CERIAS Weekly Security Seminar - Purdue University

By CERIAS

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by CERIAS

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 10
Reviews: 0
Episodes: 1164

Description

CERIAS -- the Nation's top-ranked interdisciplinary academic education and research institute -- hosts a weekly cyber security, privacy, resiliency or autonomy speaker, highlighting technical discovery, a case studies or exploring cyber operational approaches; they are not product demonstrations, service sales pitches, or company recruitment presentations. Join us weekly...or explore 25 years of archives for the who's-who in cybersecurity.

Episode Date
Pragathi Jha, Modeling Cyber Adversaries: A Critical Survey of Methods and Assumptions
Apr 29, 2026
Smriti Bhatt, Evolving Security Landscape in the Agentic AI-Enabled IoT Era
Apr 22, 2026
Gary Hayslip, The AI Arms Race
Apr 15, 2026
Brian Peretti, Symposium Closing Keynote: AI, Cybersecurity, and the Path Forward
Apr 08, 2026
Jen Sims, Analyzing Supply Chain Risk in Mobile Applications for Home Energy Storage Systems
Apr 01, 2026
Ashish Kundu, Quantum Secure Networks
Mar 11, 2026
Ruqi Zhang, Discovering and Controlling AI Safety Risks in Foundation Models: A Probabilistic Perspective
Mar 04, 2026
Danny Vukobratovich, ISO 27001 as the Engine, NIST CSF 2.0 as the Dashboard, A Practical Operating Model
Feb 25, 2026
Thai Le, Towards Robust and Trustworthy AI Speech Models: What You Read Isn't What You Hear
Feb 18, 2026
Bethanie Williams, AI-Assisted Cyber-Physical Attack Detection in Smart Manufacturing Systems
Feb 11, 2026
Mary Jean Amon, Parental Sharing ("Sharenting") Through the Lens of Interdependent Privacy
Feb 04, 2026
Young Kim, Counterfeit Medical Devices and Medicines as a Fundamental Cyber-Physical Security Problem
Jan 28, 2026
Vijayanth Tummala, Evaluating The Impact of Cyberattacks On AI-based Machine Vision Systems: A Case Study of Threaded Fasteners
Jan 21, 2026
Rohan Paleja, Building Interpretability into Human-Aware Robots through Neural Tree-Based Models
Jan 14, 2026
Peter Ukhanov, From MOVEit to EBS – a Look at Mass Exploitation Extortion Campaigns
Dec 10, 2025
Antonio Bianchi, Attacking and Defending Modern Software with LLMs
Dec 03, 2025
Stephen Flowerday, The Hidden Laundromat at Play: how illicit value moves through online games
Nov 19, 2025
Abulhair Saparov, Can/Will LLMs Learn to Reason?
Nov 12, 2025
Hanshen Xiao, When is Automatic Privacy Proof Possible for Black-Box Processing?
Nov 05, 2025
Marcus Botacin, Malware Detection under Concept Drift: Science and Engineering
Oct 29, 2025
Rajiv Khanna, The Shape of Trust: Structure, Stability, and the Science of Unlearning
Oct 22, 2025
Matthew Sharp, Securing Linux in a Heterogenous Enterprise Environment
Oct 15, 2025
Stephen Kines, Four Deadly Sins of Cyber: Sloth, Gluttony, Greed & Pride
Oct 08, 2025
Sanket Naik, AI Agents for DevSecOps
Oct 01, 2025
Richard Thieme, Thinking Like a Hacker in the Age of AI
Sep 24, 2025
Rolf Oppliger, E2EE Messaging: State of the Art and Future Challenges
Sep 17, 2025
Kris Lovejoy, The Converged Threat Landscape: What's Next in Cybersecurity
Sep 10, 2025
Dave Schroeder, Utilization of National Guard Cyber Forces in Title 32 Status for National Cyber Missions
Sep 03, 2025
Nick Selby, Build Things Properly
Aug 27, 2025
Paul Vixie, Force Projection in the Information Domain: Implications of DNS Security
Apr 30, 2025
Tristen Mullins, Using Side-Channels for Critical Infrastructure Protection
Apr 23, 2025
Richard Love, Russian Hacking: Why, How, Who, and to What End
Apr 16, 2025
Josiah Dykstra, Lessons for Cybersecurity from the American Public Health System
Apr 09, 2025
Michael Clothier, Annual CERIAS Security Symposium Closing Keynote IT, OT, IoT — It's Really Just the "T": An International and Historical Perspective
Apr 02, 2025
Tim Benedict, The Future of AI Depends on Guardrails
Mar 26, 2025
Amir Sadovnik, What do we mean when we talk about AI Safety and Security?
Mar 12, 2025
Hisham Zahid & David Haddad, Decrypting the Impact of Professional Certifications in Cybersecurity Careers
Mar 05, 2025
Ali Al-Haj, Zero Trust Architectures and Digital Trust Frameworks: A Complementary or Contradictory Relationship?
Feb 26, 2025
Adam Shostack, Risk is Not Axiomatic
Feb 12, 2025
Mustafa Abdallah, Effects of Behavioral Decision-Making in Proactive Security Frameworks in Networked Systems
Feb 05, 2025
D. Richard Kuhn, How Can We Provide Assured Autonomy?
Jan 29, 2025
Nick Harrell, Mechanisms of Virality in Online Discourse
Jan 22, 2025
Stanislav Kruglik, Querying Twice: How to Ensure We Obtain the Correct File in a Private Information Retrieval Protocol
Jan 15, 2025
Christopher Yeomans, Fairness as Equal Concession: Critical Remarks on Fair AI
Dec 04, 2024
Mason Rice, Adversarial C2 inside OT Networks
Nov 20, 2024
Yanxue Jia, HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted
Nov 06, 2024
Roger Grimes, Many Ways to Hack MFA
Oct 30, 2024
Alessandro Acquisti, Behavioral Advertising and Consumer Welfare
Oct 23, 2024
Xiaoqi Chen, SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes
Oct 16, 2024
Zhou Li, The Road Towards Accurate, Scalable and Robust Graph-based Security Analytics: Where Are We Now?
