Display Shows:

My Language:

CERIAS Security Seminar Series

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.

Show all Visit Show Website http://www.cerias.purdue.edu/sec...

Recently Aired


  • HD

    Tejashree Datar, "Yahoo! Messenger Forensics on Windows Vista and Windows 7"

    The purpose of this study is to identify several areas ...

    The purpose of this study is to identify several areas of forensic interest within the Yahoo! Messenger application, which are of forensic significance. This study focuses on new areas of interest within the file structure of Windows Vista and Windows 7.

    Nov 7, 2013 Read more
  • HD

    Ninghui Li, "Membership Privacy: A Unifying Framework For Privacy Definitions"

    Data collected by organizations and agencies are a key resource ...

    Data collected by organizations and agencies are a key resource in today's information age. The use of sophisticated data mining techniques makes it possible to extract relevant knowledge that can then be used for a variety of purposes, such as research,

    Oct 31, 2013 Read more
  • HD

    Daniel DeLaurentis, "Systems of Systems: Opportunities and Challenges"

    What are Systems of Systems? Why are we interested in ...

    What are Systems of Systems? Why are we interested in them? What about them vex us? These topics will be addressed in this overview talk along with emphasis on the analysis of vulnerabilities in SoS Architectures. Our particular work targets advancements

    Oct 24, 2013 Read more
  • HD

    Paul Thompson, "The Durkheim Project: Privacy Considerations in Predicting Military and Veteran Suicide Risk"

    The DARPA Detection and Computational Analysis of Psychological Signals (DCAPS) ...

    The DARPA Detection and Computational Analysis of Psychological Signals (DCAPS) program provided initial funding for the Durkheim Project. While DCAPS as a whole addressed PTSD, the Durkheim Project sought to predict military and veteran suicide risk. We

    Sep 26, 2013 Read more
  • HD

    Mark Crosbie, Tim Tickel, Four Flynn, " Protecting a billion identities without losing (much) sleep"

    The Facebook security team will share how we approach the ...

    The Facebook security team will share how we approach the security challenges involved in protecting the identities of over a billion users on our site. This talk is partly about our culture, and partly on how we take a practical, risk-based approach to s

    Sep 19, 2013 Read more
  • HD

    John Butterworth, "BIOS Chronomancy: Using Timing-Based Attestation to Detect Firmware Rootkits"

    In 2011 the National Institute of Standard and Technology (NIST) ...

    In 2011 the National Institute of Standard and Technology (NIST) released a draft of special publication 800-155. This document provides a more detailed description than the Trusted Platform Module (TPM) PC client specification for content that should be

    Sep 5, 2013 Read more
  • HD

    Keith Watson, "Information Security Challenges in an Academic Environment"

    The university environment has unique challenges for information security. Just ...

    The university environment has unique challenges for information security. Just as corporate networks have exploded in size, services, users, and devices, university networks also have a continually changing and diverse user population, an open network th

    Aug 29, 2013 Read more
  • HD

    Jarek Duda, "New possibilities of steganography based on Kuznetsov-Tsybakov problem"

    To hide information within a picture we usually replace the ...

    To hide information within a picture we usually replace the least significant bits. This approach is no longer available if there is only 1 bit/pixel like for Quick Response Codes we meet everyday now. I will talk about theoretical limitation and practica

    Aug 22, 2013 Read more
  • HD

    David Pisano, "Identity-Based Internet Protocol Network"

    The Identity-Based Internet Protocol (IBIP) Network project is experimenting with ...

    The Identity-Based Internet Protocol (IBIP) Network project is experimenting with a new enterprise oriented network architecture using standard Internet Protocol to encode identity (ID) information into the IP packet by a new edge security device referred

    Apr 25, 2013 Read more
  • HD

    Rahul Potharaju, "Towards Automated Problem Inference from Trouble Tickets"

    The growing demand for cloud services is driving the need ...

    The growing demand for cloud services is driving the need to deliver an always-on and safe user experience in accessing their data and applications. Examples include web search, social networking, email, ecommerce, video streaming, data analytics and even

    Apr 18, 2013 Read more
Loading...