CERIAS Security Seminar Series
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.
Show all Visit Show Website http://www.cerias.purdue.edu/sec...Recently Aired
-
HD
David Evans, "Where's the FEEB? Effectiveness of Instruction Set Randomization"
Instruction Set Randomization (ISR) has been proposed as a promising ...
Instruction Set Randomization (ISR) has been proposed as a promising defense against code injection attacks. It defuses all standard code injection attacks since the attacker does not know the instruction set of the target machine. A motivated attacker, h
-
HD
Florian Buchholz, "Using process labels to obtain forensic and traceback information"
Much of the research in computer security, especially in digital ...
Much of the research in computer security, especially in digital forensics and intrusion detection, is concerned with retrieving and analyzing the information that is present on a system. In my talk I will analyze what kind of information is actually desi
-
HD
Jintai Ding, "Perturbation of Multivariable Public-key Cryptosystems"
Public key cryptography is an indispensable part of most modern ...
Public key cryptography is an indispensable part of most modern communication systems. However, quantum computers can break cryptosystems like RSA, which are based on
-
HD
Wenke Lee, "Architectural Considerations for Anomaly Detection"
The most commonly used intrusion detection system (IDS) performance metrics ...
The most commonly used intrusion detection system (IDS) performance metrics are detection rate and false alarm rate. From a usability point of view, a very important measurement is Bayesian detection rate, which indicates how likely there is an intrusion
-
HD
Vitaly Shmatikov, "Obfuscated Databases: Definitions and Constructions"
I will present some new definitions and constructions for privacy ...
I will present some new definitions and constructions for privacy in large databases. In contrast to conventional privacy mechanisms that aim to prevent any access to individual records, our techniques are designed to prevent indiscriminate harvesting of
-
HD
Keith Frikken, "Hidden Access Control Policies with Hidden Credentials"
In an open environment such as the Internet, the decision ...
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather than the identity) of the requester, via digital credentials: Access is granted
-
HD
Cristina Nita-Rotaru, "Survivable routing in wireless ad hoc networks"
In an ad hoc wireless network nodes not in direct ...
In an ad hoc wireless network nodes not in direct range communicate via intermediate nodes. Thus, a significant concern is the ability to route in the presence of Byzantine failures which include nodes that drop, fabricate, modify, replay, or mis-route pa
-
HD
Dennis Fetterly, "Using Statistical Analysis to Locate Spam Web Pages"
Commercial web sites are more dependant than ever on being ...
Commercial web sites are more dependant than ever on being placed prominently within the result pages returned by a search engine to be successful. "Spam" web pages are web pages that are created for the sole purpose of misleading search engines and misdi
-
HD
William Winsborough, "Attribute-Based Access Control"
Basing authorization on attributes of the resource requester provides flexibility ...
Basing authorization on attributes of the resource requester provides flexibility and scalability that is essential in the context of large distributed systems. Logic programming provides an convenient, expressive, and well-understood framework in which t
-
HD
Indrakshi Ray, "An Anonymous Fair-Exchange E-Commerce Protocol"
Many business transactions over the Internet involve the exchange of ...
Many business transactions over the Internet involve the exchange of digital products between two parties -- electronic mails, digital audio and video, electronic contract signing and digital signatures, to name a few. Often these transactions occur betwe