Display Shows:

My Language:

CERIAS Security Seminar Series

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.

Show all Visit Show Website http://www.cerias.purdue.edu/sec...

Recently Aired


  • HD

    Stephen Elliott, "Biometrics and Usability"

    Oct 9, 2014 Read more
  • HD

    Larry Ponemon, "Responsible Information Management and the 2014 Cost of Data Breach: Global Analysis"

    Throughout the world, companies are finding that data breaches have ...

    Throughout the world, companies are finding that data breaches have become as common as a cold but far more expensive to treat. With the exception of Germany, companies had to spend more on their investigations, notification and response when their sensit

    Oct 2, 2014 Read more
  • HD

    Sam Liles, "Threat intelligence and digital forensics"

    There are various forms and types of intelligence but this ...

    There are various forms and types of intelligence but this topic isn�t about how smart you are. It is about how smart you are in figuring out the risks and various impacts against your organization. How do you use digital forensics to determine an adversa

    Sep 25, 2014 Read more
  • HD

    Mark Guido, "MITRE/Purdue Mobile Masquerading User Experiment"

    Periodic Mobile Forensics (PMF) is a MITRE research project investigating ...

    Periodic Mobile Forensics (PMF) is a MITRE research project investigating user behavioral measurement on mobile devices by applying both traditional and mobile forensics processes. We applied our research to an enterprise mobile infrastructure, where we u

    Sep 18, 2014 Read more
  • HD

    Mathias Payer, "WarGames in Memory: Fighting Powerful Attackers"

    Memory corruption (e.g., buffer overflows, random writes, memory allocation bugs, ...

    Memory corruption (e.g., buffer overflows, random writes, memory allocation bugs, or uncontrolled format strings) is one of the oldest and most exploited problems in computer science. These problems are here to stay as low-level languages like C or C++ co

    Sep 11, 2014 Read more
  • HD

    Brendan Saltaformaggio, "DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse"

    State-of-the-art memory forensics involves signature-based scanning of memory images to ...

    State-of-the-art memory forensics involves signature-based scanning of memory images to uncover data structure instances of interest to investigators. A largely unaddressed challenge is that investigators may not be able to interpret the content of data s

    Sep 4, 2014 Read more
  • HD

    Rachel Sitarz, "Women In Cyber Security"

    In our ever connected society, security has become an essential ...

    In our ever connected society, security has become an essential component for all facets of life. Businesses, government, academics, and individually, all facets have a need to protect and secure technology. Over the past 5-10 years, the demand for cyber

    May 1, 2014 Read more
  • HD

    Masooda Bashir, "Online Privacy Agreements, is it Informed Consent?"

    Considering that most consumers do not read Privacy Policies and ...

    Considering that most consumers do not read Privacy Policies and Terms of Service agreements before accepting them, considerable informational asymmetry exists between consumers and cloud service providers regarding the collection and processing of person

    Apr 17, 2014 Read more
  • HD

    Chris Jenkins, "Integrity Levels: A New Paradigm for Protecting Computing Systems"

    As the field of determined and increasingly sophisticated adversaries multiplies, ...

    As the field of determined and increasingly sophisticated adversaries multiplies, the confidence in the integrity of deployed computing devices magnifies. Given the ubiquitous connectivity, substantial storage, and accessibility, the increased reliance on

    Apr 10, 2014 Read more
  • HD

    Philip Ritchey & Mohammed Almeshekah, "CERIAS Poster Contest Winners"

    Apr 3, 2014 Read more
Loading...