Oct 09, 2024
Michail Maniatakos, Dissecting the Software Supply Chain of Modern Industrial Control Systems
Oct 02, 2024
Chance Younkin, Shamrock Cyber – When Luck Just Isn't Enough
Sep 25, 2024
Ashok Vardhan Raja, Exploiting Vulnerabilities in AI-Enabled UAV: Attacks and Defense Mechanisms
Sep 18, 2024
Russel Waymire, IDART (Information Design Assurance Red Team): A Red Team Assessment Methodology
Sep 11, 2024
Chris Kubecka de Medina, Empowering the Next Generation of Digital Defenders: Ethics in Cybersecurity and Emerging Technologies
Sep 04, 2024
David Haddad, AI's Security Maze: Navigating AI's Top Cybersecurity Risks Through Strategic Planning and Resilient Operations
Aug 28, 2024
Shagufta Mehnaz, Privacy and Security in ML: A Priority, not an Afterthought
Aug 21, 2024
David Stracuzzi, Defining Trusted Artificial Intelligence for the National Security Space
Apr 24, 2024
Evan Sultanik, In Pursuit of Silent Flaws: Dataflow Analysis for Bugfinding and Triage
Apr 10, 2024
Daniel Shoemaker, Secure Sourcing of COTS Products: A Critical Missing Element in Software Engineering Education
Mar 27, 2024
Douglas Huelsbeck, The Importance of Security by Design & The Importance of Including Cybersecurity Experts in Your Business Decisions
Mar 20, 2024
Alejandro Cuevas, The Fault in Our Stars: How Reputation Systems Fail in Practice
Mar 06, 2024
Sanket Naik, Modern Enterprise Cybersecurity: A CISO perspective
Feb 28, 2024
Jennifer Bayuk, Stepping Through Cybersecurity Risk Management A Systems Thinking Approach
Feb 21, 2024
Jonathan (Jono) Spring, On Security Operations for AI Systems
Feb 14, 2024
Maksim Eren, Tensor Decomposition Methods for Cybersecurity
Feb 07, 2024
William Malik, Multifactor Authentication - The Problem, Recommendations, and Future Concerns
Jan 31, 2024
Solomon Sonya, Enhancing Cybersecurity via Lessons Learned from the Evolution of Malware
Jan 24, 2024
Leigh Metcalf, Grep for Evil
Jan 17, 2024
Sandhya Aneja, Invisible Signatures: Device Fingerprinting in a Connected World
Jan 10, 2024
Mu Zhang, Backtracking Intrusions in Modern Industrial Internet of Things
Dec 06, 2023
Robert Denz, Mind the Gap: Vulnerabilities and Opportunities for Cyber R&D at the Edge
Nov 29, 2023
Andy Ellis, How to Build and Measure a Corporate Security Program
Nov 15, 2023
Wen Masters, Cyber Risk Analysis for Critical Infrastructure
Nov 08, 2023
Steve Lipner, Thinking About the Future of Encryption
Nov 01, 2023
Courtney Falk, The Bride of the Pod People
Oct 25, 2023
Derek Dervishian, Fuzzing: Understanding the Landscape
Oct 18, 2023
Rebecca Herold, Sorting Surveillance Benefits from Harms
Oct 11, 2023
Khaled Serag, Vulnerability Identification and Defense Construction in Cyber-Physical Systems
Oct 04, 2023
Scott Sage, Erin Miller, How the Cyberspace Domain has Changed the Game for the Space Domain
Sep 27, 2023
Christopher Nuland, Enhancing Software Supply Chain Security in Distributed Systems
Sep 20, 2023
Stuart Shapiro, MITRE PANOPTIC™ Privacy Threat Model
Sep 13, 2023
Rita Foster, Cyber defender's plead - If it's not codified – Please go away
Sep 06, 2023
Dr. Anand Singh, The State of Software Supply Chain Security
Aug 30, 2023
Marina Gavrilova, Advancements and New Developments in Biometric Privacy, Security and Ethics
Apr 19, 2023
Kelly FitzGerald, Don't Copy That Floppy!: A History of Anti-cracking Controls in Early Video Games and Its Economic Impact
Apr 12, 2023
Sayak Ray, Pre-Silicon Hardware Security Analysis through Information Flow Tracking - Current Industry Applications and Research Questions
Apr 05, 2023
Wendy Nather, CERIAS Security Symposium Closing Keynote
Mar 29, 2023
Steve Bellovin, 35 Years of Protecting the Internet
Mar 22, 2023
Patrick Schlapfer, Using Endpoint Isolation to Track Malware Trends
Mar 08, 2023
Albert Cheng, Elements of Robust Real-Time Systems: Regularity-Based Virtualization and Functional Reactive Programming
Mar 01, 2023
Arjan Durresi, Trust Engineering – from Developing Resilient Systems to Artificial Conscience
Feb 22, 2023
Dean Cheng, Chinese Views of Information and Future Warfare
Feb 15, 2023
Ronald Keen, Increasing Dependency; Increasing Threat
Feb 08, 2023
Jason Ortiz, Securing Your Software Supply Chain
Feb 01, 2023
Aurobindo Sundaram, Our Journey in Phishing Mitigation
Jan 25, 2023
Mummoorthy Murugesan, Problems and Challenges in Data Security Posture Management
Jan 18, 2023
Ambrose Kam, Applying Multi-Agent Reinforcement Learning (MARL) in a Cyber Wargame Engine
Jan 11, 2023
Julie Haney, Users Are Not Stupid: Six Cybersecurity Pitfalls Overturned
Dec 07, 2022
Meng Xu, Fast and Reliable Formal Verification of Smart Contracts with the Move Prover
Nov 30, 2022
Brian Barnier & Prachee Kale, Making Cybersecurity Reliable and Cybersecurity Careers Rewarding
Nov 16, 2022
Christine Task, Data, Privacy---and the Interactions Between Them
Nov 09, 2022
Ning Zhang, Security and Privacy in the Cyber-physical World
Oct 26, 2022
Florian Kerschbaum, On Using Differential Privacy
Oct 19, 2022
David C. Benson, Stop Selling Cybersecurity Short!: Cybersecurity as a Component of National Power
Oct 12, 2022
Maggie MacAlpine, Ransomware and the Future of Cyberwarfare
Oct 05, 2022
Dipankar Dasgupta, Adaptive Multi-Factor Authentication & Cyber Identity
Sep 28, 2022
Abhilasha Bhargav-Spantzel & Sonnie Ebikwo, "With great power comes great responsibility" – Responsible Cybersecurity Innovations and Investments for Cloud Computing
Sep 21, 2022
James Huffaker, Cyber Security in Aviation
Sep 14, 2022
Cuihua (Cindy) Shen, A Fake Image is Worth a Thousand Lies
Sep 07, 2022
Chris Jenkins, Moving Target Defense for Space Systems
Aug 31, 2022
Kevin Kornegay, IoT Device Security in a Zero Trust Environment
Aug 24, 2022
Máire O'Neill, Securing Connected Devices – Challenge and Opportunities
Apr 27, 2022
Dr. Guan-Hua (Scott) Tu, Enabling a Practically Secure Mobile Networked System
Apr 20, 2022
Paul Rosenzweig, Crowd Forecasting to Enhance Cybersecurity
Apr 13, 2022
Jim Alves-Foss, Automated Function Boundary Detection in Stripped Binaries
Apr 06, 2022
Richard Clarke, Now That We're in a Hybrid War…
Mar 30, 2022
Andy Klein, What You Don't Know About Hard Drives!
Mar 09, 2022
Samuel Visner, The Evolution of Cybersecurity and its Role in the International System
Mar 02, 2022
Chen-Ching Liu, Cyber-Physical System Security of the Power Grid
Feb 23, 2022
Bob Gourley, The Metaverse: Infinite attack surface and boundless risk
Feb 16, 2022
Dr. Chris C. Demchak, Robust Collective Cyber Power across Consolidated Democracies
Feb 09, 2022
Alyssa Miller, Threat Modeling in the World of DevOps
Feb 02, 2022
Dr. David Mussington, Critical Infrastructure Resilience Hinges on Cyber-Physical Convergence
Jan 26, 2022
Chuck Brooks, Leading Trends and Emerging Technologies for Cybersecurity in 2022
Jan 19, 2022
Melissa Dark, Building the Next Generation Cybersecurity Workforce: Progress and Challenges
Jan 12, 2022
Melissa Hathaway & Francesca Spidalieri, Integrating Cybersecurity into Digital Development
Dec 08, 2021
Kacper Gradon, Future Trends in Cyber Crime and Hybrid Warfare
Dec 01, 2021
Lesley Carhart, You Are The Future of Industrial Cybersecurity
Nov 17, 2021
Helen Patton, Navigating the Cybersecurity Profession: Essential Elements for a Satisfying Career
Nov 03, 2021
Jeremiah Blocki, Password Strength Signaling: A Counter-Intuitive Defense Against Password Cracking
Oct 27, 2021
Amit Yoran, Symposium Closing Keynote
Oct 20, 2021
Jordan Mauriello, Understanding Attackers and Motivations
Oct 13, 2021
Yoon Auh, NUTS: The Beta Demo
Oct 06, 2021
Jennifer Bayuk, The History of Cybersecurity Metrics
Sep 29, 2021
Paula deWitte, The Need for Legal Education within a Cybersecurity Curriculum
Sep 22, 2021
Aaron Shafer, Securing SaaS, a Practitioner's Guide
Sep 15, 2021
Jeremy Rasmussen, The Changing Cybersecurity Threatscape
Aug 25, 2021
Nasir Memon, AI, Computational Imaging and the Battle for Media Integrity
Jul 28, 2021
David Dill, A Formal Verifier for the Diem Blockchain Move Language
Jul 21, 2021
Dave Henthorn, Educating the Next Generation on the Challenges of Securing Critical Infrastructure
Jul 14, 2021
Winn Schwartau, Security is Probabilistic, Not Deterministic: Get Over It
Jul 07, 2021
Neil Daswani, Big Breaches: Cybersecurity Lessons For Everyone
Jun 30, 2021
Laura Thomas, National Security Implications of Quantum Technology
Jun 23, 2021
Ida Ngambeki, Understanding the Human Hacker
Jun 16, 2021
Neil Gong, Secure Federated Learning
Jun 09, 2021
Leigh Metcalf, The Gauntlet of Cybersecurity Research
Jun 02, 2021
Gary McGraw, Security Engineering for Machine Learning
May 26, 2021
Steven Furnell, Cybersecurity Skills – Easy to say, harder to recognise?
