Never Ending Security

It starts all here

CERIAS Security Seminar Archive Video Talks 2010-2011-2012-2013-2014-2015

01/14/2015

Learning from Information Security Maturity: A Textual Analysis

Learning from Information Security Maturity: A Textual Analysis

Jackie Rees Ulmer – Purdue University
(374.0MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

01/21/2015

Security with Privacy - A Research Agenda

Security with Privacy – A Research Agenda

Bharath Samanthula – Purdue University
(117.4MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

01/28/2015

Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds

Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds

Savvas Savvides – Purdue University
(148.3MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

02/04/2015

Regulatory Compliance Checking Over Encrypted Audit Logs

Regulatory Compliance Checking Over Encrypted Audit Logs

Omar Chowdhury – Purdue University
(149.6MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

02/11/2015

Code-Pointer Integrity

Code-Pointer Integrity

Mathias Payer – Purdue University
(90.3MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

02/18/2015

Privacy Notions for Data Publishing and Analysis

Privacy Notions for Data Publishing and Analysis

Ninghui Li – Purdue University
(216.9MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

02/25/2015

Software updates: decisions and security implications

Software updates: decisions and security implications

Kami Vaniea – Indiana University
(181.3MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

03/04/2015

Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology

Aiding Security Analytics — From Dempster-Shafer Theory to Anthropology

Xinming Ou – Kansas State University
(112.5MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

03/11/2015

Virtual Android Malware Detection and Analysis (VAMDA)

Virtual Android Malware Detection and Analysis (VAMDA)

Andrew Pyles – MITRE
(85.3MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

03/25/2015

Symposium/Michelle Dennedy, Intel

Symposium/Michelle Dennedy, Intel

Michelle Dennedy – Intel
(242.2MB): Video Icon MP4 Video   Flash Icon Flash Video

04/01/2015

Breaking Mobile Social Networks for Automated User Location Tracking

Breaking Mobile Social Networks for Automated User Location Tracking

Kui Ren – University at Buffalo
(109.5MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

04/15/2015

Engineering Secure Computation -- Efficiently

Engineering Secure Computation — Efficiently

Yan Huang – Indiana University
(107.4MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube


01/15/2014

Open

01/22/2014

Cancelled

01/29/2014

Secure and Private Outsourcing to Untrusted Cloud Servers

Secure and Private Outsourcing to Untrusted Cloud Servers

Shumiao Wang – Purdue University
(311.0MB): Video Icon MP4 VideoFlash Icon Flash VideoWatch on Youtube

02/05/2014

Cancelled

02/19/2014

Technical Tradeoffs in the NSA's Mass Phone Call Program

Technical Tradeoffs in the NSA’s Mass Phone Call Program

Ed Felten – Princeton University
(155.3MB): Video Icon MP4 VideoFlash Icon Flash VideoWatch on Youtube

03/05/2014

Machine Intelligence for Biometric and On-Line Security

Machine Intelligence for Biometric and On-Line Security

Marina Gavrilova – University of Calgary
(335.5MB): Video Icon MP4 VideoFlash Icon Flash VideoWatch on Youtube

03/12/2014

General-Purpose Secure Computation and Outsourcing

General-Purpose Secure Computation and Outsourcing

Marina Blanton – University of Notre Dame
(299.6MB): Video Icon MP4 VideoFlash Icon Flash VideoWatch on Youtube

04/02/2014

CERIAS Poster Contest Winners

CERIAS Poster Contest Winners

Philip Ritchey & Mohammed Almeshekah – Purdue University
(302.5MB): Video Icon MP4 VideoFlash Icon Flash VideoWatch on Youtube

04/16/2014

Online Privacy Agreements, is it Informed Consent?

Online Privacy Agreements, is it Informed Consent?

