Search for tag: "information security"

Kevin Hutto - Sensing with Random Encoding for Enhanced Security in Embedded Systems

Embedded systems in physically insecure environments are subject to additional security risk via capture by an adversary. A captured microchip device can be reverse engineered to recover internal…

From  Katie Gentilello on May 7th, 2021 58 plays 0  

Kennon Bittick - Function Equivalence with Symbolic Execution

Summarizing and comparing basic blocks or functions across different binaries or between binary and source code has many applications for program verification including verifying compilation, source…

From  Katie Gentilello on May 6th, 2021 12 plays 0  

Elie Khoury - Voice Biometrics and Emerging Security Threats in the Voice Channel

Voice Biometrics is the automated recognition of individuals based on their voice characteristics that are both biological and behavioral. Voice Biometrics is currently deployed in many real world…

From  Katie Gentilello on April 9th, 2021 17 plays 0  

Tianxin Tang - Provably-Secure Approximate k-NN Search Protocol

This talk examines the problem of privacy-preserving approximate kNN search in an outsourced environment — the client sends the encrypted data to an untrusted server and later can perform…

From  Katie Gentilello on April 1st, 2021 15 plays 0  

Ambrose Kam - Applying Deep Reinforcement Learning (DRL) in a Cyber Wargaming Engine

Cybersecurity is inherently complicated due to the dynamic nature of the threats and ever-expanding attack surfaces. Ironically, this challenge is exacerbated by the rapid advancement of many new…

From  Katie Gentilello on April 1st, 2021 22 plays 0  

Hany Farid - Creating, Weaponizing, and Detecting Deep Fakes

The past few years have seen a startling and troubling rise in the fake-news phenomena in which everyone from individuals to nation-sponsored entities can produce and distribute misinformation. The…

From  Katie Gentilello on March 30th, 2021 16 plays 0  

Yuliia Lut - Recent Insights from Analysis of Users' Web Browsing Behavior

Accurately analyzing and modeling online browsing behavior plays a key role in understanding users and technology interactions. Specifically, understanding whether users have correct perceptions of…

From  Katie Gentilello on March 3rd, 2021 15 plays 0  

Beliz Kaleli - To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media

To make their services more user friendly, online social media platforms automatically identify text that corresponds to URLs and render it as clickable links. In this paper, we show that the…

From  Katie Gentilello on February 21st, 2021 10 plays 0  

David Heath - Zero Knowledge for Everything and Everyone

Zero-Knowledge (ZK) Proofs are important cryptographic objects that allow an untrusted prover to demonstrate to an untrusted verifier the truth of some statement while revealing nothing additional.…

From  Katie Gentilello on February 10th, 2021 33 plays 0  

Lefteris Anastasopoulos - Securing Democracy in the Fourth Industrial Revolution

In this talk I discuss research which focuses on designing systems needed to secure democracy and democratic political institutions, such as elections, in the interconnected digital world of the…

From  Katie Gentilello on January 23rd, 2021 26 plays 0  

Evan W. Glover - Building a Strategic Privacy Program

Privacy is a multi-faceted challenge for organizations – to be successful, they must take a holistic approach to protecting the personal data and information of all stakeholders. Privacy…

From  Katie Gentilello on December 7th, 2020 59 plays 0  

Henry Tong, Larry LaMont - Mobilizing mmWave to Realize the Full 5G Potential

5G NR mmWave opens doors to vast amounts of network capacity, fiber-like speeds and ultra-low latencies that promise to bring new and enhanced experiences to the masses, as well as inherent security…

From  Katie Gentilello on November 23rd, 2020 10 plays 0  

Jakub Szefer - Securing FPGA-Accelerated Cloud Infrastructures

Cloud FPGAs have been gaining popularity in recent years due to the ability of users to request FPGA resources quickly, flexibly, and on-demand. However, as public cloud providers make FPGAs…

From  Katie Gentilello on November 18th, 2020 22 plays 0  

Karthika Subramani - When Push comes to Ads: Measuring the Rise of (Malicious) Push Advertising

The rapid growth of online advertising has fueled the growth of ad-blocking software, such as new ad-blocking and privacy-oriented browsers or browser extensions. In response, both ad publishers and…

From  Katie Gentilello on November 5th, 2020 20 plays 0