The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

01/17/2018
The Economics of Offline Password Cracking

The Economics of Offline Password Cracking

Ben Harsha - Purdue University

01/24/2018
What Roles Can Empirical Research Play to Advance Software Security Knowledge?

What Roles Can Empirical Research Play to Advance Software Security Knowledge?

Lotfi ben-Othmane - Iowa State University

01/31/2018
State of Cybersecurity in Healthcare

State of Cybersecurity in Healthcare

Matt Dimino - Eskenazi Health

02/14/2018
OBLIVIATE: A Data Oblivious File System for Intel SGX

OBLIVIATE: A Data Oblivious File System for Intel SGX

Adil Ahmad - Purdue University

02/21/2018
Lessons Learned From the Retrocomputing Community

Lessons Learned From the Retrocomputing Community

Mitchell Parker - IU Health

02/28/2018
Threats and Risks in Cryptocurrencies

Threats and Risks in Cryptocurrencies

Courtney Falk - Optiv

03/07/2018
CFIXX -- Object Type Integrity for C++

CFIXX -- Object Type Integrity for C++

Nathan Burrow - Purdue University

03/21/2018
Mind Your Credit: Assessing the Health of the Ripple Credit Network

Mind Your Credit: Assessing the Health of the Ripple Credit Network

Pedro Moreno-Sanchez - Purdue University

04/18/2018
Personally Identifiable Data and the Specter of Customer Privacy

Personally Identifiable Data and the Specter of Customer Privacy

Leon Ravenna - KAR Auction Services, Inc.

04/25/2018
DoD Cyber Requirements and Directives

DoD Cyber Requirements and Directives

Cristina Ledezma - Raytheon

08/22/2018
Protecting Bare-metal Embedded Systems from Memory Corruption Attacks

Protecting Bare-metal Embedded Systems from Memory Corruption Attacks

Abe Clements - Purdue University

09/12/2018

Security in All Aspects of Design

Jim Gordon - Intel

10/17/2018
Applied Cyber and Mobile Security Consulting

Applied Cyber and Mobile Security Consulting

Ryan Goldsberry - Deloitte

10/24/2018
80/20 Rule-Cyber Hygiene

80/20 Rule-Cyber Hygiene

Mark Loepker - SANMARK

11/07/2018
IoT Security: Living on the Edge

IoT Security: Living on the Edge

Jason Ortiz - Pondurance

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!