Masooda Bashir – University of Illinois at Urbana-Champaign
(320.2MB): Video Icon MP4 VideoFlash Icon Flash VideoWatch on Youtube

04/23/2014

Cancelled

04/30/2014

Women In Cyber Security

Women In Cyber Security

Rachel Sitarz – Purdue University
(313.2MB): Video Icon MP4 VideoFlash Icon Flash VideoWatch on Youtube

08/27/2014

Tree-based Oblivious RAM and Applications

Elaine Shi – University of Maryland

09/10/2014

WarGames in Memory: Fighting Powerful Attackers

WarGames in Memory: Fighting Powerful Attackers

Mathias Payer – Purdue University
(102.4MB): Video Icon MP4 VideoFlash Icon Flash VideoWatch on Youtube

09/24/2014

Threat intelligence and digital forensics

Threat intelligence and digital forensics

Sam Liles – Purdue University
(166.4MB): Video Icon MP4 VideoFlash Icon Flash VideoWatch on Youtube

10/08/2014

Biometrics and Usability

Biometrics and Usability

Stephen Elliott – Purdue University
(164.9MB): Video Icon MP4 VideoFlash Icon Flash VideoWatch on Youtube

10/15/2014

Canceled

10/22/2014

“Memory Analysis, Meet GPU Malware”

Golden G. Richard III – University of New Orleans
(170.0MB): Video Icon MP4 VideoFlash Icon Flash VideoWatch on Youtube

10/29/2014

Healthcare Security and Privacy: Not There Yet

Healthcare Security and Privacy: Not There Yet

Robert Zimmerman – Inforistec
(206.1MB): Video Icon MP4 VideoFlash Icon Flash VideoWatch on Youtube

11/05/2014

Improving Analyst Team Performance and Capability in NOC / SOC Operations Centers

Improving Analyst Team Performance and Capability in NOC / SOC Operations Centers

Barrett Caldwell and Omar Eldardiry – Purdue University
(145.2MB): Video Icon MP4 VideoFlash Icon Flash VideoWatch on Youtube

11/19/2014

Privacy in the Age of the Police State

Privacy in the Age of the Police State

Marcus Ranum – Tenable Network Security
(209.0MB): Video Icon MP4 VideoFlash Icon Flash VideoWatch on Youtube

12/03/2014

Open

12/10/2014

How Program Analysis can be Used in Security Applications

How Program Analysis can be Used in Security Applications

Xiangyu Zhang – Purdue University
(148.5MB): Video Icon MP4 VideoFlash Icon Flash VideoWatch on Youtube


01/09/2013

Open

01/23/2013

Differentially Private Publishing of Geospatial Data

Differentially Private Publishing of Geospatial Data

Wahbeh Qardaji – Purdue University
(168.8MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

01/30/2013

A Semantic Baseline for Spam Filtering

A Semantic Baseline for Spam Filtering

Christian F. Hempelmann – Texas A&M University-Commerce
(264.1MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

02/06/2013

Using Probabilistic Generative Models for Ranking Risks of Android Apps

Using Probabilistic Generative Models for Ranking Risks of Android Apps

Chris Gates – Purdue University
(161.9MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

02/20/2013

Minimizing Private Data Disclosures in the Smart Grid

Minimizing Private Data Disclosures in the Smart Grid

Weining Yang – Purdue University
(104.3MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

02/27/2013

Protecting Today’s Enterprise Systems against Zero-day Attacks

Saurabh Bagchi – Purdue University

03/06/2013

Whole Genome Sequencing: Innovation Dream or Privacy Nightmare?

Whole Genome Sequencing: Innovation Dream or Privacy Nightmare?

Emiliano DeCristofaro – PARC
(148.0MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

03/20/2013

Active Cyber Network Defense with Denial and Deception

Active Cyber Network Defense with Denial and Deception

Kristin Heckman – MITRE
(170.1MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

03/27/2013

Regulatory Compliance Software Engineering

Regulatory Compliance Software Engineering

Aaron Massey – Georgia Tech
(125.5MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

04/03/2013

Symposium

04/17/2013

Towards Automated Problem Inference from Trouble Tickets

Towards Automated Problem Inference from Trouble Tickets

Rahul Potharaju – Purdue University
(165.0MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

04/24/2013

Identity-Based Internet Protocol Network

Identity-Based Internet Protocol Network

David Pisano – MITRE
(81.8MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

08/21/2013

New possibilities of steganography based on Kuznetsov-Tsybakov problem

New possibilities of steganography based on Kuznetsov-Tsybakov problem

Jarek Duda – Purdue University
(247.6MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

08/28/2013

Information Security Challenges in an Academic Environment

Information Security Challenges in an Academic Environment

Keith Watson – Purdue University
(294.2MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

