|
name
Minlan Yu Date
November 22nd, 2019
|
|
Home-based IoT devices have a bleak reputation regarding their security practices. On the surface, the insecurities of IoT devices seem to be caused by integration problems that may be addressed by…
name
Omar Alrawi Date
November 15th, 2019
|
|
With the proliferation of computing systems in our world, from servers to internet-of-things devices, side-channel signals have become significantly more available and accessible to measure and…
name
Nader Sehatbakhsh Date
November 8th, 2019
|
|
Secure channel establishment protocols such as TLS are some of the most important cryptographic protocols, enabling the encryption of Internet traffic. Reducing the latency (the number of…
name
Alexandra Boldyreva Date
November 1st, 2019
|
|
Computationally secure Cryptographic algorithms, when implemented on physical hardware leak correlated physical signatures (e.g. power supply current, electromagnetic radiation, acoustic, thermal)…
name
Arijit Raychowdhury Date
October 18th, 2019
|
|
Over the last several decades Data Security became Information Security which then rolled into Cyber Security. All along this journey cyber has become defined as “Us versus Them”;…
name
Charles Johnson-Bey Date
October 11th, 2019
|
|
According to the National Initiative for Cybersecurity Education, half of the cybersecurity specialties now involve primarily non-code work. This lecture draws on the "Pedagogic Cybersecurity…
name
Peter Swire Date
October 4th, 2019
|
|
Cyber threats are rampant and their potential damages to enterprises continue to soar over time. Hence, cyber resilience techniques need to be examined and assessed for their effectiveness before…
name
Ambrose Kam Date
September 27th, 2019
|
|
In a provenance-aware system, mechanisms gather and report metadata that describes the history of each data object being processed, allowing us to understand how objects came to exist in their…
name
Adam Bates Date
September 13th, 2019
|
|
In the coming decades, we will live in a world surrounded by tens of billions of devices that will interoperate and collaborate in an effort to deliver personalized and autonomic services. This…
name
Margaret Loper Date
September 6th, 2019
|
|
Today, individual users and organizations often wish to contribute their private data to compute functions of interest. Unfortunately, when data is deemed too valuable or is legally protected, such…
name
David Heath Date
August 30th, 2019
|
|
The electric energy grid is a recognized critical infrastructure. It is vulnerable to self-disturbances as well as cyber-attacks. In particular cyber-attacks can cause from mild disruptions to…
name
Sakis Meliopoulos Date
August 23rd, 2019
|
|
Publishing
exact statistical data creates mathematical risks and vulnerabilities that have
only recently been appreciated. In 2010, the U.S. Census Bureau collected
information on more than 308…
name
Simson L. Garfinkel Date
April 26th, 2019
|
|
Recently,
the number of cyber threats to power systems has increased at an unprecedented
rate. For instance, the widespread blackout in Ukrainian power grid on December
2015 was a wakeup call that…
name
Tohid Shekari Date
April 19th, 2019
|
|
A School of Computer Science team won the Institute for Information Security and Privacy’s (IISP) Demo Day Finale for their work on making machine learning (ML) models more secure. The winning…
|
|
Biometric authentication promises userconvenience by measuring what makes eachof us unique using just a smartphone. Thedownside includes risks such as criminalsimpersonating us with stolen data and…
name
Carter Yagemann Date
April 16th, 2019
|