CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/14/2015

Learning from Information Security Maturity: A Textual Analysis

Learning from Information Security Maturity: A Textual Analysis


Jackie Rees Ulmer - Purdue University
(598.7MB): Video Icon MP4 Video   Watch on Youtube
01/21/2015

Security with Privacy - A Research Agenda

Security with Privacy - A Research Agenda


Bharath Samanthula - Purdue University
(117.4MB): Video Icon MP4 Video   Watch on Youtube
01/28/2015

Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds

Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds


Savvas Savvides - Purdue University
(148.3MB): Video Icon MP4 Video   Watch on Youtube
02/04/2015

Regulatory Compliance Checking Over Encrypted Audit Logs

Regulatory Compliance Checking Over Encrypted Audit Logs


Omar Chowdhury - Purdue University
(149.6MB): Video Icon MP4 Video   Watch on Youtube
02/11/2015

Code-Pointer Integrity

Code-Pointer Integrity


Mathias Payer - Purdue University
(90.3MB): Video Icon MP4 Video   Watch on Youtube
02/18/2015

Privacy Notions for Data Publishing and Analysis

Privacy Notions for Data Publishing and Analysis


Ninghui Li - Purdue University
(216.9MB): Video Icon MP4 Video   Watch on Youtube
02/25/2015

Software updates: decisions and security implications

Software updates: decisions and security implications


Kami Vaniea - Indiana University
(181.3MB): Video Icon MP4 Video   Watch on Youtube
03/04/2015

Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology

Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology


Xinming Ou - Kansas State University
(112.5MB): Video Icon MP4 Video   Watch on Youtube
03/11/2015

Virtual Android Malware Detection and Analysis (VAMDA)

Virtual Android Malware Detection and Analysis (VAMDA)


Andrew Pyles - MITRE
(85.3MB): Video Icon MP4 Video   Watch on Youtube
03/25/2015

Symposium/Michelle Dennedy, Intel

Symposium/Michelle Dennedy, Intel


Michelle Dennedy - Intel
(242.2MB): Video Icon MP4 Video   Watch on Youtube
04/01/2015

Breaking Mobile Social Networks for Automated User Location Tracking

Breaking Mobile Social Networks for Automated User Location Tracking


Kui Ren - University at Buffalo
(109.5MB): Video Icon MP4 Video   Watch on Youtube
04/08/2015

Privacy Potpourri: Changing Privacy from the Bottom Up

Privacy Potpourri: Changing Privacy from the Bottom Up


Rebecca Herold - Rebecca Herold & Associates, LLC
(222.7MB): Video Icon MP4 Video   Watch on Youtube
04/15/2015

Engineering Secure Computation -- Efficiently

Engineering Secure Computation -- Efficiently


Yan Huang - Indiana University
(107.4MB): Video Icon MP4 Video   Watch on Youtube
04/22/2015

CERIAS Poster Contest Winners

CERIAS Poster Contest Winners


Rohit Ranchal & Payuna Uday & Zhemei Fang - Purdue University
(114.1MB): Video Icon MP4 Video   Watch on Youtube
04/29/2015

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet


Steve Bellovin - Columbia University
(261.8MB): Video Icon MP4 Video   Watch on Youtube
09/02/2015

SUPOR: Precise and Scalable Sensitive User Input Detection for Mobile Apps

SUPOR: Precise and Scalable Sensitive User Input Detection for Mobile Apps


Jianjun Huang - Purdue University
(88.3MB): Video Icon MP4 Video   Watch on Youtube
09/16/2015

Evaluation of Urban Vehicle Tracking Algorithms

Evaluation of Urban Vehicle Tracking Algorithms


John Feddema - Sandia Labs
(0): Video Icon MP4 Video   Watch on Youtube
10/21/2015

Anonymized Data

Anonymized Data


Koray Mancuhan - Purdue University
(94.6MB): Video Icon MP4 Video   Watch on Youtube
10/28/2015

 Case Study of the Authur Pendragon Cyber Threat at The University of Alabama

Case Study of the Authur Pendragon Cyber Threat at The University of Alabama


Kate Seigfried-Spellar - Purdue University
(213.2MB): Video Icon MP4 Video   Watch on Youtube
11/04/2015

Secure Multiparty Computation and Differential Privacy

Secure Multiparty Computation and Differential Privacy


Balamurugan Anandan - Purdue University
(125.4MB): Video Icon MP4 Video   Watch on Youtube
11/11/2015

Verifying Computations with (Private) State

Verifying Computations with (Private) State


Ariel Feldman - University of Chicago
(138.7MB): Video Icon MP4 Video   Watch on Youtube
11/18/2015

 A Secure Communication Protocol for Drones and Smart Objects

A Secure Communication Protocol for Drones and Smart Objects


Jongho Won - Purdue University
(88.2MB): Video Icon MP4 Video   Watch on Youtube
12/09/2015

 Preventing or Penalizing Equivocation in Decentralized Environments

Preventing or Penalizing Equivocation in Decentralized Environments


Aniket Kate - Purdue University
(116.1MB): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.