Display Shows:

My Language:

CERIAS Security Seminar Series

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.

Show all Visit Show Website http://www.cerias.purdue.edu/sec...

Recently Aired


  • HD

    David Evans, "Where's the FEEB? Effectiveness of Instruction Set Randomization"

    Instruction Set Randomization (ISR) has been proposed as a promising ...

    Instruction Set Randomization (ISR) has been proposed as a promising defense against code injection attacks. It defuses all standard code injection attacks since the attacker does not know the instruction set of the target machine. A motivated attacker, h

    Mar 9, 2005 Read more
  • HD

    Florian Buchholz, "Using process labels to obtain forensic and traceback information"

    Much of the research in computer security, especially in digital ...

    Much of the research in computer security, especially in digital forensics and intrusion detection, is concerned with retrieving and analyzing the information that is present on a system. In my talk I will analyze what kind of information is actually desi

    Mar 2, 2005 Read more
  • HD

    Jintai Ding, "Perturbation of Multivariable Public-key Cryptosystems"

    Public key cryptography is an indispensable part of most modern ...

    Public key cryptography is an indispensable part of most modern communication systems. However, quantum computers can break cryptosystems like RSA, which are based on

    Feb 23, 2005 Read more
  • HD

    Wenke Lee, "Architectural Considerations for Anomaly Detection"

    The most commonly used intrusion detection system (IDS) performance metrics ...

    The most commonly used intrusion detection system (IDS) performance metrics are detection rate and false alarm rate. From a usability point of view, a very important measurement is Bayesian detection rate, which indicates how likely there is an intrusion

    Feb 9, 2005 Read more
  • HD

    Vitaly Shmatikov, "Obfuscated Databases: Definitions and Constructions"

    I will present some new definitions and constructions for privacy ...

    I will present some new definitions and constructions for privacy in large databases. In contrast to conventional privacy mechanisms that aim to prevent any access to individual records, our techniques are designed to prevent indiscriminate harvesting of

    Feb 2, 2005 Read more
  • HD

    Keith Frikken, "Hidden Access Control Policies with Hidden Credentials"

    In an open environment such as the Internet, the decision ...

    In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather than the identity) of the requester, via digital credentials: Access is granted

    Jan 19, 2005 Read more
  • HD

    Cristina Nita-Rotaru, "Survivable routing in wireless ad hoc networks"

    In an ad hoc wireless network nodes not in direct ...

    In an ad hoc wireless network nodes not in direct range communicate via intermediate nodes. Thus, a significant concern is the ability to route in the presence of Byzantine failures which include nodes that drop, fabricate, modify, replay, or mis-route pa

    Jan 12, 2005 Read more
  • HD

    Dennis Fetterly, "Using Statistical Analysis to Locate Spam Web Pages"

    Commercial web sites are more dependant than ever on being ...

    Commercial web sites are more dependant than ever on being placed prominently within the result pages returned by a search engine to be successful. "Spam" web pages are web pages that are created for the sole purpose of misleading search engines and misdi

    Dec 8, 2004 Read more
  • HD

    William Winsborough, "Attribute-Based Access Control"

    Basing authorization on attributes of the resource requester provides flexibility ...

    Basing authorization on attributes of the resource requester provides flexibility and scalability that is essential in the context of large distributed systems. Logic programming provides an convenient, expressive, and well-understood framework in which t

    Dec 1, 2004 Read more
  • HD

    Indrakshi Ray, "An Anonymous Fair-Exchange E-Commerce Protocol"

    Many business transactions over the Internet involve the exchange of ...

    Many business transactions over the Internet involve the exchange of digital products between two parties -- electronic mails, digital audio and video, electronic contract signing and digital signatures, to name a few. Often these transactions occur betwe

    Nov 17, 2004 Read more
Loading...