09/11/2013

Cyber Threats and the Cyber Kill Chain

Kevin Brennan – FBI

09/18/2013

 Protecting a billion identities without losing (much) sleep

Protecting a billion identities without losing (much) sleep

Mark Crosbie, Tim Tickel, Four Flynn – Facebook
(269.1MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

10/02/2013

Open

10/09/2013

Open

10/16/2013

Open

10/23/2013

Systems of Systems: Opportunities and Challenges

Systems of Systems: Opportunities and Challenges

Daniel DeLaurentis – Purdue University
(317.7MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

10/30/2013

Membership Privacy: A Unifying Framework For Privacy Definitions

Membership Privacy: A Unifying Framework For Privacy Definitions

Ninghui Li – Purdue University
(316.2MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

11/06/2013

Yahoo! Messenger Forensics on Windows Vista and Windows 7

Yahoo! Messenger Forensics on Windows Vista and Windows 7

Tejashree Datar – Purdue University
(203.1MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

11/13/2013

Cloud Security: How Does Software Assurance Apply

Cloud Security: How Does Software Assurance Apply

Randall Brooks – Raytheon
(139.1MB): Video Icon MP4 Video   Flash Icon Flash Video

11/20/2013

Trust Management for Publishing Graph Data

Trust Management for Publishing Graph Data

Muhammad Umer Arshad – Purdue University
(359.0MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

12/04/2013

Economic Policy and Cyber Challenges in Estonia

Economic Policy and Cyber Challenges in Estonia

Marina Kaljurand
(549.8MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube


01/11/2012

“Introduction to Biometrics”

Stephen Elliott – Purdue University
(442.4MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

01/18/2012

 Secure Provenance Transmission for Data Streams

Secure Provenance Transmission for Data Streams

Salmin Sultana – Purdue University
(517.4MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

01/25/2012

A Flexible System for Access Control

A Flexible System for Access Control

Frank Tompa – University of Waterloo
(543.0MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

02/01/2012

Is it time to add Trust to the Future Internet/Web?

Is it time to add Trust to the Future Internet/Web?

George Vanecek – Futurewei Technologies
(547.3MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

02/15/2012

Forensic Carving of Network Packets with bulk_extractor and tcpflow

Forensic Carving of Network Packets with bulk_extractor and tcpflow

Simson Garfinkel – Naval Postgraduate School
(532.8MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

02/22/2012

Vulnerability Path and Assessment

Vulnerability Path and Assessment

Ben Calloni – Lockheed Martin
(537.9MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

02/29/2012

Cryptographic protocols in the era of cloud computing

Cryptographic protocols in the era of cloud computing

Nishanth Chandran – Microsoft Research
(552.9MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

03/07/2012

Privacy-Preserving Assessment of Location Data Trustworthiness

Privacy-Preserving Assessment of Location Data Trustworthiness

Chenyun Dai – Purdue University
(535.8MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

03/21/2012

Adding a Software Assurance Dimension to Supply Chain Practices

Adding a Software Assurance Dimension to Supply Chain Practices

Randall Brooks – Raytheon
(535.2MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

04/04/2012

J.R. Rao, IBM Research

J.R. Rao – IBM

04/11/2012

: K-Anonymity in Social Networks: A Clustering Approach

: K-Anonymity in Social Networks: A Clustering Approach

Traian Truta – Northern Kentucky University
(538.5MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

04/25/2012

A Practical Beginners' Guide to Differential Privacy

A Practical Beginners’ Guide to Differential Privacy

Christine Task – Purdue University
(530.0MB): Video Icon MP4 Video   Flash Icon Flash Video

08/22/2012

The New Frontier, Welcome the Cloud Brokers

The New Frontier, Welcome the Cloud Brokers

Scott Andersen – Lockheed Martin
(443.9MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

08/29/2012

Challenges for R&D in the Security Field

Challenges for R&D in the Security Field

Lewis Shepherd – Microsoft
(445.2MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

09/05/2012

The Inertia of Productivity

The Inertia of Productivity

Ed Lopez
(447.4MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

09/12/2012

Trends in cyber security consulting

Trends in cyber security consulting

Sharon Chand & Chad Whitman – Deloitte & Touche
(442.5MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

10/03/2012

 Defending Users Against Smartphone Apps: Techniques and Future Directions

Defending Users Against Smartphone Apps: Techniques and Future Directions

William Enck – North Carolina State University
(448.0MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

