Display Shows:

My Language:

CERIAS Security Seminar Series

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.

Show all Visit Show Website http://www.cerias.purdue.edu/sec...

Recently Aired


  • HD

    Omar Chowdhury, "Regulatory Compliance Checking Over Encrypted Audit Logs"

    Individuals have the privacy expectation that organizations (e.g., bank, hospital) ...

    Individuals have the privacy expectation that organizations (e.g., bank, hospital) that collect personal information from them will not share these personal information with mischievous parties. To prevent unauthorized disclosure of personal information b

    Feb 5, 2015 Read more
  • HD

    Savvas Savvides, "Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds"

    The �pay-as-you-go� cloud computing model has strong potential for efficiently ...

    The �pay-as-you-go� cloud computing model has strong potential for efficiently supporting big data analysis jobs expressed via data-flow languages such as Pig Latin. Due to security concerns � in particular leakage of data � government and enterprise inst

    Jan 29, 2015 Read more
  • HD

    Bharath Samanthula, "Security with Privacy - A Research Agenda"

    Cloud computing is a key technology for storing, managing and ...

    Cloud computing is a key technology for storing, managing and analyzing big data. However, such large, complex, and growing data, typically collected from various data sources, such as sensors and social media, can often contain personally identifiable in

    Jan 22, 2015 Read more
  • HD

    Jackie Rees Ulmer, "Learning from Information Security Maturity: A Textual Analysis"

    The Building Security in Maturity Model V (BSIMM-V) is an ...

    The Building Security in Maturity Model V (BSIMM-V) is an industry-driven maturity model dedicated to software security, which specifies a set of activities designed to foster an improved security posture within the organization. This research explores th

    Jan 15, 2015 Read more
  • HD

    Xiangyu Zhang, "How Program Analysis can be Used in Security Applications"

    This presentation will discuss how program analysis can be used ...

    This presentation will discuss how program analysis can be used in security applications. Three sample applications will be discussed: binary transformation that can mutate and instrument off-the-shelf commodity binary executables, memory forensics that c

    Dec 11, 2014 Read more
  • HD

    Marcus Ranum, "Privacy in the Age of the Police State"

    A great deal of discussion about privacy focuses on the ...

    A great deal of discussion about privacy focuses on the technical details of metadata, data in motion, data at rest, etc -- details which are designed to obscure the basic discussion rather than to illuminate. In this talk we'll look at some of the philos

    Nov 20, 2014 Read more
  • HD

    Kevin Bowers, "You can hack, but you can't hide: Using log analysis to detect APTs"

    In my talk I will be describing new techniques developed ...

    In my talk I will be describing new techniques developed at RSA Labs to analyze massive log data commonly collected by large enterprises to detect and identify suspicious activity. Unlike common signature-based detection mechanisms used today, our approac

    Nov 13, 2014 Read more
  • HD

    Barrett Caldwell and Omar Eldardiry, "Improving Analyst Team Performance and Capability in NOC / SOC Operations Centers"

    Network Operations Center and Security Operations Center (NOC / SOC) ...

    Network Operations Center and Security Operations Center (NOC / SOC) teams have complex and challenging cognitive tasks that are crucial to the IT health of the organization, but existing tools and metrics do not support this range of tasks. To enhance th

    Nov 6, 2014 Read more
  • HD

    Robert Zimmerman, "Healthcare Security and Privacy: Not There Yet"

    The Healthcare Industry; Rapid Growth, Increased Risk Why the Healthcare ...

    The Healthcare Industry; Rapid Growth, Increased Risk Why the Healthcare Industry is behind the curve on Security and Privacy How the Trust Factor affects Adoption of Technology Innovation Healthcare Data is Valuable and Criminals are starting to realize

    Oct 30, 2014 Read more
  • HD

    Golden G. Richard III, ""Memory Analysis, Meet GPU Malware""

    Graphics Processing Units (GPUs) have evolved from very specialized, idiosyncratic ...

    Graphics Processing Units (GPUs) have evolved from very specialized, idiosyncratic hardware intended to execute specialized graphics workloads to semi-autonomous "supercomputers" that can be programmed easily using common programming languages and powerfu

    Oct 23, 2014 Read more
Loading...