Apr 28, 2021
Ira Winkler, You Can Stop Stupid: Human Security Engineering
Apr 21, 2021
Yimin Chen, Delving into differential privacy and anomaly detection: a meta-learning perspective
Apr 14, 2021
Tawei (David) Wang, The Invisible Risks: An Empirical Analysis on Data Sharing Activities and Systemic Risk among the Data Brokers
Apr 07, 2021
Frederick Scholl, Cybercrime: A Proposed Solution
Mar 31, 2021
Jack Daniel, The Shoulders of InfoSec
Mar 24, 2021
Santiago Torres-Arias, Practical software Supply Chain Security and Transparency
Mar 17, 2021
Greg Akers, SDN/NFV in the ICS, SCADA and Manufacturing World as a Cyber Security Tool
Mar 10, 2021
Randall Brooks, Cyber Supply Chain Risk Management (SCRM) and its impact on information and Operational Technology (IT/OT)
Mar 03, 2021
Caroline Wong, Security Industry Context
Feb 24, 2021
Cory Doctorow, Technology, Self-Determination, and the Future of the Future
Feb 17, 2021
Levi Lloyd, Securing the Software Supply Chain
Feb 10, 2021
Steve Lipner, Lessons Learned – Fifty Years of Mistakes in Cybersecurity
Feb 03, 2021
Scott Shackelford, The Internet of Things: What Everyone Needs to Know
Jan 27, 2021
Adwait Nadkarni, ​Building Practical Security Systems for the ​Post-App​ Smart Home
Jan 20, 2021
Lorrie Cranor, Security and Privacy for Humans
Dec 09, 2020
Kimberly Ferguson-Walter, Maximizing Cyber Deception to Improve Security: An Empirical Analysis
Dec 02, 2020
Sivaram Ramanathan, Improving the Accuracy of Blocklists by Aggregation and Address Reuse Detection
Nov 18, 2020
Abhilasha Bhargav-Spantzel, Fearless Computing
Nov 11, 2020
Kelley Misata, Results from the Field: Cybersecurity in Nonprofits and Why it Matters
Nov 04, 2020
Yoon Auh, NUTS: eNcrypted Userdata Transit & Storage; Viewing Data as an Endpoint™ (DaaE) using Structured Cryptography
Oct 28, 2020
Jeff Man, Why Attack When You Can Defend
Oct 21, 2020
Courtney Falk, The Pod People Campaign: Driving User Traffic via Social Networks
Oct 14, 2020
Michael Clark, From Machine Learning Threats to Machine Learning Protection Requirements
Oct 07, 2020
, Global Challenges in Security and Privacy Policy: elections, pandemics, and biometric technologies
Sep 30, 2020
Osman Ismael, TCB: From Assumption to Assurance
Sep 23, 2020
Warda Zahid Khan, Authentication: Behind The Scenes When You Click "Check Out"
Sep 16, 2020
Rich Banta, EMP Threat & Protection
Sep 09, 2020
Roger Schell, Dramatically Reducing Attack Surface Using Integrity MAC Security Kernel
Sep 02, 2020
Jeremiah Sahlberg, From Compliance in the Classroom to Compliance on the Street, Important Lessons That Every Cybersecurity Professional Must Know
Aug 26, 2020
Elena Peterson, Flexible and Adaptive Malware Identification Using Techniques from Biology
Aug 19, 2020
Shimon Modi, Value of Cyber Threat Intelligence in Modern Security Operations
Aug 12, 2020
Carter Bullard, Network Awareness and Predictive Cyber Analytics
Jul 29, 2020
Sam Curry and Alon Kaufman, The Ghost in the Machine: Reconciling AI and Trust in the Connected World
Jul 22, 2020
Joe Weiss, Cyber Security of Control Systems: The Second Coming of the Maginot Line
Jul 15, 2020
Jim Richberg, Election Security in the Age of COVID-19: Risk Management in the face of a "Perfect Storm"
Jul 01, 2020
Nandi Leslie, Using Machine Learning for Network Intrusion Detection
Jun 24, 2020
Sami Saydjari, A Principled Approach to Cybersecurity Engineering
Jun 17, 2020
Corey Maypray, Proactive Endpoint and Network Security Operations. Detecting the Unknown Known
Apr 29, 2020
Bruce Coffing, Public Sector Cyber Security 2020: Challenges and Rewards
Apr 22, 2020
Leon Ravenna, Everyone Wants to Help You: Understanding the Issues and Surviving with a Multitude of Regulatory Authorities
Apr 15, 2020
Elliott Peterson, Mirai - DDoS and the Criminal Ecosystem
Apr 08, 2020
Neil Rowe, Empirical Digital Forensics
Apr 01, 2020
Nick Sturgeon, Cyber Risk Management 101
Mar 25, 2020
Vireshwar Kumar, Security and Privacy of Connected Autonomous Vehicles
Mar 11, 2020
Matt Mickelson, Physics-Based Approaches for creating Cyber Resilient Systems
Mar 04, 2020
Yuhong Nan, Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps
Feb 26, 2020
Doug Rapp, Security, Ethics and the End of the World as We Know It
Feb 19, 2020
Char Sample, The Role of Culture in Cybersecurity
Feb 12, 2020
Syed Rafiul Hussain, Automated Reasoning of Security and Privacy of Cellular Networks
Feb 05, 2020
Abe Baggili, Immersive Virtual Insanity: Exploring Immersive Virtual Reality Security and Forensics
Jan 29, 2020
Morgan Princing, Identifying Security Risks Using Internet-Wide Scan Data
Jan 22, 2020
Sriharsha Etigowni, Contactless Control Flow Monitoring via Electromagnetic Emanations
Jan 15, 2020
Boyang Wang, Fingerprinting Encrypted Voice Commands on Smart Speakers
Dec 04, 2019
Mohsen Minaei, Forgetting the Forgotten: Conceal Content Deletions from Persistent Observers
Nov 20, 2019
Celeste Paul, Hacking Stressed: Frustration, burnout, and the pursuit of happiness
Nov 13, 2019
James Cole, Securing the Internet of Things
Nov 06, 2019
Mitch Parker, Bitcoin and other dreams of utopian thinking-what happens when they meet reality?
Oct 30, 2019
Leon Ravenna, Your Privacy has been Breached
Oct 23, 2019
Andrew Rozema, 'Networking' Skills for Cybersecurity
Oct 16, 2019
Chet Hosmer, Forensic Identification of Fake Digital Photographs
Oct 09, 2019
Chris Jenkins, Moving Target Defense for a Serial Communication Protocol
Oct 02, 2019
Aritra Mitra, A New Approach to Distributed Hypothesis Testing and Non-Bayesian Learning: Improved Learning Rate and Byzantine Resilience
Sep 11, 2019
Luke Butcher, Connected Intelligence
Sep 04, 2019
Steve Lodin, The Golden Rules of Security and Assurance
Aug 28, 2019
Eugene Spafford, Rethinking Cyber Security
Aug 21, 2019
Lauren Featherstun, Shivam Trivedi, Brian Werts, Erik Gough, The Purdue Live Security Analyzer (PULSAR)
Apr 24, 2019
Robert Mundt, Protecting your online Identity in a world of modern application architecture
Apr 17, 2019
Jim Routh, The Rise of Unconventional Security Controls
Apr 10, 2019
Krishna Kavi, Hardware Cybersecurity Attacks and Some Solutions
Apr 03, 2019
Wei Jiang, Efficient and Constant-Round Secure Comparison through Function Transformation, Dynamic Group Switching and Asymmetric Computation
Mar 27, 2019
Sathish Kumar, Securing IoT-based Cyber-Physical Human Systems against diverse attacks
Mar 20, 2019
Charles Kamhoua, Game Theoretic Modeling of Cyber Deception in the Internet of Battlefield Things
Mar 06, 2019
Bowei Xi, A Game Theoretic Approach for Adversarial Machine Learning -- When Big Data Meets Cyber Security
Feb 27, 2019
Meng Yu, Protection against Compromised Operating Systems on ARM Cortex-A Architecture
Feb 20, 2019
David Ebert, Trustable Information for Security Applications: Visual Analytics for Reliable, Effective Decision Making
Feb 06, 2019
Sanjay Madria, Secure Information Forwarding through Fragmentation in Delay- tolerant Networks
Jan 23, 2019
Chris Clifton, A Data Privacy Primer
Jan 16, 2019
Haotian Deng, CEIVE: Combating Caller ID Spoofing on 4G Mobile Phones Via Callee-Only Inference & Verification
Jan 09, 2019
Yousra Aafer, Normalizing Diverse Android Access Control Checks for Inconsistency Detection
Dec 05, 2018
James Lerums, Developing a Public/Private Cybersecurity Scorecard for the State of Indiana
Nov 28, 2018
Courtney Falk, Enemy Perspectives: When Nation-States Meet Cybercriminals
Nov 14, 2018
Jason Ortiz, IoT Security: Living on the Edge
Nov 07, 2018
Meng Xu, Precise and Scalable Detection of Double-Fetch Bugs in Kernels
Oct 31, 2018
Mark Loepker, 80/20 Rule-Cyber Hygiene
Oct 24, 2018
Ryan Goldsberry, Applied Cyber and Mobile Security Consulting
Oct 17, 2018
Jessy Irwin, Double the Factors, Double the Fails: How Usability Obstacles Impact Adoption of Strong Authentication Habits
Oct 10, 2018
Shiqing Ma, Kernel-Supported Cost-Effective Audit Logging for Causality Tracking
Sep 26, 2018
Jillean Long Battle, What's Private: Exploring Reasonable Expectation of Privacy in the Age of Modern Innovation
Sep 19, 2018
Doug Rapp, Breaching Water Treatment Plants: Lessons Learned from Complex Exercises
Sep 05, 2018
Ryan Elkins, Hacking Your Security Career: Strategies That College Did Not Teach Me
Aug 29, 2018
Abe Clements, Protecting Bare-metal Embedded Systems from Memory Corruption Attacks
Aug 22, 2018
Cristina Ledezma, DoD Cyber Requirements and Directives
Apr 25, 2018
Leon Ravenna, Personally Identifiable Data and the Specter of Customer Privacy
Apr 18, 2018
Debajyoti Das, Anonymity Trilemma : Strong Anonymity, Low Bandwidth Overhead, Low Latency – Choose Two.
