Past Events
Science of Security Speaker Series
Date | Presenter | Title | Abstract, Slides & Video |
---|---|---|---|
04/02/2015 | Somesh Jha, University of Wisconsin, Madison | Thoughts on Retrofitting Legacy Code for Security | Media Link |
09/24/2015 | Patrick McDaniel, The Pennsylvania State University | Seven Years of Mobile Smartphone Security | Media Link |
10/16/2015 | Paul Barford, University of Wisconsin, Madison | Methods and Characteristics of Fraud in Online Advertising | Media Link |
11/13/2015 | Niels Provos, Google, Inc. | Security at Scale | Media Link |
02/09/2016 | J. Alex Halderman, University of Michigan | Logjam: Diffie-Hellman, Discrete Logs, the NSA, and You | Media Link |
03/30/2016 | Srdjan Capkun, ETH Zurich | Secure Positioning: From GPS to IoT Applications | Media Link |
04/12/2016 | Patrick Traynor, University of Florida | Who Do I Think You Are? Challenges and Opportunities in Telephony Authentication | Media Link |
09/14/2016 | David Stern, DISA | Software Defined Everything: Moving to the DoD Information Core | Abstract |
10/06/2016 | Nadia Heninger, University of Pennsylvania | The Legacy of Export-grade Cryptography in the 21st Century | Media Link |
10/18/2016 | Franziska Roesner, University of Washington | Computer Security, Privacy, and User Expectations: Case Studies in Web Tracking and Application Permissions | Media Link |
01/17/2017 | Nathaniel Gleicher, Illunio | What the Secret Service Can Teach Us About Cybersecurity | Media Link |
03/23/2017 | Peter Popov, City, University of London | Conceptual Models of Reliability of Fault-tolerant Software Under Cyber-attacks | Media Link |
04/28/2017 | Paulo Esteves-Verissimo, University of Luxembourg | Grand Research Challenges for Cybersecurity of Critical Information and Infrastructures | Media Link |
Fall 2015 Trust and Security/Science of Security Seminars
Date | Presenter | Title | Abstract, Slides & Video |
---|---|---|---|
9/15/2015 | Brighten Godfrey | A Hypothesis Testing Framework for Network Security | Media Link |
10/6/2015 | Eric Badger | Scalable Data Analytics Pipeline for Real-Time Attack Detection; Design, Validation, and Deployment in a Honeypot Environment | Media Link |
10/20/2015 | Mohammad Noureddine | Accounting for User Behavior in Predictive Cyber Security Models | Media Link |
11/3/2015 | Zhenqi Huang Yu Wang | SMT-Based Controller Synthesis for Linear Dynamical Systems with Adversary | Media Link |
Spring 2016 Trust and Security/Science of Security Seminars
Date | Presenter | Title | Abstract, Slides & Video |
---|---|---|---|
01/26/2016 | Tao Xie | User Expectations in Mobile App Security | Media Link |
03/01/2016 | Wing Lam | Towards Preserving Mobile Users' Privacy in the Context of Utility Apps | Abstract |
03/15/2016 | Dong (Kevin) Jin | Towards a Secure and Resilient Industrial Control System with Software-Defined Networking | Media Link |
04/26/2016 | Zhenqi Huang and Yu Wang | Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems | Media Link |
05/03/2016 | Phuong Cao | Preemptive Intrusion Detection - Practical Experience and Detection Framework | Media LInk |
Fall 2016 Trust and Security/Science of Security Seminars
Date | Presenter | Title | Abstract, Slides & Video |
---|---|---|---|
08/30/2016 | Giulia Fanti | Spy vs. Spy: Anonymous Messaging over Networks | Media Link |
10/11/2016 | Santhosh Prabhu | Oreo: Transparent Optimization to Enable Flexible Policy Enforcement in Software Defined Networks | Media Link |
11/01/2016 | Phuong Cao | Automated Generation of Attack Signatures in Attack Graphs | Media Link |
11/29/2016 | Dengfeng Li | Toward Privacy-Preserving Mobile Utility Apps: A Balancing Act | Media Link |
12/06/2016 | Ahmed Fawaz | Behavioral Analysis for Cyber Resilience | Media Link |
Spring 2017 Trust and Security/Science of Security Seminars
Date | Presenter | Title | Abstract, Slides & Video |
---|---|---|---|
02/21/2017 | Giulia Fanti | Anonymity in the Bitcoin Peer-to-Peer Network | Media Link |
02/28/2017 | CANCELLED: Christopher Hannon, Illinois Institute of Technology | Combining Simulation and Emulation Systems for Smart Grid Planning and Evaluation | Abstract |
04/11/2017 | Hussein Sibai | Optimal Data Rate for State Estimation of Switched Nonlinear Systems | Media Link |
Science of Security Symposiums and Workshops
Date | Meeting | Location |
---|---|---|
04/21-22/2015 | Symposium and Bootcamp on the Science of Security (HotSoS 2015) | University of Illinois at Urbana-Champaign Urbana, IL |
04/11/2016 | Science of Security Cyber-Physical Systems Workshop (SoSCYPS 2016) in conjunction with CPS Week | Vienna, Austria |
04/20-21/2016 | Symposium and Bootcamp on the Science of Security (HotSoS 2016) | Carnegie Mellon University Pittsburgh, PA |
05/26/2016 | Learning from Authoritative Security Experiment Results (LASER 2016) in conjunction with IEEE Symposium on Security and Privacy | San Jose, CA |
06/16-17/2016 | Workshop on Science of Security through Software-Defined Networking (SoSSDN 2016) | Illinois Institute of Technology Chicago, IL |
06/28/2016 | Workshop on Safety and Control for Artificial Intelligence (SAFARTINT) | Carnegie Mellon University Pittsburgh, PA |
11/14/2016 | 2nd International Code Hunt Workshop on Educational Software Engineering (CHESE 2016) | Seattle, WA |
04/04-05/2017 | Symposium and Bootcamp on Hot Topics of Science of Security (HoTSoS 2017) | Hanover, MD |
05/14/2017 | International Workshop on Assured Cloud Computing and QoS aware Big Data (WACC 2017) | Madrid, Spain |
04/10-11/2018 | Symposium and Bootcamp on Hot Topics of Science of Security (HoTSoS 2018) | Raleigh, NC |
04/01-03/2019 | Symposium and Bootcamp on Hot Topics of Science of Security (HoTSoS 2019) | Nashville, TN |