Search for tag: "privacy"

Nader Sehatbakhsh - Leveraging Side-Channel Signals for Security and Trust

With the proliferation of computing systems in our world, from servers to internet-of-things devices, side-channel signals have become significantly more available and accessible to measure and…

From  Kathryn Gentilello on November 18th, 2019 4 plays 0  

Alexandra Boldyreva - Secure Communication Channel Establishment: TLS 1.3 (Over TCP Fast Open) vs. QUIC

Secure channel establishment protocols such as TLS are some of the most important cryptographic protocols, enabling the encryption of Internet traffic. Reducing the latency (the number of…

From  Kathryn Gentilello on November 13th, 2019 8 plays 0  

Arijit Raychowdhury - Machine Learning in Profiled Side-Channel Attacks and Low-Overhead Countermeasures

Computationally secure Cryptographic algorithms, when implemented on physical hardware leak correlated physical signatures (e.g. power supply current, electromagnetic radiation, acoustic, thermal)…

From  Kathryn Gentilello on October 30th, 2019 9 plays 0  

Charles Johnson-Bey - Cyber Science: The Third Frontier

Over the last several decades Data Security became Information Security which then rolled into Cyber Security. All along this journey cyber has become defined as “Us versus Them”;…

From  Kathryn Gentilello on October 23rd, 2019 5 plays 0  

Peter Swire - The Growing Importance of the Non-Code Aspects of Cybersecurity

According to the National Initiative for Cybersecurity Education, half of the cybersecurity specialties now involve primarily non-code work. This lecture draws on the "Pedagogic Cybersecurity…

From  Kathryn Gentilello on October 15th, 2019 15 plays 0  

Ambrose Kam - Simulation-Based Cyber Wargaming

Cyber threats are rampant and their potential damages to enterprises continue to soar over time. Hence, cyber resilience techniques need to be examined and assessed for their effectiveness before…

From  Kathryn Gentilello on October 14th, 2019 9 plays 0  

Adam Bates - Can Data Provenance Put an End to the Data Breach?

In a provenance-aware system, mechanisms gather and report metadata that describes the history of each data object being processed, allowing us to understand how objects came to exist in their…

From  Kathryn Gentilello on October 11th, 2019 8 plays 0  

Margaret Loper - Trusting Smart Cities: Risk Factors and Implications

In the coming decades, we will live in a world surrounded by tens of billions of devices that will interoperate and collaborate in an effort to deliver personalized and autonomic services. This…

From  Kathryn Gentilello on September 19th, 2019 15 plays 0  

David Heath - Efficiently Computing with Private Data

Today, individual users and organizations often wish to contribute their private data to compute functions of interest. Unfortunately, when data is deemed too valuable or is legally protected, such…

From  Kathryn Gentilello on September 9th, 2019 46 plays 0  

Sakis Meliopoulos - Energy System Cyber Security: An Overview

The electric energy grid is a recognized critical infrastructure. It is vulnerable to self-disturbances as well as cyber-attacks. In particular cyber-attacks can cause from mild disruptions to…

From  Kathryn Gentilello on September 3rd, 2019 9 plays 0  

Simson L. Garfinkel - Attacking and Protecting Public Data with Differential Privacy

Publishing exact statistical data creates mathematical risks and vulnerabilities that have only recently been appreciated. In 2010, the U.S. Census Bureau collected information on more than 308…

From  Kathryn Gentilello on May 9th, 2019 43 plays 0  

Tohid Shekari - RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid

Recently, the number of cyber threats to power systems has increased at an unprecedented rate. For instance, the widespread blackout in Ukrainian power grid on December 2015 was a wakeup call that…

From  Kathryn Gentilello on May 1st, 2019 17 plays 0  

Cybersecurity Demo Day Awards

A School of Computer Science team won the Institute for Information Security and Privacy’s (IISP) Demo Day Finale for their work on making machine learning (ML) models more secure. The winning…

From  Kathryn Gentilello on April 30th, 2019 27 plays 0  

Carter Yagemann - Justitia

Biometric authentication promises userconvenience by measuring what makes eachof us unique using just a smartphone. Thedownside includes risks such as criminalsimpersonating us with stolen data and…

From  Kathryn Gentilello on April 30th, 2019 11 plays 0  

Tohid Shekari - LADIDS: Lightning-Authenticated Distributed Intrusion Detection System for the Power Grid

Recent events affecting power grids (such asthe Ukrainian blackout in 2015) have highlightedthe vulnerabilities in modern power systems,especially power substations which form thebackbone of…

From  Kathryn Gentilello on April 30th, 2019 11 plays 0  

Evan Downing - MLsploit

Machine learning is at risk of being attacked.As companies continue to depend onmachine learning to solve their problems,more sophisticated attacks are being createdto undermine and take advantage of…

From  Kathryn Gentilello on April 30th, 2019 9 plays 0