Display Shows:

My Language:

CERIAS Security Seminar Series

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.

Show all Visit Show Website http://www.cerias.purdue.edu/sec...

Recently Aired


  • HD

    Nora Rifon, "Network Security Begins at Home: Changing Consumer Behavior for i-Safety"

    Virus and worm attacks that spread through holes in popular ...

    Virus and worm attacks that spread through holes in popular consumer software emphasize the role the online public must play in preserving the safety and integrity of the Internet. To protect the network commons, more users must engage in safe online beha

    Oct 12, 2006 Read more
  • HD

    Danfeng Yao, "Verification of Integrity for Outsourced Content Publishing and Database Queries"

    In outsourced content publishing, the data owner gives the content ...

    In outsourced content publishing, the data owner gives the content to a service provider who answers requests from users. Similarly, in outsourced databases, the data owner delegates a service provider to answer queries. Outsourcing enables fast and fault

    Oct 5, 2006 Read more
  • HD

    Ravi Sandhu, "The Secure Information Sharing Problem and Solution Approaches"

    The secure information sharing problem is one of the oldest ...

    The secure information sharing problem is one of the oldest and most fundamental and elusive problems in information security. Mission objectives dictate that Information must be shared and made available to authorized recipients, and yet information must

    Sep 28, 2006 Read more
  • HD

    Gene Kim, " Prioritizing Processes and Controls for Effective and Measurable Security"

    Are your security & IT controls really effective? Do you ...

    Are your security & IT controls really effective? Do you know how your security & IT operations compare to high performers? In this presentation, Gene Kim will share the work he has been doing over the last six years with the IT Process Institute

    Sep 21, 2006 Read more
  • HD

    Hyogon Kim, "Real-Time Visualization of Network Attacks on High-Speed Links"

    In this talk, we will see that malicious traffic flows ...

    In this talk, we will see that malicious traffic flows such as denial-of-service attacks and various scanning activities can be visualized in an intuitive manner. A simple but novel idea of plotting a packet using its source IP address, destination IP add

    Sep 14, 2006 Read more
  • HD

    Ed Finkler, "A Multi-layered Approach to Web Application Defense"

    Defending against attacks on a web application is by nature ...

    Defending against attacks on a web application is by nature is complex process, one that must address everything from coding practices to user management to network architecture. This talk will describe a number of techniques that, used in concert, will m

    Sep 7, 2006 Read more
  • HD

    Sid Stamm, "Invasive Browser Sniffing and Countermeasures"

    We describe the detrimental effects of browser cache/ history sniffing ...

    We describe the detrimental effects of browser cache/ history sniffing in the context of phishing attacks, and detail an approach that neutralizes the threat by means of URL personalization; we report on an implementation performing such personalization o

    Aug 31, 2006 Read more
  • HD

    Ehab Al-Shaer, Ph.D., "Toward Autonomic Security Policy Management"

    The assurance of network security is dependent not only on ...

    The assurance of network security is dependent not only on the protocols but also on polices that determine the functional behavior of network security devices. Network security devices such as Firewalls, IPSec gateways, IDS/IPS operate based on locally c

    Aug 24, 2006 Read more
  • HD

    Virgil D. Gligor, "On the Evolution of Adversary Models for Security Protocols - from the Beginning to Sensor Networks"

    Invariably, new technologies introduce new vulnerabilities which, in principle, enable ...

    Invariably, new technologies introduce new vulnerabilities which, in principle, enable new attacks by increasingly potent adversaries. Yet new systems are more adept at handling well-known attacks by old adversaries than anticipating new ones. Our adversa

    Apr 26, 2006 Read more
  • HD

    John Black, "Recent Attacks on MD5"

    Cryptology is typically defined as cryptography (the construction of cryptographic ...

    Cryptology is typically defined as cryptography (the construction of cryptographic algorithms) and cryptanalysis (attacks on these algorithms). Both are important, but the latter is more fun. Cryptographic hash functions are one of the core building block

    Apr 19, 2006 Read more
Loading...