Apr 11, 2018
Josh Corman, Symposium Closing Keynote - Bits & Bytes, Flesh & Blood, and Adapting for the Next 20 Years
Apr 04, 2018
Chris Reed, Leveraging DevSecOps to Escape the Hamster Wheel of Never-ending Security Fail
Mar 28, 2018
Pedro Moreno-Sanchez, Mind Your Credit: Assessing the Health of the Ripple Credit Network
Mar 21, 2018
Nathan Burrow, CFIXX -- Object Type Integrity for C++
Mar 07, 2018
Courtney Falk, Threats and Risks in Cryptocurrencies
Feb 28, 2018
Mitchell Parker, Lessons Learned From the Retrocomputing Community
Feb 21, 2018
Adil Ahmad, OBLIVIATE: A Data Oblivious File System for Intel SGX
Feb 14, 2018
Brian Lynch, Eli Lilly's Path to a Successful Threat Intelligence Program
Feb 07, 2018
Matt Dimino, State of Cybersecurity in Healthcare
Jan 31, 2018
Lotfi ben-Othmane, What Roles Can Empirical Research Play to Advance Software Security Knowledge?
Jan 24, 2018
Ben Harsha, The Economics of Offline Password Cracking
Jan 17, 2018
Nat Shere, Penetration Testing: What? Why? How?
Dec 06, 2017
Kirsten Bay, Securing the Future of Business: Broadening the Role of Security Technology
Nov 29, 2017
Abhishek Ray, Ad-Blockers: Extortionists or Digital Age Robin Hoods?
Nov 15, 2017
Nikita Borisov, Refraction Networking: Censorship Circumvention in the Core of the Internet
Nov 08, 2017
Mikhail J. Atallah, Opportunities and Perils of the Cyber Revolution
Nov 01, 2017
Jerome Edge, Applying commercial best practices to DoD risk management to offer suggestions how to move from risk avoidance to cost effective risk management
Oct 25, 2017
Tianhao Wang, Locally Differential Private Protocols for Frequency Estimation
Oct 18, 2017
Jeremiah Blocki, Memory Hard Functions and Password Hashing
Oct 11, 2017
Xiaonan Guo, Friend or Foe? Your Wearable Devices Reveal Your Personal PIN
Oct 04, 2017
Tony Huffman, Vulnerability Scanning, how it works and why
Sep 27, 2017
Vince D'Angelo, Counter UAS Challenges and Technology
Sep 20, 2017
Bob Cheripka, Advanced Testing Assessments in the Power & Utilities Industry
Sep 13, 2017
Doug Smith, Secure Code Development
Sep 06, 2017
Chris Roberts, The Stark Reality of Red vs. Blue and Why it's Not Working
Aug 30, 2017
Shiqing Ma, MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning
Aug 23, 2017
Adam Bates, Enabling Trust and Efficiency in Provenance-Aware Systems
Apr 26, 2017
Ron Ross, Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices
Apr 19, 2017
Limin Jia, Information Flow Security in Practical Systems
Apr 12, 2017
Scott Carr, DataShield: Configurable Data Confidentiality and Integrity
Mar 29, 2017
Tawei (David) Wang, CIO Risk Appetite and Information Security Management
Mar 22, 2017
Stephen Reynolds, The Rise of Cyber-Crime: A Legal Perspective
Mar 08, 2017
Yonghwi Kwon, A2C: Self Destructing Exploit Executions via Input Perturbation
Feb 22, 2017
Ashish Hota, Behavioral and Computational Aspects of Network Security Games
Feb 15, 2017
Neil Cassidy, Cyber Security in Large Complex Corporations
Feb 08, 2017
Vincent Urias, Network Deception as a Threat Intelligence Platform
Feb 01, 2017
Jean Camp, Changing the Economics of the Network
Jan 25, 2017
Nick Sturgeon, Emerging Cyber Threats
Jan 18, 2017
Aniket Kate, Differential Guarantees for Cryptographic Systems
Jan 11, 2017
Yinqian Zhang, When Side Channel Meets Row Hammer: Cache-Memory Attacks in Clouds and Mobile Devices
Dec 07, 2016
Abhilasha Bhargav-Spantzel, Digital Identity Protection
Nov 30, 2016
Corey Holzer, The Application of Natural Language Processing to Open Source Intelligence for Ontology Development in the Advanced Persistent Threat Domain
Nov 16, 2016
Sanjai Narain, A Science of Cyber Infrastructure Configuration
Nov 09, 2016
Victor Raskin, New Research and Resources in NL IAS at Purdue
Oct 26, 2016
Jeremiah Blocki, Usable and Secure Human Authentication
Oct 19, 2016
Terry Ching-Hsiang Hsu, Enforcing Least Privilege Memory Views for Multithreaded Applications
Oct 12, 2016
Tony Sager, Growing Up In Cyber, But Is Cyber Growing Up?
