CERIAS Security Seminar Archive
2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |Results
Showing: 1 to 25 of 707
02/13/2019
Steve Chapin - Lawrence Livermore National Laboratory
Defending the Grid for Fun and Non-Profit: Cybersecurity and Infrastructure Resilience Research at LLNL
Steve Chapin - Lawrence Livermore National Laboratory
02/06/2019

David Ebert - Purdue University
(361.3MB):
MP4 Video

Trustable Information for Security Applications: Visual Analytics for Reliable, Effective Decision Making
David Ebert - Purdue University
(361.3MB):


01/23/2019

Sanjay Madria - Missouri University of Science and Technology
(232.6MB):
MP4 Video

Secure Information Forwarding through Fragmentation in Delay- tolerant Networks
Sanjay Madria - Missouri University of Science and Technology
(232.6MB):


01/09/2019

Haotian Deng - Purdue University
(205.2MB):
MP4 Video

CEIVE: Combating Caller ID Spoofing on 4G Mobile Phones Via Callee-Only Inference & Verification
Haotian Deng - Purdue University
(205.2MB):


12/05/2018

Yousra Aafer - Purdue University
(95.3MB):
MP4 Video

Normalizing Diverse Android Access Control Checks for Inconsistency Detection
Yousra Aafer - Purdue University
(95.3MB):


11/28/2018

James Lerums - Purdue University
(167.7MB):
MP4 Video

Developing a Public/Private Cybersecurity Scorecard for the State of Indiana
James Lerums - Purdue University
(167.7MB):


11/14/2018

Courtney Falk - Optiv
(387.3MB):
MP4 Video

Enemy Perspectives: When Nation-States Meet Cybercriminals
Courtney Falk - Optiv
(387.3MB):


10/31/2018

Meng Xu - Georgia Tech
(122.8MB):
MP4 Video

Precise and Scalable Detection of Double-Fetch Bugs in Kernels
Meng Xu - Georgia Tech
(122.8MB):


10/17/2018

Ryan Goldsberry - Deloitte
(186.5MB):
MP4 Video

Applied Cyber and Mobile Security Consulting
Ryan Goldsberry - Deloitte
(186.5MB):


10/10/2018

Jessy Irwin - Tendermint
(459.7MB):
MP4 Video

Double the Factors, Double the Fails: How Usability Obstacles Impact Adoption of Strong Authentication Habits
Jessy Irwin - Tendermint
(459.7MB):


09/26/2018

Shiqing Ma - Purdue University
(109.1MB):
MP4 Video

Kernel-Supported Cost-Effective Audit Logging for Causality Tracking
Shiqing Ma - Purdue University
(109.1MB):


09/19/2018

Jillean Long Battle - Rofori Corporation
(611.1MB):
MP4 Video

What's Private: Exploring Reasonable Expectation of Privacy in the Age of Modern Innovation
Jillean Long Battle - Rofori Corporation
(611.1MB):


09/05/2018

Doug Rapp - Rofori Corporation
(375.3MB):
MP4 Video

Breaching Water Treatment Plants: Lessons Learned from Complex Exercises
Doug Rapp - Rofori Corporation
(375.3MB):


08/29/2018

Ryan Elkins - Eli Lilly
(220.3MB):
MP4 Video

Hacking your security career: strategies that college did not teach me
Ryan Elkins - Eli Lilly
(220.3MB):


08/22/2018

Abe Clements - Purdue University
(125.1MB):
MP4 Video

Protecting Bare-metal Embedded Systems from Memory Corruption Attacks
Abe Clements - Purdue University
(125.1MB):


04/18/2018

Leon Ravenna - KAR Auction Services, Inc.
(366.6MB):
MP4 Video

Personally Identifiable Data and the Specter of Customer Privacy
Leon Ravenna - KAR Auction Services, Inc.
(366.6MB):


04/11/2018

Debajyoti Das - Purdue University
(141.9MB):
MP4 Video

Anonymity Trilemma : Strong Anonymity, Low Bandwidth Overhead, Low Latency – Choose Two.
Debajyoti Das - Purdue University
(141.9MB):


Disclaimer
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.