Display Shows:

My Language:

CERIAS Security Seminar Series

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.

Show all Visit Show Website http://www.cerias.purdue.edu/sec...

Recently Aired


  • HD

    Aaron Massey, "Regulatory Compliance Software Engineering"

    Laws and regulations safeguard citizens� security and privacy. For example, ...

    Laws and regulations safeguard citizens� security and privacy. For example, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) governs the security and privacy of electronic health records (EHR) systems. HIPAA violations can result in

    Mar 28, 2013 Read more
  • HD

    Kristin Heckman, "Active Cyber Network Defense with Denial and Deception"

    In January 2012, MITRE performed a real-time, red team/blue team ...

    In January 2012, MITRE performed a real-time, red team/blue team cyber-wargame experiment. This presented the opportunity to blend cyber-warfare with traditional mission planning and execution, including denial and deception tradecraft. The cyber-wargame

    Mar 21, 2013 Read more
  • HD

    Emiliano DeCristofaro, "Whole Genome Sequencing: Innovation Dream or Privacy Nightmare?"

    Recent advances in DNA sequencing technologies have put ubiquitous availability ...

    Recent advances in DNA sequencing technologies have put ubiquitous availability of whole human genomes within reach. It is no longer hard to imagine the day when everyone will have the means to obtain and store one's own DNA sequence. Widespread and affor

    Mar 7, 2013 Read more
  • HD

    Weining Yang, "Minimizing Private Data Disclosures in the Smart Grid"

    Smart electric meters are meters that can measure electric usage ...

    Smart electric meters are meters that can measure electric usage with a pretty high frequency. Smart electric meters pose a substantial threat to the privacy of individuals in their own homes. Combined with a method called non-intrusive load monitors, sma

    Feb 21, 2013 Read more
  • HD

    Rahul Potharaju, "I'm not stealing, I'm merely borrowing - Plagiarism in Smartphone App Markets"

    Plagiarism is the copying of another party's ideas and passing ...

    Plagiarism is the copying of another party's ideas and passing them off as your own. In the world of smartphone app-markets, this is usually followed by confusion for the buyers (users) and lost sales for the original developer. In some cases, these plagi

    Feb 14, 2013 Read more
  • HD

    Chris Gates, "Using Probabilistic Generative Models for Ranking Risks of Android Apps"

    One of Android's main defense mechanisms against malicious apps is ...

    One of Android's main defense mechanisms against malicious apps is a risk communication mechanism which, before a user installs an app, warns the user about the permissions the app requires, trusting that the user will make the right decision. This approa

    Feb 7, 2013 Read more
  • HD

    Christian F. Hempelmann, "A Semantic Baseline for Spam Filtering"

    This paper presents a meaning-based method to spam filtering by ...

    This paper presents a meaning-based method to spam filtering by distinguishing text without content from text with little content from text with normal content, based on the amount of meaning that can be automatically processed in the way humans do. The b

    Jan 31, 2013 Read more
  • HD

    Wahbeh Qardaji, "Differentially Private Publishing of Geospatial Data"

    We interact with location-aware devices on a daily basis. Such ...

    We interact with location-aware devices on a daily basis. Such devices range from GPS-enabled cell-phones and tablets, to navigation systems. Each device can report a multitude of location data to centralized servers. Such location information, commonly r

    Jan 24, 2013 Read more
  • HD

    Bilal Shebaro, "You are Anonymous!!! Then you must be Lucky"

    Services like online banking require high confidentiality due to the ...

    Services like online banking require high confidentiality due to the sensitivity of the data being transfered. As a result, online users have turned to anonymity services which offer identity protection and secure communication in their web transactions.

    Dec 6, 2012 Read more
  • HD

    Ashish Kundu, "A New Class of Buffer Overflow Attacks"

    In this talk, we focus on a class of buffer ...

    In this talk, we focus on a class of buffer overflow vulnerabilities that occur due to the "placement new" expression in C++. "Placement new" facilitates placement of an object/array at a specific memory location. When appropriate bounds checking is not i

    Nov 29, 2012 Read more
Loading...