CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/09/2008

Security in a Changing World

Security in a Changing World


Eric Cole - Lockheed Martin
(569.7MB): Video Icon MP4 Video   Watch on Youtube
01/16/2008

Tor: Anonymous communications for government agencies, corporations, journalists... and you

Tor: Anonymous communications for government agencies, corporations, journalists... and you


Paul Syverson & Roger Dingledine - U.S. Naval Research Laboratory (NRL)
(366.1MB): Video Icon MP4 Video   Watch on Youtube
01/23/2008

Electronic Voting: Danger and Opportunity

Electronic Voting: Danger and Opportunity


Edward W. Felten - Princeton University
(604.5MB): Video Icon MP4 Video   Watch on Youtube
02/06/2008

A Question of Security


Carlos Solari - Alcatel-Lucent
02/27/2008

Managing Security Polarities

Managing Security Polarities


Buzz Walsh - Booz Allen Hamilton
(485.0MB): Video Icon MP4 Video   Watch on Youtube
03/05/2008

Hacking the Mobile Workforce

Hacking the Mobile Workforce


Daniel Hoffman - Fiberlink Communications
(484.7MB): Video Icon MP4 Video   Watch on Youtube
03/26/2008

Towards Event Source Location Privacy in Wireless Sensor Networks

Towards Event Source Location Privacy in Wireless Sensor Networks


Sencun Zhu - Pennsylvania State
(484.9MB): Video Icon MP4 Video   Watch on Youtube
04/02/2008

Exploiting Opportunistic Scheduling in Cellular Data Networks

Exploiting Opportunistic Scheduling in Cellular Data Networks


Hao Chen - University of California, Davis
(481.2MB): Video Icon MP4 Video   Watch on Youtube
04/09/2008

Shifting focus:  Aligning security with risk management

Shifting focus: Aligning security with risk management


Jack Jones - Risk Management Insight
(434.7MB): Video Icon MP4 Video   Watch on Youtube
04/16/2008

Static source code analysis

Static source code analysis


Jacob West - Fortify Software
(498.8MB): Video Icon MP4 Video   Watch on Youtube
04/23/2008

TBA



08/27/2008

Exploitable Redirects on the Web: Identification, Prevalence, and Defense

Exploitable Redirects on the Web: Identification, Prevalence, and Defense


Minaxi Gupta - Indiana University
(653.2MB): Video Icon MP4 Video   Watch on Youtube
09/03/2008

Private Queries in Location Based Services:  Anonymizers are not Necessary

Private Queries in Location Based Services: Anonymizers are not Necessary


Gabriel Ghinita - Purdue University
(531.7MB): Video Icon MP4 Video   Watch on Youtube
09/10/2008

Virtualization: Resource Coupling and Security across the Stack

Virtualization: Resource Coupling and Security across the Stack


Dennis Moreau - Configuresoft
(554.3MB): Video Icon MP4 Video   Watch on Youtube
09/24/2008

Responding to Anomalous Database Requests

Responding to Anomalous Database Requests


Ashish Kamra - Purdue University
(393.1MB): Video Icon MP4 Video   Watch on Youtube
10/01/2008

Resilient Systems for Mission Assurance

Resilient Systems for Mission Assurance


Dave Keppler - MITRE
(437.5MB): Video Icon MP4 Video   Watch on Youtube
10/08/2008

Measuring the Attack Surfaces of Enterprise Software Systems

Measuring the Attack Surfaces of Enterprise Software Systems


Yuecel Karabulut - SAP Research
(600.7MB): Video Icon MP4 Video   Watch on Youtube
10/22/2008

Access Control and Resiliency for WS-BPEL

Access Control and Resiliency for WS-BPEL


Federica Paci - Purdue University
(362.7MB): Video Icon MP4 Video   Watch on Youtube
10/29/2008

Trends in Identity Management

Trends in Identity Management


Kenji Takahashi - ITT Information Sharing Platform Laboratories
(612.4MB): Video Icon MP4 Video   Watch on Youtube
11/12/2008

John Oritz, SRA International

John Oritz, SRA International


John Oritz - SRA International
(687.6MB): Video Icon MP4 Video   Watch on Youtube
11/19/2008

The Role Graph Model and its Extensions

The Role Graph Model and its Extensions


Sylvia Osborn - University of Western Ontario
(577.3MB): Video Icon MP4 Video   Watch on Youtube
12/03/2008

Automatic Signature Generation for Unknown Vulnerabilities

Automatic Signature Generation for Unknown Vulnerabilities


Weidong Cui - Microsoft
(564.8MB): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.