Security and Privacy
Available Speakers and their Lectures on this Topic
Haider Abbas – Islamabad, Pakistan
-
Cyber Security Auditing and Evaluation: A Challenge for Every Organization
The aim of cyber security is to protect the systems, software and networks from malicious activities and attacks launched to gain illegitimate access, steal information or disrupting the services...
-
Cyber Security Threat Landscape in the Context of Industry 4.0
Industry 4.0 is revolutionizing the ways in which industries function. Big data, industrial control systems, supervisory control, and data acquisition systems, smart machines, robotics, internet...
-
Cybersecurity and COVID Pandemic Era
In response to the COVID-19 pandemic, reliance on online and cyberspace alternatives has increased as the individuals have been made to work from remote locations/homes. As a result, many...
-
Cyberwarfare: Who Needs a Gun when you have a Keyboard?
With the increasing reliance of governments on technology, the internet landscape has become a battlefield. Cyber warfare has become a dominant threat to the governments and business industries....
-
Security Assessment of Operating Systems
Security of any computer system largely depends on the security of its operating system (OS). Operating systems are a primary target of the hackers because of the information stored in the OS. A...
Rizwan Ahmed – Nagpur, India
-
Mobile Forensics and Cyber Crime Investigations
This talk will cover various technical aspects related to Mobile Forensics. This talk will cover following specific...
Mohammed M. Alani – Mississauga, ON, Canada
-
How can we trust AI in Cybersecurity?
With the cybersecurity market exceeding 50USD billion, are organizations doing enough to stops the rapid increase in attacks? The trends and the success rates of the attacks suggest...
- How safe is your AI application?
The rapid growth in adopting artificial intelligence in different aspects of life has made it an interesting target to malicious actors. The growth in investments in artificial intelligence should...Mamoun Alazab – Bayview, ACT, Australia
-
The role of AI in fighting Polymorphic and Metamorphic Malware
Mal-ware is one of the major security threats in computer which have been in existence from the very early days. There is a lack of understanding of such malware threats and what mechanisms can be...
Federico Cerutti – Brescia, Italy
-
Artificial Intelligence for Cyber Threat Intelligence Analysis
Cyber Threat Intelligence is the cyclic process analysts use to produce knowledge about weaknesses of one or more organisation's assets that can be exploited by one or more threats. Artificial...
-
Enterprise knowledge management in the era of LLMs
This lecture explores how Large Language Models (LLMs) are revolutionising enterprise knowledge management. We begin by examining the evolution of knowledge management systems, from early...
- Managing the risks of digital transformation
This lecture examines the critical challenges of managing risks in digital transformation, integrating insights from the NIST Cybersecurity Framework, the NIST AI Risk Management Framework, and...- The Importance of Causality in Cyber Threat Intelligence Analysis
Each cyber attack is a set of chains of events linked together by time and causality: attackers’ and defenders’ actions influence each other in a complex, interconnected web of causal...Pin-Yu Chen – WHITE PLAINS, NY, United States
-
Exploring Safety Risks in Large Language Models and Generative AI
Large language models (LLMs) and Generative AI (GenAI) are at the forefront of current AI research and technology. With their rapidly increasing popularity and availability, challenges and...
Aswani Kumar Cherukuri – Vellore, India
-
Exploring Blockchain Technology
Blockchain is a distributed ledger technology that maintains verifiable records with protection against malicious modifications and with Byzantine fault tolerance. This...
Kim-Kwang Raymond Choo – San Antonio, TX, United States
-
An interdisciplinary STEAM approach to cyber security research
Culturally and economically open nations, such as the United States (US), have thrived on the wealth that cyberspace and technologies have enabled. However, just as cyberspace and technologies...
-
Internet of Things (IoT) Forensics: Challenges and Opportunities
Internet of Things (IoT) devices are becoming commonplace in our society, due to their widespread applications (e.g., environmental monitoring, smart cities, healthcare, surveillance, and...
-
Internet of Things (IoT) cyber security and threat intelligence: What are the research challenges and opportunities?
Internet of Things (IoT) devices are becoming commonplace in our society, due to their widespread applications (e.g., environmental monitoring, smart cities, healthcare, surveillance, and...
Ashutosh Dutta – Laurel, MD, United States
-
Security in 5G Networks - Challenges and Opportunities
Software Defined Networking (SDN) and Network Function Virtualization (NFV) are the key pillars of future networks, including 5G and beyond that promise to support emerging applications such as...
Josiah Dykstra – Severn, MD, United States
-
American Self-Defense in Cyberspace
The United States is a major consumer, contributor, and target in cyberspace. This talk will describe cyber threats, roles and responsibilities, technology, and policy considerations for achieving...