Oct 05, 2016
Nicholas Reuhs, The role of cyber insurance in security and risk management
Sep 28, 2016
Aniket Kate, The Internet of Value: Privacy and Applications
Sep 21, 2016
Di Jin, General Motors Product Cybersecurity Overview
Sep 14, 2016
Maria Andrews, Improving Outcomes with Services
Sep 07, 2016
Srivatsan Ravi, Towards Safe In-memory Transactions
Aug 31, 2016
Michael Taylor, Secure Coding - Patterns and anti-patterns in the design & architecture of secure applications
Aug 24, 2016
Christopher N. Gutierrez, ErsatzPasswords - Ending Password Cracking
Apr 27, 2016
Kelley Misata, Information Security: Through the Lens of Crisis Organizations
Apr 20, 2016
Richard M. (Dickie) George, Life as a Target
Apr 20, 2016
Pedro Moreno Sanchez, Privacy-preserving payments in credit networks
Apr 13, 2016
Endadul Hoque, Finding Specification Noncompliance and Attacks in Wireless Network Protocol Implementations
Apr 06, 2016
Chris Kanich, Bottom Line Security: Understanding the True Cost of Cybersecurity Attacks
Mar 30, 2016
Kent Seamons, Usable Secure Webmail for Grassroots Adoption
Mar 23, 2016
Ryan Henry, Batch Techniques for Practical Private Information Retrieval
Mar 09, 2016
Anupam Joshi, Context Aware, Policy based approaches to Security
Mar 02, 2016
Xukai Zou, Resilient, privacy-preserving, revocable and user-centric authentication – Biometric Capsule
Feb 24, 2016
Bruno Ribeiro, Predicting What Users Will do Next
Feb 17, 2016
Nicholas Sturgeon, IN-ISAC: SOC, Security Awareness and More
Feb 10, 2016
Hemanta Maji, Robust Secure Computation
Feb 03, 2016
Elisa Bertino, Big Data Security and Privacy
Jan 27, 2016
Chris Clifton, Privacy in Big Data: Thinking Outside the Anonymity/Confidentiality Box
Jan 20, 2016
Jim Gallagher, Microsemi Security Solutions and Threat Driven Security
Jan 13, 2016
Aniket Kate, Preventing or Penalizing Equivocation in Decentralized Environments
Dec 09, 2015
Laura Amo, Gender Gaps in Cybersecurity Engagement and Self-Efficacy Growth Trajectories
Dec 02, 2015
Jongho Won, A Secure Communication Protocol for Drones and Smart Objects
Nov 18, 2015
Ariel Feldman, Verifying Computations with (Private) State
Nov 11, 2015
Balamurugan Anandan, Secure Multiparty Computation and Differential Privacy
Nov 04, 2015
Kate Seigfried-Spellar, Case Study of the Authur Pendragon Cyber Threat at The University of Alabama
Oct 28, 2015
Koray Mancuhan, Anonymized Data
Oct 21, 2015
Fang-Yu Rao, A Hybrid Private Record Linkage Scheme: Separating Differentially Private Synopses FromMatching Records
Oct 14, 2015
Kevin McPeak, The Five W's of Mobile Malware: Examining the Who, What, When, Where, and Why
Oct 07, 2015
Omar Chowdhury, Applying Formal Verification Techniques for Checking Compliance of Computer Systems and Protocols
Sep 30, 2015
Kexin Pei, LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis
Sep 23, 2015
John Feddema, Evaluation of Urban Vehicle Tracking Algorithms
Sep 16, 2015
Yonghwi Kwon, P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions
Sep 09, 2015
Jianjun Huang, SUPOR: Precise and Scalable Sensitive User Input Detection for Mobile Apps
Sep 02, 2015
Samuel Jero, Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations
Aug 26, 2015
Steve Bellovin, Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet
Apr 29, 2015
Rohit Ranchal & Payuna Uday & Zhemei Fang, CERIAS Poster Contest Winners
Apr 22, 2015
Yan Huang, Engineering Secure Computation -- Efficiently
Apr 15, 2015
Rebecca Herold, Privacy Potpourri: Changing Privacy from the Bottom Up
Apr 08, 2015
Kui Ren, Breaking Mobile Social Networks for Automated User Location Tracking
Apr 01, 2015
Michelle Dennedy, Symposium/Michelle Dennedy, Intel
Mar 25, 2015
Andrew Pyles, Virtual Android Malware Detection and Analysis (VAMDA)
Mar 11, 2015
Xinming Ou, Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology
Mar 04, 2015
Kami Vaniea, Software updates: decisions and security implications
Feb 25, 2015
Ninghui Li, Privacy Notions for Data Publishing and Analysis
Feb 18, 2015
Mathias Payer, Code-Pointer Integrity
Feb 11, 2015
Omar Chowdhury, Regulatory Compliance Checking Over Encrypted Audit Logs
Feb 04, 2015
Savvas Savvides, Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds
Jan 28, 2015
Bharath Samanthula, Security with Privacy - A Research Agenda
Jan 21, 2015
Jackie Rees Ulmer, Learning from Information Security Maturity: A Textual Analysis
Jan 14, 2015
Xiangyu Zhang, How Program Analysis can be Used in Security Applications
Dec 10, 2014
Marcus Ranum, Privacy in the Age of the Police State
Nov 19, 2014
Kevin Bowers, You can hack, but you can't hide: Using log analysis to detect APTs
Nov 12, 2014
Barrett Caldwell and Omar Eldardiry, Improving Analyst Team Performance and Capability in NOC / SOC Operations Centers
Nov 05, 2014
Robert Zimmerman, Healthcare Security and Privacy: Not There Yet
Oct 29, 2014
Golden G. Richard III, "Memory Analysis, Meet GPU Malware"
Oct 22, 2014
Stephen Elliott, Biometrics and Usability
Oct 08, 2014
Larry Ponemon, Responsible Information Management and the 2014 Cost of Data Breach: Global Analysis
Oct 01, 2014
Sam Liles, Threat intelligence and digital forensics
Sep 24, 2014
Mark Guido, MITRE/Purdue Mobile Masquerading User Experiment
Sep 17, 2014
Mathias Payer, WarGames in Memory: Fighting Powerful Attackers
Sep 10, 2014
Brendan Saltaformaggio, DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse
Sep 03, 2014
Rachel Sitarz, Women In Cyber Security
Apr 30, 2014
Masooda Bashir, Online Privacy Agreements, is it Informed Consent?
Apr 16, 2014
Chris Jenkins, Integrity Levels: A New Paradigm for Protecting Computing Systems
Apr 09, 2014
Philip Ritchey & Mohammed Almeshekah, CERIAS Poster Contest Winners
Apr 02, 2014
Joshua Corman, Why so CERIAS!? Why we're losing and what to do about it.
Mar 26, 2014
Marina Blanton, General-Purpose Secure Computation and Outsourcing
Mar 12, 2014
Marina Gavrilova, Machine Intelligence for Biometric and On-Line Security
Mar 05, 2014
Rahul Potharaju, Delivering "Always-on" Services Despite Flaky Network Infrastructure
Feb 26, 2014
Ed Felten, Technical Tradeoffs in the NSA's Mass Phone Call Program
Feb 19, 2014
Ting-Fang Yen, Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks
Feb 12, 2014
Shumiao Wang, Secure and Private Outsourcing to Untrusted Cloud Servers
Jan 29, 2014
Marina Kaljurand, Economic Policy and Cyber Challenges in Estonia
Dec 04, 2013
Muhammad Umer Arshad, Trust Management for Publishing Graph Data
Nov 20, 2013
Randall Brooks, Cloud Security: How Does Software Assurance Apply
Nov 13, 2013
Tejashree Datar, Yahoo! Messenger Forensics on Windows Vista and Windows 7
Nov 06, 2013
Ninghui Li, Membership Privacy: A Unifying Framework For Privacy Definitions
Oct 30, 2013
Daniel DeLaurentis, Systems of Systems: Opportunities and Challenges
Oct 23, 2013
Paul Thompson, The Durkheim Project: Privacy Considerations in Predicting Military and Veteran Suicide Risk
Sep 25, 2013
Mark Crosbie, Tim Tickel, Four Flynn, Protecting a billion identities without losing (much) sleep
Sep 18, 2013
John Butterworth, BIOS Chronomancy: Using Timing-Based Attestation to Detect Firmware Rootkits
Sep 04, 2013
Keith Watson, Information Security Challenges in an Academic Environment
Aug 28, 2013
Jarek Duda, New possibilities of steganography based on Kuznetsov-Tsybakov problem
Aug 21, 2013
David Pisano, Identity-Based Internet Protocol Network
Apr 24, 2013
Rahul Potharaju, Towards Automated Problem Inference from Trouble Tickets
Apr 17, 2013
Aaron Massey, Regulatory Compliance Software Engineering
Mar 27, 2013
Kristin Heckman, Active Cyber Network Defense with Denial and Deception
Mar 20, 2013
Emiliano DeCristofaro, Whole Genome Sequencing: Innovation Dream or Privacy Nightmare?
