Archive

2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/09/2008

Security in a Changing World

Security in a Changing World


Eric Cole - Lockheed Martin
(569.7MB): Video Icon MP4 Video   Watch on Youtube
01/16/2008

Tor: Anonymous communications for government agencies, corporations, journalists... and you

Tor: Anonymous communications for government agencies, corporations, journalists... and you


Paul Syverson & Roger Dingledine - U.S. Naval Research Laboratory (NRL)
(366.1MB): Video Icon MP4 Video   Watch on Youtube
01/23/2008

Electronic Voting: Danger and Opportunity

Electronic Voting: Danger and Opportunity


Edward W. Felten - Princeton University
(604.5MB): Video Icon MP4 Video   Watch on Youtube
02/06/2008

A Question of Security


Carlos Solari - Alcatel-Lucent
02/27/2008

Managing Security Polarities

Managing Security Polarities


Buzz Walsh - Booz Allen Hamilton
(485.0MB): Video Icon MP4 Video   Watch on Youtube
03/05/2008

Hacking the Mobile Workforce

Hacking the Mobile Workforce


Daniel Hoffman - Fiberlink Communications
(484.7MB): Video Icon MP4 Video   Watch on Youtube
03/26/2008

Towards Event Source Location Privacy in Wireless Sensor Networks

Towards Event Source Location Privacy in Wireless Sensor Networks


Sencun Zhu - Pennsylvania State
(484.9MB): Video Icon MP4 Video   Watch on Youtube
04/02/2008

Exploiting Opportunistic Scheduling in Cellular Data Networks

Exploiting Opportunistic Scheduling in Cellular Data Networks


Hao Chen - University of California, Davis
(481.2MB): Video Icon MP4 Video   Watch on Youtube
04/09/2008

Shifting focus:  Aligning security with risk management

Shifting focus: Aligning security with risk management


Jack Jones - Risk Management Insight
(434.7MB): Video Icon MP4 Video   Watch on Youtube
04/16/2008

Static source code analysis

Static source code analysis


Jacob West - Fortify Software
(498.8MB): Video Icon MP4 Video   Watch on Youtube
04/23/2008

TBA



08/27/2008

Exploitable Redirects on the Web: Identification, Prevalence, and Defense

Exploitable Redirects on the Web: Identification, Prevalence, and Defense


Minaxi Gupta - Indiana University
(653.2MB): Video Icon MP4 Video   Watch on Youtube
09/03/2008

Private Queries in Location Based Services:  Anonymizers are not Necessary

Private Queries in Location Based Services: Anonymizers are not Necessary


Gabriel Ghinita - Purdue University
(531.7MB): Video Icon MP4 Video   Watch on Youtube
09/10/2008

Virtualization: Resource Coupling and Security across the Stack

Virtualization: Resource Coupling and Security across the Stack


Dennis Moreau - Configuresoft
(554.3MB): Video Icon MP4 Video   Watch on Youtube
09/24/2008

Responding to Anomalous Database Requests

Responding to Anomalous Database Requests


Ashish Kamra - Purdue University
(393.1MB): Video Icon MP4 Video   Watch on Youtube
10/01/2008

Resilient Systems for Mission Assurance

Resilient Systems for Mission Assurance


Dave Keppler - MITRE
(437.5MB): Video Icon MP4 Video   Watch on Youtube
10/08/2008

Measuring the Attack Surfaces of Enterprise Software Systems

Measuring the Attack Surfaces of Enterprise Software Systems


Yuecel Karabulut - SAP Research
(600.7MB): Video Icon MP4 Video   Watch on Youtube
10/22/2008

Access Control and Resiliency for WS-BPEL

Access Control and Resiliency for WS-BPEL


Federica Paci - Purdue University
(362.7MB): Video Icon MP4 Video   Watch on Youtube
10/29/2008

Trends in Identity Management

Trends in Identity Management


Kenji Takahashi - ITT Information Sharing Platform Laboratories
(612.4MB): Video Icon MP4 Video   Watch on Youtube
11/12/2008

John Oritz, SRA International

John Oritz, SRA International


John Oritz - SRA International
(687.6MB): Video Icon MP4 Video   Watch on Youtube
11/19/2008

The Role Graph Model and its Extensions

The Role Graph Model and its Extensions


Sylvia Osborn - University of Western Ontario
(577.3MB): Video Icon MP4 Video   Watch on Youtube
12/03/2008

Automatic Signature Generation for Unknown Vulnerabilities

Automatic Signature Generation for Unknown Vulnerabilities


Weidong Cui - Microsoft
(564.8MB): Video Icon MP4 Video   Watch on Youtube

Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information