10/10/2012

Understanding Spam Economics

Understanding Spam Economics

Chris Kanich – University of Illinois at Chicago
(445.1MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

10/17/2012

The Boeing Company

The Boeing Company

Edmund Jones – Boeing
(443.0MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

10/31/2012

Risk perception of information security risks online

Risk perception of information security risks online

Vaibhav Garg – Indiana University
(446.6MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

11/07/2012

Publishing Microdata with a Robust Privacy Guarantee

Publishing Microdata with a Robust Privacy Guarantee

Jianneng Cao – Purdue University
(444.5MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

11/28/2012

A New Class of Buffer Overflow Attacks

A New Class of Buffer Overflow Attacks

Ashish Kundu – IBM
(316.8MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

12/05/2012

You are Anonymous!!! Then you must be Lucky

You are Anonymous!!! Then you must be Lucky

Bilal Shebaro – Purdue University
(220.7MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube


01/12/2011

Risk Perception and Trust in Cloud

Risk Perception and Trust in Cloud

Fariborz Farahmand – Purdue University
(444.7MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

01/19/2011

Retrofitting Legacy Code for Security

Retrofitting Legacy Code for Security

Somesh Jha – University of Wisconsin
(446.4MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

02/02/2011

Campus closed/snow

02/09/2011

Understanding insiders: An analysis of risk-taking behavior *

Understanding insiders: An analysis of risk-taking behavior *

Fariborz Farahmand – Purdue University
(442.2MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

02/16/2011

Malware Trends and Techniques

Tom Ervin – MITRE

02/23/2011

A couple of results about JavaScript

A couple of results about JavaScript

Jan Vitek – Purdue University
(443.1MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

03/02/2011

“Modeling DNS Security: Misconfiguration, Availability, and Visualization”

Casey Deccio – Sandia National Labs
(443.7MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

03/09/2011

Exploiting Banners for Fun and Profits

Exploiting Banners for Fun and Profits

Michael Schearer – Booz Allen Hamilton
(446.7MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

04/06/2011

Society, Law Enforcement and the Internet:  Models for Give and Take

Society, Law Enforcement and the Internet: Models for Give and Take

Carter Bullard – QoSient, LLC
(451.8MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

04/13/2011

FuzzyFusion™, an application architecture for multisource information fusion

FuzzyFusion™, an application architecture for multisource information fusion

Ronda R. Henning – Harris Corporation
(446.7MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

04/27/2011

Mobile Phones and Evidence Preservation

Mobile Phones and Evidence Preservation

Eric Katz – Purdue University
(447.7MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

08/24/2011

Provisioning Protocol Challenges in an Era of gTLD Expansion

Provisioning Protocol Challenges in an Era of gTLD Expansion

Scott Hollenbeck – Verisign
(443.6MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

08/31/2011

Non-homogeneous anonymizations

Non-homogeneous anonymizations

Tamir Tassa – The Open University, Israel
(447.7MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

09/07/2011

Detecting Bots in Online Games using Human Observational Proofs

Detecting Bots in Online Games using Human Observational Proofs

Steven Gianvecchio – MITRE
(445.0MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

09/21/2011

 Methods and Techniques for Protecting Data in Real Time on the Wire

Methods and Techniques for Protecting Data in Real Time on the Wire

Joe Leonard – Global Velocity
(444.0MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

09/28/2011

Weighted Multiple Secret Sharing

Weighted Multiple Secret Sharing

Xukai Zou – Indiana University-Purdue University Indianapolis
(449.7MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

10/05/2011

Trusted Computing and Security for Embedded Systems

Trusted Computing and Security for Embedded Systems

Hal Aldridge – Sypris Electronics
(445.0MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

10/12/2011

Enterprise-Wide Intrusions Involving Advanced Threats

Enterprise-Wide Intrusions Involving Advanced Threats

Dan McWhorter and Steve Surdu – Mandiant Corporation
(443.0MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

10/19/2011

Ontological Semantic Technology Goes Phishing

Ontological Semantic Technology Goes Phishing

Julia M. Taylor, Victor Raskin, and Eugene H. Spafford – Purdue University
(446.3MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