Mar 06, 2013
Weining Yang, Minimizing Private Data Disclosures in the Smart Grid
Feb 20, 2013
Rahul Potharaju, I'm not stealing, I'm merely borrowing - Plagiarism in Smartphone App Markets
Feb 13, 2013
Chris Gates, Using Probabilistic Generative Models for Ranking Risks of Android Apps
Feb 06, 2013
Christian F. Hempelmann, A Semantic Baseline for Spam Filtering
Jan 30, 2013
Wahbeh Qardaji, Differentially Private Publishing of Geospatial Data
Jan 23, 2013
Bilal Shebaro, You are Anonymous!!! Then you must be Lucky
Dec 05, 2012
Ashish Kundu, A New Class of Buffer Overflow Attacks
Nov 28, 2012
Hal Aldridge, Not the Who but the What -- New applications of Hardware Identity
Nov 14, 2012
Jianneng Cao, Publishing Microdata with a Robust Privacy Guarantee
Nov 07, 2012
Vaibhav Garg, Risk perception of information security risks online
Oct 31, 2012
Mark Guido, Detecting Maliciousness Using Periodic Mobile Forensics
Oct 24, 2012
Edmund Jones, The Boeing Company
Oct 17, 2012
Chris Kanich, Understanding Spam Economics
Oct 10, 2012
William Enck, Defending Users Against Smartphone Apps: Techniques and Future Directions
Oct 03, 2012
Marc Brooks, Leveraging internal network traffic to detect malicious activity: Lessons learned
Sep 26, 2012
Jason Haas, Global Revocation for the Intersection Collision Warning Safety Application
Sep 19, 2012
Sharon Chand & Chad Whitman, Trends in cyber security consulting
Sep 12, 2012
Ed Lopez, The Inertia of Productivity
Sep 05, 2012
Lewis Shepherd, Challenges for R&D in the Security Field
Aug 29, 2012
Scott Andersen, The New Frontier, Welcome the Cloud Brokers
Aug 22, 2012
Christine Task, A Practical Beginners' Guide to Differential Privacy
Apr 25, 2012
Steve Battista, What firmware exists in your computer and how the fight for your systems will be below your operating system
Apr 18, 2012
Traian Truta, : K-Anonymity in Social Networks: A Clustering Approach
Apr 11, 2012
Nabeel Mohamed, Privacy preserving attribute based group key management
Mar 28, 2012
Randall Brooks, Adding a Software Assurance Dimension to Supply Chain Practices
Mar 21, 2012
Chenyun Dai, Privacy-Preserving Assessment of Location Data Trustworthiness
Mar 07, 2012
Nishanth Chandran, Cryptographic Protocols in the Era of Cloud Computing
Feb 29, 2012
Ben Calloni, Vulnerability Path and Assessment
Feb 22, 2012
Simson Garfinkel, Forensic Carving of Network Packets with bulk_extractor and tcpflow
Feb 15, 2012
Kelley Misata, Digital Citizenship: A Target's View of Security and Life Online
Feb 08, 2012
George Vanecek, Is it Time to add Trust to the Future Internet/Web?
Feb 01, 2012
Frank Tompa, A Flexible System for Access Control
Jan 25, 2012
Salmin Sultana, Secure Provenance Transmission for Data Streams
Jan 18, 2012
Stephen Elliott, Introduction to Biometrics
Jan 11, 2012
Apu Kapadia, Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones
Nov 30, 2011
Loukas Lazos, Jam me if you can: Mitigating the Impact of Inside Jammers
Nov 16, 2011
Zhongshu Gu, Process Implanting: A New Active Introspection Framework for Virtualization
Nov 09, 2011
Morgan Greenwood, SureView AMP, Active Malware Protection, detecting malware anti virus solutions miss
Nov 02, 2011
Sheila Becker, Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack
Oct 26, 2011
Julia M. Taylor, Victor Raskin, and Eugene H. Spafford, Ontological Semantic Technology Goes Phishing
Oct 19, 2011
Dan McWhorter and Steve Surdu, Enterprise-Wide Intrusions Involving Advanced Threats
Oct 12, 2011
Hal Aldridge, Trusted Computing and Security for Embedded Systems
Oct 05, 2011
Xukai Zou, Weighted Multiple Secret Sharing
Sep 28, 2011
Joe Leonard, Methods and Techniques for Protecting Data in Real Time on the Wire
Sep 21, 2011
David Zage, What does Knowledge Discovery, Predictability, and Human Behavior have to do with Computer Security
Sep 14, 2011
Steven Gianvecchio, Detecting Bots in Online Games using Human Observational Proofs
Sep 07, 2011
Tamir Tassa, Non-homogeneous Anonymizations
Aug 31, 2011
Scott Hollenbeck, Provisioning Protocol Challenges in an Era of gTLD Expansion
Aug 24, 2011
Eric Katz, Mobile Phones and Evidence Preservation
Apr 27, 2011
Jose Fernandez, Semantic Security: or How I Learned to Stop Worrying and Looooooove the Internet
Apr 20, 2011
Ronda R. Henning, FuzzyFusion™, an application architecture for multisource information fusion
Apr 13, 2011
Carter Bullard, Society, Law Enforcement and the Internet: Models for Give and Take
Apr 06, 2011
Kim Trieu, Wireless Technologies and how it relates to cyber security research
Mar 23, 2011
Michael Schearer, Exploiting Banners for Fun and Profits
Mar 09, 2011
Casey Deccio, Modeling DNS Security: Misconfiguration, Availability, and Visualization
Mar 02, 2011
Jan Vitek, A couple of results about JavaScript
Feb 23, 2011
Fariborz Farahmand, Understanding insiders: An analysis of risk-taking behavior *
Feb 09, 2011
Torsten Braun, User and Machine Authentication and Authorization Infrastructure for Distributed Testbeds
Jan 26, 2011
Somesh Jha, Retrofitting Legacy Code for Security
Jan 19, 2011
Fariborz Farahmand, Risk Perception and Trust in Cloud
Jan 12, 2011
Matthew Hashim, Nudging the Digital Pirate: Behavioral Issues in the Piracy Context
Dec 01, 2010
Michael Kirkpatrick, Security Applications for Physically Unclonable Functions
Nov 17, 2010
Nikita Borisov, Detecting Coordinated Attacks with Traffic Analysis
Nov 10, 2010
Trent Jaeger, Tackling System-Wide Integrity
Nov 03, 2010
P. Madhusudan, The Role of Automata Theory in Software Verification
Oct 27, 2010
Sam King, Trust and Protection in the Illinois Browser Operating System
Oct 20, 2010
Alex Liu, Fast Regular Expression Matching using Small TCAMs for Network Intrusion Detection and Prevention Systems
Oct 13, 2010
Mihaela Vorvoreanu, Lorraine G. Kisselburgh, Global Study of Web 2.0 Use in Organizations
Oct 06, 2010
Sergey Panasyuk, Assured Processing through Obfuscation
Sep 29, 2010
Petros Mouchtaris, Security of Mobile Ad Hoc Networks (MANETs)
Sep 22, 2010
Xiaofeng Wang, Side Channel Threats in the Software-as-a-Service Era: Challenges and Responses
Sep 15, 2010
Xeno Kovah, Rootkits
Sep 08, 2010
Ashish Kundu, Data in the Cloud: Authentication Without Leaking
Sep 01, 2010
Cristina Nita-Rotaru, Secure Network Coding for Wireless Mesh Networks
Aug 25, 2010
Victor Raskin & Julia Taylor, Ontological Semantic Technology for Detecting Insider Threat and Social Engineering
Apr 28, 2010
Stephen Dill, The role of System Security Engineering in the engineering lifecycle
Apr 21, 2010
Christian Hammer, Security of JavaScript in a Browser Environment
Apr 14, 2010
Yvo Desmedt, 60 years of scientific research in cryptography: a reflection
Apr 07, 2010
David Bell, Everything I Needed to Know about Security, I Learned in 1974
Mar 31, 2010
David Zage, A Platform for Creating Efficient, Robust, and Resilient Peer-to-Peer Systems
Mar 24, 2010
Pascal Meunier, Making of the CWE Top-25, 2010 Edition
Mar 10, 2010
Wonjun Lee, Detection and protection from denial of service attacks in grids by accountability agents
Mar 03, 2010
Kevin Hoffman, Ribbons, A Partially-Shared Memory Programming Model
Feb 24, 2010
Hyo-Sang Lim, Provenance-based Data Trustworthiness Assessment in Data Streams
Feb 17, 2010
Marcus Rogers, Dissecting Digital Data: Context & Meaning through Analytics
Feb 10, 2010
Greg Stephens, Detecting Insider Theft of Trade Secrets
Feb 03, 2010
Stephen Elliott, Applications of biometric technologies
Jan 20, 2010
Eugene Spafford, Thinking Outside the Box
Jan 13, 2010
Kelly Caine, Human Factors Approaches to Preserving Privacy
Dec 09, 2009
Andrew Scholnick, Cyber Security Trends and Disruptors
Dec 02, 2009
Gerome Miklau, Safely Analyzing Sensitive Network Data
Nov 18, 2009
Leszek Lilien, Some Thoughts on the Pervasive Trust Foundation for the Future Internet Architecture. A position presentation.
