Search for tag: "lecture"

Beliz Kaleli - To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media

To make their services more user friendly, online social media platforms automatically identify text that corresponds to URLs and render it as clickable links. In this paper, we show that the…

From  Katie Gentilello on February 21st, 2021 3 plays 0  

David Heath - Zero Knowledge for Everything and Everyone

Zero-Knowledge (ZK) Proofs are important cryptographic objects that allow an untrusted prover to demonstrate to an untrusted verifier the truth of some statement while revealing nothing additional.…

From  Katie Gentilello on February 10th, 2021 12 plays 0  

Lefteris Anastasopoulos - Securing Democracy in the Fourth Industrial Revolution

In this talk I discuss research which focuses on designing systems needed to secure democracy and democratic political institutions, such as elections, in the interconnected digital world of the…

From  Katie Gentilello on January 23rd, 2021 15 plays 0  

Evan W. Glover - Building a Strategic Privacy Program

Privacy is a multi-faceted challenge for organizations – to be successful, they must take a holistic approach to protecting the personal data and information of all stakeholders. Privacy…

From  Katie Gentilello on December 7th, 2020 20 plays 0  

Henry Tong, Larry LaMont - Mobilizing mmWave to Realize the Full 5G Potential

5G NR mmWave opens doors to vast amounts of network capacity, fiber-like speeds and ultra-low latencies that promise to bring new and enhanced experiences to the masses, as well as inherent security…

From  Katie Gentilello on November 23rd, 2020 6 plays 0  

Jakub Szefer - Securing FPGA-Accelerated Cloud Infrastructures

Cloud FPGAs have been gaining popularity in recent years due to the ability of users to request FPGA resources quickly, flexibly, and on-demand. However, as public cloud providers make FPGAs…

From  Katie Gentilello on November 18th, 2020 17 plays 0  

Wei Gao - Skin-Interfaced Wearable Sweat Biosensors

The rising research interest in personalized medicine promises to revolutionize traditional medical practices. This presents a tremendous opportunity for developing wearable devices toward predictive…

From  Katie Gentilello on November 13th, 2020 16 plays 0  

Karthika Subramani - When Push comes to Ads: Measuring the Rise of (Malicious) Push Advertising

The rapid growth of online advertising has fueled the growth of ad-blocking software, such as new ad-blocking and privacy-oriented browsers or browser extensions. In response, both ad publishers and…

From  Katie Gentilello on November 5th, 2020 12 plays 0  

Seyedhamed Ghavamnia - Temporal System Call Specialization for Attack Surface Reduction

Attack surface reduction through the removal of unnecessary application features and code is a promising technique for improving security without incurring any additional overhead. Recent software…

From  Katie Gentilello on October 21st, 2020 9 plays 0  

Saima Afroz Siddiqui - Magnetic and Spintronic Device for Computing and Memory

Magnetic devices promise intriguing design paradigms where electron spin is used as the information token instead of its charge counterpart. While magnetic random-access memory (MRAM) is considered…

From  Katie Gentilello on October 18th, 2020 0 plays 0  

Shachee Mishra - Multi-layer API Specialization for Attack Surface Reduction

Code reuse attacks have been a threat to software security since the introduction of non-executable memory protections. Despite significant advances in various types of additional defenses, such as…

From  Katie Gentilello on October 7th, 2020 16 plays 0  

Danny Y. Huang - Watching IoTs that Watch Us

Many consumers today are increasingly concerned about IoT security and privacy. There is much media hype about home cameras being hacked or voice assistants eavesdropping on conversations. However,…

From  Katie Gentilello on October 3rd, 2020 19 plays 0  

Brian Kondracki - Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers

Mobile browsers have become one of the main mediators of our online activities. However, as web pages continue to increase in size and streaming media on-the-go has become commonplace, mobile data…

From  Katie Gentilello on September 22nd, 2020 15 plays 0