Archive

2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/10/2018

Open



01/17/2018

The Economics of Offline Password Cracking

The Economics of Offline Password Cracking


Ben Harsha - Purdue University
(260.0MB): Video Icon MP4 Video   Watch on Youtube
01/24/2018

 What Roles Can Empirical Research Play to Advance Software Security Knowledge?

What Roles Can Empirical Research Play to Advance Software Security Knowledge?


Lotfi ben-Othmane - Iowa State University
(243.8MB): Video Icon MP4 Video   Watch on Youtube
01/31/2018

State of Cybersecurity in Healthcare

State of Cybersecurity in Healthcare


Matt Dimino - Eskenazi Health
(395.6MB): Video Icon MP4 Video   Watch on Youtube
02/07/2018

Eli Lilly's Path to a Successful Threat Intelligence Program

Eli Lilly's Path to a Successful Threat Intelligence Program


Brian Lynch - Eli Lilly
(330.8MB): Video Icon MP4 Video   Watch on Youtube
02/14/2018

OBLIVIATE: A Data Oblivious File System for Intel SGX

OBLIVIATE: A Data Oblivious File System for Intel SGX


Adil Ahmad - Purdue University
(212.7MB): Video Icon MP4 Video   Watch on Youtube
02/21/2018

Lessons Learned From the Retrocomputing Community

Lessons Learned From the Retrocomputing Community


Mitchell Parker - IU Health
(196.6MB): Video Icon MP4 Video   Watch on Youtube
02/28/2018

Threats and Risks in Cryptocurrencies

Threats and Risks in Cryptocurrencies


Courtney Falk - Optiv
(247.6MB): Video Icon MP4 Video   Watch on Youtube
03/07/2018

CFIXX -- Object Type Integrity for C++

CFIXX -- Object Type Integrity for C++


Nathan Burrow - Purdue University
(148.5MB): Video Icon MP4 Video   Watch on Youtube
03/21/2018

Mind Your Credit: Assessing the Health of the Ripple Credit Network

Mind Your Credit: Assessing the Health of the Ripple Credit Network


Pedro Moreno-Sanchez - Purdue University
(232.0MB): Video Icon MP4 Video   Watch on Youtube
04/04/2018

Symposium



04/18/2018

Personally Identifiable Data and the Specter of Customer Privacy

Personally Identifiable Data and the Specter of Customer Privacy


Leon Ravenna - KAR Auction Services, Inc.
(366.6MB): Video Icon MP4 Video   Watch on Youtube
04/25/2018

DoD Cyber Requirements and Directives

DoD Cyber Requirements and Directives


Cristina Ledezma - Raytheon
(383.8MB): Video Icon MP4 Video   Watch on Youtube
08/22/2018

Protecting Bare-metal Embedded Systems from Memory Corruption Attacks

Protecting Bare-metal Embedded Systems from Memory Corruption Attacks


Abe Clements - Purdue University
(125.1MB): Video Icon MP4 Video   Watch on Youtube
09/05/2018

Breaching Water Treatment Plants: Lessons Learned from Complex Exercises

Breaching Water Treatment Plants: Lessons Learned from Complex Exercises


Doug Rapp - Rofori Corporation
(375.3MB): Video Icon MP4 Video   Watch on Youtube
09/12/2018

Security in All Aspects of Design


Jim Gordon - Intel
09/19/2018

What's Private: Exploring Reasonable Expectation of Privacy in the Age of Modern Innovation

What's Private: Exploring Reasonable Expectation of Privacy in the Age of Modern Innovation


Jillean Long Battle - Rofori Corporation
(611.1MB): Video Icon MP4 Video   Watch on Youtube
09/26/2018

Kernel-Supported Cost-Effective Audit Logging for Causality Tracking

Kernel-Supported Cost-Effective Audit Logging for Causality Tracking


Shiqing Ma - Purdue University
(109.1MB): Video Icon MP4 Video   Watch on Youtube
10/03/2018

Open



10/17/2018

Applied Cyber and Mobile Security Consulting

Applied Cyber and Mobile Security Consulting


Ryan Goldsberry - Deloitte
(186.5MB): Video Icon MP4 Video   Watch on Youtube
10/24/2018

80/20 Rule-Cyber Hygiene

80/20 Rule-Cyber Hygiene


Mark Loepker - SANMARK
(437.4MB): Video Icon MP4 Video   Watch on Youtube
10/31/2018

Precise and Scalable Detection of Double-Fetch Bugs in Kernels

Precise and Scalable Detection of Double-Fetch Bugs in Kernels


Meng Xu - Georgia Tech
(122.8MB): Video Icon MP4 Video   Watch on Youtube
11/07/2018

IoT Security: Living on the Edge

IoT Security: Living on the Edge


Jason Ortiz - Pondurance
(338.3MB): Video Icon MP4 Video   Watch on Youtube
11/14/2018

Enemy Perspectives: When Nation-States Meet Cybercriminals

Enemy Perspectives: When Nation-States Meet Cybercriminals


Courtney Falk - Optiv
(387.3MB): Video Icon MP4 Video   Watch on Youtube
11/28/2018

Developing a Public/Private Cybersecurity Scorecard for the State of Indiana

Developing a Public/Private Cybersecurity Scorecard for the State of Indiana


James Lerums - Purdue University
(167.7MB): Video Icon MP4 Video   Watch on Youtube
12/05/2018

Normalizing Diverse Android Access Control Checks for Inconsistency Detection

Normalizing Diverse Android Access Control Checks for Inconsistency Detection


Yousra Aafer - Purdue University
(95.3MB): Video Icon MP4 Video   Watch on Youtube

Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information