Nov 11, 2009
Zahid Pervaiz, Multi-Policy Access Control for Healthcare using Policy Machine
Nov 04, 2009
Andre Koenig, Security in Infrastructureless and Decentralized Communication Networks - Possibilities, Results, and Evaluation Challenges
Oct 28, 2009
Juhee Kwon, Information Security Management and IT Executives in a Top Management Team
Oct 21, 2009
Raquel Hill, PlugNPlay Trust for Embedded Communication Systems
Oct 14, 2009
Gary McGraw, Building Security In Maturity Model (BSIMM)
Oct 07, 2009
Richard Power, Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber Security
Sep 30, 2009
Rick Aldrich, The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyberlaw
Sep 23, 2009
Jerry Saulman, From Security Architecture to Implementation
Sep 16, 2009
Peter Mork, Database Assurance: Anomaly Detection for Relational Databases
Sep 09, 2009
Ragib Hasan, Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealogy of Bits with Secure Provenance
Sep 02, 2009
Ian Goldberg, Sphinx: A Compact and Provably Secure Mix Format
Aug 26, 2009
Joe Judge, Software Assurance: Motivation, Background, and Acquisition Pursuits
Apr 22, 2009
John D'Arcy, User Awareness of Security Countermeasures and its Impact on Information Systems Misuse: A Deterrence Approach
Apr 15, 2009
Johann-Christoph Freytag, Privacy – from accessing databases to location based services
Apr 08, 2009
Melissa Dark, An Analysis of Data Breach Disclosure
Apr 01, 2009
, Rick Clark, Ontario Systems
Mar 25, 2009
Arjan Durresi, Security for the Next Internet over Heterogeneous Environments
Mar 11, 2009
Jeremy Rasmussen, The Best Defense is Information
Mar 04, 2009
Mummoorthy Murugesan, Providing Privacy through Plausibly Deniable Search
Feb 25, 2009
Charles Killian, Mace: Systems and Language Support for Building Correct, High-Performance Networked Services
Feb 18, 2009
Mehmet Sahinoglu, Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory
Feb 11, 2009
Cassio Goldschmidt, The Dark Side of Software Engineering and How to Defend Against It
Feb 04, 2009
Ryan Riley, An Alternate Memory Architecture for Code Injection Prevention
Jan 28, 2009
Paul Kidwell, A Rules Based Statistical Algorithm for Keystroke Detection
Jan 21, 2009
Chris Clifton, Measuring Privacy: A Risk-Based Approach
Jan 14, 2009
Ibrahim Baggili, Extending anonymity research to high-tech white collar crimes and IT Insider threat: A critical step
Dec 10, 2008
Weidong Cui, Automatic Signature Generation for Unknown Vulnerabilities
Dec 03, 2008
Sylvia Osborn, The Role Graph Model and its Extensions
Nov 19, 2008
John Oritz, John Oritz, SRA International
Nov 12, 2008
Scott Orton, The "merge" of Anti-Tamper and Information Assurance - lessons learned from the Anti-Tamper discipline
Nov 05, 2008
Kenji Takahashi, Trends in Identity Management
Oct 29, 2008
Federica Paci, Access Control and Resiliency for WS-BPEL
Oct 22, 2008
Adam Dugger, Signature Analysis Coupled With Slicing Analysis for the Validation of Software
Oct 15, 2008
Yuecel Karabulut, Measuring the Attack Surfaces of Enterprise Software Systems
Oct 08, 2008
Dave Keppler, Resilient Systems for Mission Assurance
Oct 01, 2008
Ashish Kamra, Responding to Anomalous Database Requests
Sep 24, 2008
Shimon Modi, Fingerprint Sensor Interoperability: Analysis of Error Rates for Fingerprint Datasets Acquired from Multiple Fingerprint Sensors
Sep 17, 2008
Dennis Moreau, Virtualization: Resource Coupling and Security across the Stack
Sep 10, 2008
Gabriel Ghinita, Private Queries in Location Based Services: Anonymizers are not Necessary
Sep 03, 2008
Minaxi Gupta, Exploitable Redirects on the Web: Identification, Prevalence, and Defense
Aug 27, 2008
Jacob West, Static source code analysis
Apr 16, 2008
Jack Jones, Shifting focus: Aligning security with risk management
Apr 09, 2008
Hao Chen, Exploiting Opportunistic Scheduling in Cellular Data Networks
Apr 02, 2008
Sencun Zhu, Towards Event Source Location Privacy in Wireless Sensor Networks
Mar 26, 2008
Daniel Hoffman, Hacking the Mobile Workforce
Mar 05, 2008
Buzz Walsh, Managing Security Polarities
Feb 27, 2008
Ta-Wei "David" Wang, Reading the Disclosures with New Eyes: Bridging the Gap between Information Security Disclosures and Incidents
Feb 20, 2008
Myron Cramer, Beyond the Enclave: Evolving Concepts in Security Architectures
Feb 13, 2008
Anand Singh, What are CSO's thinking about? Top information security initiatives for 2008 and beyond …
Jan 30, 2008
Edward W. Felten, Electronic Voting: Danger and Opportunity
Jan 23, 2008
Paul Syverson & Roger Dingledine, Tor: Anonymous communications for government agencies, corporations, journalists... and you
Jan 16, 2008
Eric Cole, Security in a Changing World
Jan 09, 2008
Ventkat Venkatakrishnan, CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations
Nov 28, 2007
Steve Myers, Indiana University, Wireless Router Insecurity: The Next Crimeware Epidemic
Nov 14, 2007
Richard Thieme, Security, Soft Boundaries, and oh-so-subtle Strategies:How to Play Chess While the Board is Disappearing
Nov 07, 2007
Abhilasha Bhargav-Spantzel, Protocols and Systems for Privacy Preserving Protection of Digital Identity
Oct 31, 2007
George Heron, Secure Virtualization
Oct 24, 2007
Srdjan Capkun, From Securing Navigation Systems to Securing Wireless Communication
Oct 17, 2007
Neil Daswani, What Every Engineer Needs To Know About Security And Where To Learn It
Oct 10, 2007
David Ehinger, The Effect of Rootkits on the Corporate Environment
Sep 26, 2007
Jill Frisby, Protecting Data Privacy: A Practical Guide to Managing Risk
Sep 19, 2007
Ron Buskey, Security issues within embedded software development
Sep 12, 2007
Yvo Desmedt, Applying Recreational Mathematics to Secure Multiparty Computation
Sep 05, 2007
Klemens Boehm, Towards Effective and Efficient Behavior-based Trust Models
Aug 29, 2007
Bill Horne, Role Discovery
Aug 22, 2007
Umut Topkara, Passwords Decay, Words Endure: Towards Secure and Re-usable Multiple Password Mnemonics
Apr 25, 2007
Mercan Topkara, Hiding the Message Behind the Words: Advances in Natural Language Watermarking
Apr 18, 2007
Dr. Charles P. Pfleeger, Dumb Ideas in Computer Security
Apr 11, 2007
Dr. Albert M. K. Cheng, Automatic Debugging and Verification of RTL-Specified Real-Time Systems via Incremental Satisfiability Counting and On-Time and Scalable Intrusion Detection in Embedded Systems
Mar 28, 2007
Dan Geer, A quant looks at the future
Mar 21, 2007
Eugene Schultz, Intrusion Detection Event Correlation: Approaches, Benefits and Pitfalls
Mar 07, 2007
Bhavani Thuraisingham, Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrustworthy Coalition Partners
Feb 28, 2007
Howard Schmidt, Cyber Security and the "NEW" world enterprise
Feb 21, 2007
Stuart Shapiro, Scenario-Driven Construction of Enterprise Information Policy
Feb 07, 2007
Chris Clifton, Mathematically Defining Privacy
Jan 31, 2007
Wojciech Szpankowski, What is Information?
Jan 24, 2007
Vipin Swarup, Research Challenges in Assured Information Sharing
Jan 17, 2007
Virginia Rezmierski, Computer-Related Incidents: Factors Related to Cause and Prevention
Jan 10, 2007
Marc Rogers, The Psychology of Computer Deviance: How it can assist in digital evidence analysis.
