Cyber Security & Resilience Seminar Series (CySe3)
Muhammad Sardar (TU Dresden): Specs and Analysis of Attestation Mechanisms in Confidential Computing
56:52
Cyber Security & Resilience Seminar Series (CySe3)
Fulvio Valenza (Politecnico di Torino) - Formal and Automatic Network Security Configuration
53:01
Cyber Security & Resilience Seminar Series (CySe3)
Nataliia Bielova (Inria)Protecting Privacy of Web Users: Technical and Legal Perspectives
1:05:20
Cyber Security & Resilience Seminar Series (CySe3)
Jam Ramanujam (IMSc Chennai)Insecurity, going from terms to formulas
1:00:58
Cyber Security & Resilience Seminar Series (CySe3)
François Dupressoir(U. Bristol) EasyCrypt in anger Proofs for Primitives, Constructions & Protocols
1:08:30
Cyber Security & Resilience Seminar Series (CySe3)
Alexandre Debant (Inria Nancy) - Breaking the French Legislative Election E-Voting Protocol
1:02:57
Cyber Security & Resilience Seminar Series (CySe3)
Tom Chothia (U. Birmingham) - Blackbox and Grey-box Approaches to Protocol State Machine Learning
1:01:40
Cyber Security & Resilience Seminar Series (CySe3)
Pascal Lafourcade (Clermont Auvergne University) - (In)Security of e-exams
58:42
Cyber Security & Resilience Seminar Series (CySe3)
Steve Kremer (Inria Nancy) Symbolic Protocol Verification with Dice
1:00:59
Cyber Security & Resilience Seminar Series (CySe3)
Charlie Jacomme (CISPA) - Joint FM-SEC - Formal Methods in the Standardization of the EDHOC Protocol
1:06:09
Cyber Security & Resilience Seminar Series (CySe3)
Vincent Cheval (INRIA Paris) - Joint FM-SEC - Global states in ProVerif
1:00:09
Cyber Security & Resilience Seminar Series (CySe3)
Kenny Paterson (ETH Zurich) - Probabilistic Data Structures in Adversarial Environments
1:15:00
Cyber Security & Resilience Seminar Series (CySe3)
Musard Balliu (KTH Royal Institute of Technology) [Joint FM-SEC talk] Securing Cloud-based IoT Apps
52:49
Cyber Security & Resilience Seminar Series (CySe3)
Sasa Radomirovic (University of Surrey) - Managing our online account security
1:26:56
Cyber Security & Resilience Seminar Series (CySe3)
Bruno Blanchet(INRIA) - Joint FM-SEC -The security protocol verifier ProVerif and its improvements
59:17
Cyber Security & Resilience Seminar Series (CySe3)
Qiang Tang (University of Sydney) - Dumbo Protocol Family: Making Asynchronous Consensus Real
1:04:31
Cyber Security & Resilience Seminar Series (CySe3)
Nicolas Papernot (U. of Toronto) - Is Differential Privacy a Silver Bullet for Machine Learning?
47:26
Cyber Security & Resilience Seminar Series (CySe3)
Florian Kerschbaum (University of Waterloo) - Security and Privacy in Data Science
1:15:39
Cyber Security & Resilience Seminar Series (CySe3)
Ben Stock (CISPA) - Failing Content Security Policy? Learning from its past to improve its future
54:10
Cyber Security & Resilience Seminar Series (CySe3)
Elissa M. Redmiles (MPI-SWS) Responsibly Encouraging Adoption of Contact Tracing Apps
50:12
Cyber Security & Resilience Seminar Series (CySe3)
Ben Zhao (U. of Chicago) Evolving Perspectives on Adversarial Robustness for Deep Neural Networks
1:03:35
Cyber Security & Resilience Seminar Series (CySe3)
Omar Haider Chowdhury (IOWA)-Towards a High-Assurance and Spec.-Compliant X.509 PKI Implementation
1:09:53
Cyber Security & Resilience Seminar Series (CySe3)
Bo Li (UIUC) - Trustworthy ML: Robustness, Privacy, Generalization, and their Interconnections
1:03:27
Cyber Security & Resilience Seminar Series (CySe3)
Luca De Feo (IBM Research) - On the (in)security of ElGamal in OpenPGP
1:14:03
Cyber Security & Resilience Seminar Series (CySe3)
Nick Nikiforakis (Stony Brook U.) - Small & Different: Security and Privacy Risks of Mobile Browsers
1:01:36
Cyber Security & Resilience Seminar Series (CySe3)
Robert Buhren (TU Berlin) - Fault Injection Attacks against AMD’s Secure Encrypted Virtualization
