The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

01/22/2014

Cancelled

Episode #539
01/29/2014
Secure and Private Outsourcing to Untrusted Cloud Servers

Secure and Private Outsourcing to Untrusted Cloud Servers

Shumiao Wang - Purdue University

02/05/2014

Cancelled

Episode #541
02/19/2014
Technical Tradeoffs in the NSA's Mass Phone Call Program

Technical Tradeoffs in the NSA's Mass Phone Call Program

Ed Felten - Princeton University

Episode #542
02/26/2014
Delivering "Always-on" Services Despite Flaky Network Infrastructure

Delivering "Always-on" Services Despite Flaky Network Infrastructure

Rahul Potharaju - Purdue University

Episode #543
03/05/2014
Machine Intelligence for Biometric and On-Line Security

Machine Intelligence for Biometric and On-Line Security

Marina Gavrilova - University of Calgary

Episode #544
03/12/2014
General-Purpose Secure Computation and Outsourcing

General-Purpose Secure Computation and Outsourcing

Marina Blanton - University of Notre Dame

Episode #545
03/26/2014
Why so CERIAS!? Why we're losing and what to do about it.

Why so CERIAS!? Why we're losing and what to do about it.

Joshua Corman - Sonatype

Episode #546
04/02/2014
CERIAS Poster Contest Winners

CERIAS Poster Contest Winners

Philip Ritchey & Mohammed Almeshekah - Purdue University

Episode #547
04/09/2014
Integrity Levels: A New Paradigm for Protecting Computing Systems

Integrity Levels: A New Paradigm for Protecting Computing Systems

Chris Jenkins - Sandia

Episode #548
04/16/2014
Online Privacy Agreements, is it Informed Consent?

Online Privacy Agreements, is it Informed Consent?

Masooda Bashir - University of Illinois at Urbana-Champaign

04/23/2014

Cancelled

Episode #549
04/30/2014
Women In Cyber Security

Women In Cyber Security

Rachel Sitarz - Purdue University

Episode #550
08/27/2014

Tree-based Oblivious RAM and Applications

Elaine Shi - University of Maryland

Episode #551
09/03/2014
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse

DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse

Brendan Saltaformaggio - Purdue University

Episode #552
09/10/2014
WarGames in Memory: Fighting Powerful Attackers

WarGames in Memory: Fighting Powerful Attackers

Mathias Payer - Purdue University

Episode #553
09/17/2014
MITRE/Purdue Mobile Masquerading User Experiment

MITRE/Purdue Mobile Masquerading User Experiment

Mark Guido - MITRE

Episode #554
09/24/2014
Threat intelligence and digital forensics

Threat intelligence and digital forensics

Sam Liles - Purdue University

Episode #555
10/01/2014
Responsible Information Management and the 2014 Cost of Data Breach: Global Analysis

Responsible Information Management and the 2014 Cost of Data Breach: Global Analysis

Larry Ponemon - Ponemon Institute

Episode #556
10/08/2014
Biometrics and Usability

Biometrics and Usability

Stephen Elliott - Purdue University

10/15/2014

Canceled

Episode #557
10/22/2014
"Memory Analysis, Meet GPU Malware"

"Memory Analysis, Meet GPU Malware"

Golden G. Richard III - University of New Orleans

Episode #558
10/29/2014
Healthcare Security and Privacy: Not There Yet

Healthcare Security and Privacy: Not There Yet

Robert Zimmerman - Inforistec

Episode #559
11/05/2014
Improving Analyst Team Performance and Capability in NOC / SOC Operations Centers

Improving Analyst Team Performance and Capability in NOC / SOC Operations Centers

Barrett Caldwell and Omar Eldardiry - Purdue University

Episode #560
11/12/2014
You can hack, but you can't hide: Using log analysis to detect APTs

You can hack, but you can't hide: Using log analysis to detect APTs

Kevin Bowers - RSA

Episode #561
11/19/2014
Privacy in the Age of the Police State

Privacy in the Age of the Police State

Marcus Ranum - Tenable Network Security

12/03/2014

Cancelled

Episode #562
12/10/2014
How Program Analysis can be Used in Security Applications

How Program Analysis can be Used in Security Applications

Xiangyu Zhang - Purdue University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!