Search for tag: "cybersecurity lecture series"

Joseph Jaeger - Bridging the Theory and Practice of Cryptography

Cryptography is deployed at scale to protect data, both in transit and at rest. However, protocols are often designed or even deployed aiming for security that extends beyond what is formally…

From  Katie Gentilello 41 plays 0  

Zane Ma - Understanding the Trust Relationships of the Web PKI

From  Katie Gentilello 15 plays 0  

Todd McClelland - Cyber on Trial: An Insider's View of the Legal Fallout from Cybersecurity Issues in the Corporate Enterprise

The recent rise in cybersecurity breaches, geopolitical cyber events, and resulting legal developments have placed the spotlight on the cybersecurity professional and their role in the corporate…

From  Katie Gentilello 8 plays 0  

Kevin Hutto - Sensing with Random Encoding for Enhanced Security in Embedded Systems

Embedded systems in physically insecure environments are subject to additional security risk via capture by an adversary. A captured microchip device can be reverse engineered to recover internal…

From  Katie Gentilello 67 plays 0  

Kennon Bittick - Function Equivalence with Symbolic Execution

Summarizing and comparing basic blocks or functions across different binaries or between binary and source code has many applications for program verification including verifying compilation, source…

From  Katie Gentilello 19 plays 0  

Elie Khoury - Voice Biometrics and Emerging Security Threats in the Voice Channel

Voice Biometrics is the automated recognition of individuals based on their voice characteristics that are both biological and behavioral. Voice Biometrics is currently deployed in many real world…

From  Katie Gentilello 23 plays 0  

Tianxin Tang - Provably-Secure Approximate k-NN Search Protocol

This talk examines the problem of privacy-preserving approximate kNN search in an outsourced environment — the client sends the encrypted data to an untrusted server and later can perform…

From  Katie Gentilello 33 plays 0  

Ambrose Kam - Applying Deep Reinforcement Learning (DRL) in a Cyber Wargaming Engine

Cybersecurity is inherently complicated due to the dynamic nature of the threats and ever-expanding attack surfaces. Ironically, this challenge is exacerbated by the rapid advancement of many new…

From  Katie Gentilello 39 plays 0  

Hany Farid - Creating, Weaponizing, and Detecting Deep Fakes

The past few years have seen a startling and troubling rise in the fake-news phenomena in which everyone from individuals to nation-sponsored entities can produce and distribute misinformation. The…

From  Katie Gentilello 24 plays 0  

Harri Hursti - War By Other Means

From  Katie Gentilello 21 plays 0  

Yuliia Lut - Recent Insights from Analysis of Users' Web Browsing Behavior

Accurately analyzing and modeling online browsing behavior plays a key role in understanding users and technology interactions. Specifically, understanding whether users have correct perceptions of…

From  Katie Gentilello 18 plays 0  

Beliz Kaleli - To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media

To make their services more user friendly, online social media platforms automatically identify text that corresponds to URLs and render it as clickable links. In this paper, we show that the…

From  Katie Gentilello 11 plays 0  

Phani Vadrevu - What You See is NOT What You Get: Discovering and Tracking Ad-driven Social Engineering Attack Campaigns

From  Katie Gentilello 13 plays 0  

David Heath - Zero Knowledge for Everything and Everyone

Zero-Knowledge (ZK) Proofs are important cryptographic objects that allow an untrusted prover to demonstrate to an untrusted verifier the truth of some statement while revealing nothing additional.…

From  Katie Gentilello 45 plays 0  

Lefteris Anastasopoulos - Securing Democracy in the Fourth Industrial Revolution

In this talk I discuss research which focuses on designing systems needed to secure democracy and democratic political institutions, such as elections, in the interconnected digital world of the…

From  Katie Gentilello 29 plays 0  

Evan W. Glover - Building a Strategic Privacy Program

Privacy is a multi-faceted challenge for organizations – to be successful, they must take a holistic approach to protecting the personal data and information of all stakeholders. Privacy…

From  Katie Gentilello 62 plays 0