Display Shows:

My Language:

CERIAS Security Seminar Series

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.

Show all Visit Show Website http://www.cerias.purdue.edu/sec...

Recently Aired


  • HD

    Hal Aldridge, "Not the Who but the What -- New applications of Hardware Identity"

    An essential part of security is controlling access. Traditional access ...

    An essential part of security is controlling access. Traditional access control depends on the a person's ability to prove their identity and the access control system's ability to verify their identity. For computer access, a person usually carries some

    Nov 15, 2012 Read more
  • HD

    Jianneng Cao, "Publishing Microdata with a Robust Privacy Guarantee"

    Today, the publication of microdata poses a privacy threat. Vast ...

    Today, the publication of microdata poses a privacy threat. Vast research has striven to define the privacy condition that microdata should satisfy before it is released, and devise algorithms to anonymize the data so as to achieve this condition. Yet, no

    Nov 8, 2012 Read more
  • HD

    Vaibhav Garg, "Risk perception of information security risks online"

    Perceived risk is informed by a myriad of affective assessments, ...

    Perceived risk is informed by a myriad of affective assessments, nine of which have been examined rigorously for offline risk decisions. Is the risk voluntarily taken? Is the impact of the risk immediate or delayed? Does the individual understand the impl

    Nov 1, 2012 Read more
  • HD

    Mark Guido, "Detecting Maliciousness Using Periodic Mobile Forensics"

    Android Phones are becoming more pervasive at MITRE's customers without ...

    Android Phones are becoming more pervasive at MITRE's customers without any means of measuring malicious user or application behavior. More sensitive information is becoming accessible on these phones, while users have access to this data even in the most

    Oct 25, 2012 Read more
  • HD

    Edmund Jones, "The Boeing Company"

    In this talk EJ will be speaking about a security ...

    In this talk EJ will be speaking about a security development lifecycle necessary to address vulnerabilities in complex systems. The need for software security is clear in today's cyber world. He will be talking about the steps necessary to ensure a high

    Oct 18, 2012 Read more
  • HD

    Chris Kanich, "Understanding Spam Economics"

    Over the past two decades, the Internet has become an ...

    Over the past two decades, the Internet has become an essential tool in the lives of millions of people. Unfortunately, this success has also attracted cybercriminals who exploit the Internet as a platform for illicit gain. Perhaps the most familiar scam

    Oct 11, 2012 Read more
  • HD

    William Enck, " Defending Users Against Smartphone Apps: Techniques and Future Directions"

    Smartphone security research has become very popular in response to ...

    Smartphone security research has become very popular in response to the rapid, world-wide adoption of new platforms such as Android and iOS. Smartphones are characterized by their ability run third-party applications, and Android and iOS take this concept

    Oct 4, 2012 Read more
  • HD

    Marc Brooks, "Leveraging internal network traffic to detect malicious activity: Lessons learned"

    The detection of malicious activity can occur at many places ...

    The detection of malicious activity can occur at many places within an enterprise. One area that is a natural extension of perimeter based approaches is that of internal network monitoring. This talk will discuss work done to better detect malicious activ

    Sep 27, 2012 Read more
  • HD

    Jason Haas, "Global Revocation for the Intersection Collision Warning Safety Application"

    Identifying and removing malicious insiders from a network is a ...

    Identifying and removing malicious insiders from a network is a topic of active research. Vehicular ad hoc networks (VANETs) may suffer from insider attacks; that is, an attacker may use authorized vehicles to attack other vehicles. Specifically, attacker

    Sep 20, 2012 Read more
  • HD

    Sharon Chand & Chad Whitman, "Trends in cyber security consulting"

    Deloitte Security & Privacy will present on recent trends in ...

    Deloitte Security & Privacy will present on recent trends in cyber security consulting, including how industry and regulatory trends are driving change to information security practices. The presentation will also include the anatomy of a cyber incide

    Sep 13, 2012 Read more
Loading...