CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 1 to 25 of 711
03/20/2019

Securing IoT-based Cyber-Physical Human Systems against diverse attacks


Sathish Kumar - Coastal Carolina University
03/06/2019

Game theoretic modeling of cyber deception in the Internet of Battlefield Things

Game theoretic modeling of cyber deception in the Internet of Battlefield Things


Charles Kamhoua - US Army Research Laboratory
(173.8MB): Video Icon MP4 Video   Watch on Youtube
02/20/2019

Protection against Compromised Operating Systems on ARM Cortex-A Architecture

Protection against Compromised Operating Systems on ARM Cortex-A Architecture


Meng Yu - Roosevelt University
(335.1MB): Video Icon MP4 Video   Watch on Youtube
01/30/2019

Cancelled



01/23/2019

Secure Information Forwarding through Fragmentation in Delay- tolerant Networks

Secure Information Forwarding through Fragmentation in Delay- tolerant Networks


Sanjay Madria - Missouri University of Science and Technology
(232.6MB): Video Icon MP4 Video   Watch on Youtube
01/16/2019

A Data Privacy Primer

A Data Privacy Primer


Chris Clifton - Purdue University
(199.8MB): Video Icon MP4 Video   Watch on Youtube
12/05/2018

Normalizing Diverse Android Access Control Checks for Inconsistency Detection

Normalizing Diverse Android Access Control Checks for Inconsistency Detection


Yousra Aafer - Purdue University
(95.3MB): Video Icon MP4 Video   Watch on Youtube
11/28/2018

Developing a Public/Private Cybersecurity Scorecard for the State of Indiana

Developing a Public/Private Cybersecurity Scorecard for the State of Indiana


James Lerums - Purdue University
(167.7MB): Video Icon MP4 Video   Watch on Youtube
11/14/2018

Enemy Perspectives: When Nation-States Meet Cybercriminals

Enemy Perspectives: When Nation-States Meet Cybercriminals


Courtney Falk - Optiv
(387.3MB): Video Icon MP4 Video   Watch on Youtube
11/07/2018

IoT Security: Living on the Edge

IoT Security: Living on the Edge


Jason Ortiz - Pondurance
(338.3MB): Video Icon MP4 Video   Watch on Youtube
10/31/2018

Precise and Scalable Detection of Double-Fetch Bugs in Kernels

Precise and Scalable Detection of Double-Fetch Bugs in Kernels


Meng Xu - Georgia Tech
(122.8MB): Video Icon MP4 Video   Watch on Youtube
10/24/2018

80/20 Rule-Cyber Hygiene

80/20 Rule-Cyber Hygiene


Mark Loepker - SANMARK
(437.4MB): Video Icon MP4 Video   Watch on Youtube
10/17/2018

Applied Cyber and Mobile Security Consulting

Applied Cyber and Mobile Security Consulting


Ryan Goldsberry - Deloitte
(186.5MB): Video Icon MP4 Video   Watch on Youtube
10/03/2018

Open



09/26/2018

Kernel-Supported Cost-Effective Audit Logging for Causality Tracking

Kernel-Supported Cost-Effective Audit Logging for Causality Tracking


Shiqing Ma - Purdue University
(109.1MB): Video Icon MP4 Video   Watch on Youtube
09/19/2018

What's Private: Exploring Reasonable Expectation of Privacy in the Age of Modern Innovation

What's Private: Exploring Reasonable Expectation of Privacy in the Age of Modern Innovation


Jillean Long Battle - Rofori Corporation
(611.1MB): Video Icon MP4 Video   Watch on Youtube
09/12/2018

Security in All Aspects of Design


Jim Gordon - Intel
09/05/2018

Breaching Water Treatment Plants: Lessons Learned from Complex Exercises

Breaching Water Treatment Plants: Lessons Learned from Complex Exercises


Doug Rapp - Rofori Corporation
(375.3MB): Video Icon MP4 Video   Watch on Youtube
08/22/2018

Protecting Bare-metal Embedded Systems from Memory Corruption Attacks

Protecting Bare-metal Embedded Systems from Memory Corruption Attacks


Abe Clements - Purdue University
(125.1MB): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.