11/16/2011

Jam me if you can: Mitigating the Impact of Inside Jammers

Jam me if you can: Mitigating the Impact of Inside Jammers

Loukas Lazos – University of Arizona
(443.7MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

11/30/2011

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones

Apu Kapadia – Indiana University
(447.9MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

12/07/2011

No Seminar


01/13/2010

“Thinking Outside the Box”

Eugene Spafford – Purdue University
(443.9MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

01/20/2010

Applications of biometric technologies

Applications of biometric technologies

Stephen Elliott – Purdue University
(416.3MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

01/27/2010

Fast-flux Attacks

Shijie Zhou – University of Electronic Science and Technology of China

02/03/2010

Detecting Insider Theft of Trade Secrets

Detecting Insider Theft of Trade Secrets

Greg Stephens – Mitre
(429.3MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

02/10/2010

Dissecting Digital Data: Context & Meaning through Analytics

Dissecting Digital Data: Context & Meaning through Analytics

Marcus Rogers – Purdue University
(465.4MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

02/17/2010

Provenance-based Data Trustworthiness Assessment in Data Streams

Provenance-based Data Trustworthiness Assessment in Data Streams

Hyo-Sang Lim – Purdue University
(379.8MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

03/10/2010

Making of the CWE Top-25, 2010 Edition

Making of the CWE Top-25, 2010 Edition

Pascal Meunier – Purdue University
(444.7MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

04/07/2010

60 years of scientific research in cryptography:  a reflection

60 years of scientific research in cryptography: a reflection

Yvo Desmedt – University College London, UK
(449.3MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

04/14/2010

Security of JavaScript in a Browser Environment

Security of JavaScript in a Browser Environment

Christian Hammer – Purdue University
(448.0MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

04/21/2010

The role of System Security Engineering in the engineering lifecycle

The role of System Security Engineering in the engineering lifecycle

Stephen Dill – Lockheed Martin
(446.1MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

04/28/2010

“Ontological Semantic Technology for Detecting Insider Threat and Social Engineering”

Victor Raskin & Julia Taylor – Purdue University
(451.7MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

08/25/2010

Secure Network Coding for Wireless Mesh Networks

Secure Network Coding for Wireless Mesh Networks

Cristina Nita-Rotaru – Purdue University
(443.7MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

09/01/2010

Data in the Cloud: Authentication Without Leaking

Data in the Cloud: Authentication Without Leaking

Ashish Kundu – Purdue University
(441.4MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

09/08/2010

Rootkits

Rootkits

Xeno Kovah – MITRE
(445.4MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

09/22/2010

Security of Mobile Ad Hoc Networks (MANETs)

Security of Mobile Ad Hoc Networks (MANETs)

Petros Mouchtaris – Telcordia
(448.2MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

09/29/2010

Assured Processing through Obfuscation

Assured Processing through Obfuscation

Sergey Panasyuk – Air Force Research Laboratory
(445.8MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

10/06/2010

Global Study of Web 2.0 Use in Organizations

Global Study of Web 2.0 Use in Organizations

Mihaela Vorvoreanu, Lorraine G. Kisselburgh – Purdue University
(444.4MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

10/20/2010

Trust and Protection in the Illinois Browser Operating System

Trust and Protection in the Illinois Browser Operating System

Sam King – University of Illinois
(451.0MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

10/27/2010

The role of automata theory in software verification

The role of automata theory in software verification

P. Madhusudan – University of Illinois at Urbana-Champaign
(451.1MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

11/03/2010

Tackling System-Wide Integrity

Tackling System-Wide Integrity

Trent Jaeger – Pennsylvania State
(444.9MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

11/10/2010

Detecting Coordinated Attacks with Traffic Analysis

Detecting Coordinated Attacks with Traffic Analysis

Nikita Borisov – University of Illinois at Urbana-Champaign
(439.5MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

11/17/2010

Security Applications for Physically Unclonable Functions

Security Applications for Physically Unclonable Functions

Michael Kirkpatrick – Purdue University
(447.9MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

12/01/2010

Nudging the Digital Pirate: Behavioral Issues in the Piracy Context

Nudging the Digital Pirate: Behavioral Issues in the Piracy Context

Matthew Hashim – Purdue University
(443.7MB): Video Icon MP4 Video   Flash Icon Flash Video   Watch on Youtube

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s