Dec 06, 2006
Dongyan Xu, OS-Level Taint Analysis for Malware Investigation and Defense
Nov 29, 2006
Richard Power, One Step Forward, Two Steps Back, or Two Steps Forward, One Step Back: A Ten Year Retrospective on Cyber Crime and Cyber Security (1996-2006)
Nov 15, 2006
David Zage, Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks
Nov 08, 2006
Paula DeWitte, Developing an Operational Framework for Integrated System Security
Nov 01, 2006
Qihua Wang, Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies
Oct 25, 2006
Nitin Khanna, Forensics Characterization of Printers and Image Capture devices
Oct 18, 2006
Nora Rifon, Network Security Begins at Home: Changing Consumer Behavior for i-Safety
Oct 11, 2006
Danfeng Yao, Verification of Integrity for Outsourced Content Publishing and Database Queries
Oct 04, 2006
Ravi Sandhu, The Secure Information Sharing Problem and Solution Approaches
Sep 27, 2006
Gene Kim, Prioritizing Processes and Controls for Effective and Measurable Security
Sep 20, 2006
Hyogon Kim, Real-Time Visualization of Network Attacks on High-Speed Links
Sep 13, 2006
Ed Finkler, A Multi-layered Approach to Web Application Defense
Sep 06, 2006
Sid Stamm, Invasive Browser Sniffing and Countermeasures
Aug 30, 2006
Ehab Al-Shaer, Ph.D., Toward Autonomic Security Policy Management
Aug 23, 2006
Virgil D. Gligor, On the Evolution of Adversary Models for Security Protocols - from the Beginning to Sensor Networks
Apr 26, 2006
John Black, Recent Attacks on MD5
Apr 19, 2006
David Carroll, Identity Management Strategies and Integration Perspectives
Apr 12, 2006
Dave Ford, Chaos,Complexity, Cybernetics and Therminator:
Apr 05, 2006
Minaxi Gupta, Spoofing-resistant Packet Routing for the Internet"
Mar 29, 2006
Julie Earp, Privacy Policies in Web-based Healthcare
Mar 22, 2006
Marina Blanton, Dynamic and Efficient Key Management for Access Hierarchies
Mar 08, 2006
Rafae Bhatti, A Policy Engineering Framework for Federated Access Management
Mar 01, 2006
Mike Burmester, Provable security in mobile ad hoc networks
Feb 15, 2006
Brian Carrier, Categories of Digital Forensic Investigation Techniques
Feb 08, 2006
Abhilasha Bhargav-Spantzel, Digital Identity Management and Theft Protection
Feb 01, 2006
Paul Thompson, Semantic Attacks and Security
Jan 25, 2006
Jean Camp, Net Trust: Identification Through Social Context
Jan 18, 2006
Simson Garfinkel, Cross-Drive Forensic Analysis
Jan 11, 2006
Jelena Mirkovic, Clouseau: A practical IP spoofing defense through route-based filtering
Dec 07, 2005
Stanislaw Jarecki, Secret Handshakes
Nov 30, 2005
Shouhuai Xu, Privacy-preserving Policy-driven Access Control with Mixed Credentials
Nov 16, 2005
Anna Squicciarini, Privacy and anonymity in Trust Negotiations".
Nov 09, 2005
Bryant G. Tow, A Demonstration in the Need for a Layered Security Model
Oct 26, 2005
Dr. Angelos D. Keromytis, Toward Self-healing Software
Oct 19, 2005
Dan Massey, Securing the Internet's Domain Name System
Oct 05, 2005
Ting Yu, A Framework for Identifying Compromised Nodes in Sensor Networks
Sep 21, 2005
Peter Bajcsy, Toward Hazard Aware Spaces: Knowing Where, When and What Hazards Occur
Sep 14, 2005
Ed Finkler, Real World Web Application Security
Sep 07, 2005
Himanshu Khurana, Minimizing Trust Liabilities in Secure Group Messaging Infrastructures
Aug 31, 2005
Stephen Elliott, An Introduction to Biometric Technologies
Aug 24, 2005
Sheng Zhong, PrivacyEnhancing k-Anonymization of Customer Data
Apr 27, 2005
Marianne Winslett, Traust and PeerTrust2: Applying Trust Negotiation to Real Systems
Apr 20, 2005
Mohamed Shehab, Watermarking Relational Databases
Apr 13, 2005
Brian Carrier, Defining a Digital Forensic Investigation
Apr 06, 2005
Helen J. Wang, Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks
Mar 30, 2005
Dr. Kate Cherry and Dr. Wendy Hamilton, Lockheed Martin
Mar 23, 2005
David Evans, Where's the FEEB? Effectiveness of Instruction Set Randomization
Mar 09, 2005
Florian Buchholz, Using process labels to obtain forensic and traceback information
Mar 02, 2005
Jintai Ding, Perturbation of Multivariable Public-key Cryptosystems
Feb 23, 2005
Wenke Lee, Architectural Considerations for Anomaly Detection
Feb 09, 2005
Vitaly Shmatikov, Obfuscated Databases: Definitions and Constructions
Feb 02, 2005
Keith Frikken, Hidden Access Control Policies with Hidden Credentials
Jan 19, 2005
Cristina Nita-Rotaru, Survivable routing in wireless ad hoc networks
Jan 12, 2005
Dennis Fetterly, Using Statistical Analysis to Locate Spam Web Pages
Dec 08, 2004
William Winsborough, Attribute-Based Access Control
Dec 01, 2004
Indrakshi Ray, An Anonymous Fair-Exchange E-Commerce Protocol
Nov 17, 2004
James Joshi, GTRBAC: A Generalized Temporal Role Based Access Control Model
Nov 10, 2004
Abe Singer, Towards Mining Syslog Data
Nov 03, 2004
Ari Takanen, Robustness testing - black-box testing for software security
Oct 27, 2004
Dan Thomsen, Information Flow Analysis in Security Enhanced Linux
Oct 13, 2004
Gail-Joon Ahn, Secure Information Sharing within a Collaborative Environment
Sep 15, 2004
Jason Crampton, Administrative Scope and Role-Based Administration
Sep 08, 2004
Dave Ford, Application of Thermodynamics to Computer Network Defense
Aug 25, 2004
Sam Wagstaff, Cryptanalysis of Diffie-Hellman and Pohlig-Hellman
Jan 23, 2002
Sam Wagstaff, Information Theory
Aug 22, 2001
Gary McGraw, Building Secure Software
Jan 10, 2001
Peter Stephenson, Investigating Computer Security Incidents
Nov 08, 2000
Wenke Lee, Developing Data Mining Techniques for Intrusion Detection: A Progress Report
Oct 11, 2000
Richard Stotts, Jerome Webb & Matthew Beebe, Richard Stotts, Jerome Webb & Matthew Beebe
Oct 04, 2000
John Richardson, Evolving the Internet
Sep 20, 2000
Eugene Spafford, The Challenge of Secure Software
Sep 13, 2000
Jens Palsberg, Static Checking of Interrupt-Driven Software
Sep 06, 2000
Pascal Meunier, The IRDB Project: An Incident Response Database For Gathering Cost And Incidence Information On Types of Security Events
Aug 30, 2000
John Steven Reel, The Future of Information Security Technologies
Aug 23, 2000
Rick Davis, The Holy Grail of E-Business Risk Management: Creating and Sustaining the Insurable Standard for E-Business Security and Assurance
Apr 28, 2000
Michael G. Fleming & Victor Maconachy, Information Assurance Challenges for the 21st Century
Apr 21, 2000
Terran Lane, Machine Learning Techniques for Anomaly Detection in Computer Security
Apr 07, 2000
Padgett Peterson, Implications of Mobile Code on Microsoft Platforms
Mar 31, 2000
Judy Hochberg, Automatic identification of classified documents
Feb 25, 2000
Clay Shields, Tracing Denial-of-Service Attacks; or why we may never know who attacked Yahoo et. al.
Feb 18, 2000
Gerald Thomas, Commercial High-Resolution Satellite Imagery Polic
Feb 11, 2000
Victor Raskin, NLP for IAS: Overview and Implementations
Feb 04, 2000
Gene Kim, Open Source Issues and Opportunities for Tripwire
Jan 21, 2000
Wenliang Du & Mahesh Tripunitara, Security Relevancy Analysis on the Registry of Windows NT 4.0 (for Wenliang Du)
Nov 19, 1999
Donn Parker, Information Security, a Folk Art in Need of an Upgrade
Nov 12, 1999
Michael Santarcangelo, eInfrastructure Security
Nov 05, 1999
James R. C. Hansen, Computer Forensics Examinations in the Consulting Arena
Oct 29, 1999
David Aucsmith, Balancing Big Brother
Oct 15, 1999
Edward J. Delp, Image and Video Watermarking: An Overview
Sep 10, 1999
Gene Spafford, Twelve Challenges in Information Security Research
Sep 03, 1999
Clay Shields, KHIP - A Scalable Protocol for Secure Multicast Routing
Aug 27, 1999