by nature ...
Defending against attacks on a web application is by nature is complex process, one that must address everything from coding practices to user management to network architecture. This talk will describe a number of techniques that, used in concert, will m
-
HD
Sid Stamm, "Invasive Browser Sniffing and Countermeasures"
We describe the detrimental effects of browser cache/ history sniffing ...
We describe the detrimental effects of browser cache/ history sniffing in the context of phishing attacks, and detail an approach that neutralizes the threat by means of URL personalization; we report on an implementation performing such personalization o
-
HD
Ehab Al-Shaer, Ph.D., "Toward Autonomic Security Policy Management"
The assurance of network security is dependent not only on ...
The assurance of network security is dependent not only on the protocols but also on polices that determine the functional behavior of network security devices. Network security devices such as Firewalls, IPSec gateways, IDS/IPS operate based on locally c
-
HD
Virgil D. Gligor, "On the Evolution of Adversary Models for Security Protocols - from the Beginning to Sensor Networks"
Invariably, new technologies introduce new vulnerabilities which, in principle, enable ...
Invariably, new technologies introduce new vulnerabilities which, in principle, enable new attacks by increasingly potent adversaries. Yet new systems are more adept at handling well-known attacks by old adversaries than anticipating new ones. Our adversa
-
HD
John Black, "Recent Attacks on MD5"
Cryptology is typically defined as cryptography (the construction of cryptographic ...
Cryptology is typically defined as cryptography (the construction of cryptographic algorithms) and cryptanalysis (attacks on these algorithms). Both are important, but the latter is more fun. Cryptographic hash functions are one of the core building block