49:39
Cyber Security & Resilience Seminar Series (CySe3)
Herbert Bos (Vrije Universiteit Amsterdam) - Attacks on Hardware: How to Ruin Your Life
1:01:38
Cyber Security & Resilience Seminar Series (CySe3)
Adam Morrison (TAU) - An Analysis of Speculative Type Confusion Vulnerabilities in the Wild
1:02:06
Cyber Security & Resilience Seminar Series (CySe3)
Ana Salagean (Loughborough Uni) - Estimating the nonlinearity of cryptographic Boolean functions
1:00:17
Cyber Security & Resilience Seminar Series (CySe3)
Basel Halak (Uni of Southampton) - PUFS: Design Principles, Applications and Outstanding Challenges
56:21
Cyber Security & Resilience Seminar Series (CySe3)
Ioana Boureanu (University of Surrey) - Analysis Security of Contactless Mobile Payments
1:03:22
Cyber Security & Resilience Seminar Series (CySe3)
Florian Schaub (University of Michigan) - Human-centric Privacy Design and Engineering
59:03
Cyber Security & Resilience Seminar Series (CySe3)
Hoang Nga Nguyen (Coventry) - Automotive Testbed for Developing and Validating Security Solutions
47:25
Cyber Security & Resilience Seminar Series (CySe3)
Aydin Abadi (UCL) - Polynomial Representation Is Tricky: Maliciously Secure PSI Revisited
51:30
Cyber Security & Resilience Seminar Series (CySe3)
Roei Schuster (Cornell University) - Resilient Machine Learning: A Systems-Security Perspective
50:02
Cyber Security & Resilience Seminar Series (CySe3)
George Theodorakopoulos (Cardiff University) - Quantifying Location Privacy [ToT Award IEEE S&P 21]
1:00:40
Cyber Security & Resilience Seminar Series (CySe3)
Feng Hao (Warwick University) - An Overview of Password-authenticated Key Exchange Protocols
1:02:36
Cyber Security & Resilience Seminar Series (CySe3)
Nicholas Carlini(Google) An Unreliable Foundation Security & Privacy of Large Scale Machine Learning
1:05:18
Cyber Security & Resilience Seminar Series (CySe3)
Grigorios Loukides (King’s College London) - Combinatorial String Dissemination
44:43
Cyber Security & Resilience Seminar Series (CySe3)
Dmitry Kogan (Stanford University) - Private Blocklist Lookups with Checklist
55:37
Cyber Security & Resilience Seminar Series (CySe3)
Joseph Hallett (Bristol) - Do specifications lead to securely stored passwords?
1:02:48
Cyber Security & Resilience Seminar Series (CySe3)
Jason Nurse (Kent) - A Framework for Effective Corporate Communication after Cybersecurity Incidents
1:05:50
Cyber Security & Resilience Seminar Series (CySe3)
Roberto Guanciale (KTH) - InSpectre: Breaking & Fixing Microarchitectural Vulns by Formal Analysis
1:00:54
Cyber Security & Resilience Seminar Series (CySe3)
Ian Thornton-Trump (Cyjax) - The Eight Principles of Security Leadership
1:07:16
Cyber Security & Resilience Seminar Series (CySe3)
XiaoFeng Wang (IU Bloomington)-Confidential Computing: Challenges Today & Opportunities Tomorrow
1:17:13
Cyber Security & Resilience Seminar Series (CySe3)
Zhiyun Qian(UC Riverside) - Weaponizing Network Side Channels: TCP Hijacking to DNS Cache Poisoning
59:43
Cyber Security & Resilience Seminar Series (CySe3)
Kovila Coopamootoo (Newcastle University)-Usage Patterns of Privacy-Enhancing Technologies [CCS ’20]
1:00:21
Cyber Security & Resilience Seminar Series (CySe3)
Jorge Blasco Alis(RHUL)- Information-Flow Analysis for Mobile and Wearable Device Security & Privacy
54:30
Cyber Security & Resilience Seminar Series (CySe3)
Arthur Gervais (Imperial College London) - High-Frequency Trading on Decentralized OnChain Exchanges
1:00:45
Cyber Security & Resilience Seminar Series (CySe3)
UK-SPS Live Stream
Cyber Security & Resilience Seminar Series (CySe3)
Changyu Dong(Newcastle University)-Making PDCE Practical (and getting Differential Privacy for Free)
40:08
Cyber Security & Resilience Seminar Series (CySe3)
Peter Ryan (University of Luxembourg) - Trust and Trustworthiness of Voting Systems
57:48