-
Getting Started with Cybersecurity Science
This talk offers an introduction for students and practitioners to the application of the scientific method to cybersecurity tools and systems. Creating, using, and evaluating cybersecurity tools...
Francesco Flammini – Västerås, Sweden
-
Introduction to Industrial Cybersecurity
This seminar addresses the fundamental concepts of cybersecurity providing basic definitions and a taxonomic introduction to most common security threats and technologies. In particular,...
- Risk Modeling and Evaluation for Resilient Cyber-Physical Systems: From Design-Time to Run-Time
The concept of risk is a combination of threat probabilities, vulnerabilities and expected consequences. In traditional risk modeling and evaluation approaches, analyses are performed at...Swaroop Ghosh – State College, PA, United States
-
Comprehensive treatment of security of persistent memories
Conventional volatile memories e.g., Static RAM (SRAM) suffer from significant leakage power whereas conventional storage class Non-Volatile Memories (NVMs) e.g., Flash suffer from higher...
- Exploiting Emerging Memory Technologies for Hardware Security
CMOS switches, although universal, fail to meet energy-efficiency, scalability and emerging constraints such as, security. Recent experimental studies have revealed that emerging...- Obfuscation of analog IPs
Analog Integrated Circuits (ICs) are one of the top targets for counterfeiting. However, the security of analog Intellectual Property (IP) is not well investigated as its digital counterpart....Gernot Heiser – Sydney, NSW, Australia
-
Making Trusted Systems Trustworthy
We trust computer systems all the time: with our money, our sensitive private data, our critical infrastructure and, in the age of autonomous vehicles, increasingly with our lives. Yet...
Rasheed Hussain – Bristol, United Kingdom
-
Artificial Intelligence and Cybersecurity: Opportunities and Outlook
This lecture covers the role of Artificial Intelligence (AI) in Cybersecurity. With the emergence of new technologies, increase in the volume, velocity, veracity, and variety of data calls for new...
-
Artificial Intelligence in API security: A case for automotives
Application Programming Interface (API) is a mechanism that has enabled the rapid development and availability of services, scalability, and sharing of services and value among different...
-
Future Internet Architecture: Content vs. Source of the Content
Over the last few decades, the use of Internet has been dominated by the interest in content in different forms such as audio, video, images, and so on. It is worth mentioning that the original...
-
On the Role of APIs in Connected and Autonomous Cars: A Case for Critical Applications
Application Programming Interface (API) is a mechanism that has enabled the rapid development and availability of services, scalability, and sharing of services and value among different...
-
Role of Artificial Intelligence and Machine Learning in API security
Application Programming Interface (API) is a mechanism that has enabled the rapid development and availability of services, scalability, and sharing of services and value among different...
-
Security of Digital Twins for Security through Digital Twins
This lecture covers the role of security considerations in digital twin modeling for different environments including networks and cyber-physical systems. The need for security of digital twin is...
Latifur Rahman Khan – Plano, TX, United States
-
Automating Vulnerability Detection and Prevention in Smart Contracts
With the increase in the adoption of blockchain technology in providing decentralized solutions to various problems, smart contracts have been becoming more popular to the point that billions of...
Weizhi Meng – Copenhagen, Denmark
-
Towards Trust Management-based Detection in Internet of Things
With the tremendous development of Internet of Things (IoT), many security concerns have been raised. For protection, detection mechanisms like intrusion detection system (IDS) are moving...
Mehdi Mirakhorli – Rochester, NY, United States
-
Secure by Design
Secure by design is an approach to developing secure software systems from the ground up. In such an approach, the alternate security controls and design decisions are first thought;...
David Mohaisen – Orlando, FL, United States
-
How Secure are Blockchain Systems?
Blockchains are promising many applications in distributed computing systems, ranging from supply chain to critical infrastructure (e.g., cyber-physical systems). For foundations-driven guarantees...
-
Malware Analysis and Classification Using Machine Learning
Malicious software (or malware) is a vehicle for adversaries to launch various types of attacks, and there has been a constant steam of malware samples in the wild over the past few years. Per one...
-
Towards Taming Adversarial Machine Learning: Security Applications Perspectives
The recent rapid advances in machine and deep learning algorithms have found many applications in the security space, targeting various applications including intrusion detection systems, malware...
Corina Pasareanu – Sunnyvale, CA, United States
-
Formal Verification and Run-time Monitoring for Learning-Enabled Autonomous Systems
Providing safety guarantees for autonomous systems is difficult as these...
Zeeshan Pervez – Paisley, United Kingdom
-
Blockchain: paving the way for open and transparent governance in smart cities
In this lecture, I will discuss a hybrid deployment model of blockchain for open and transparent governance in smart cities. The lecture will present participatory application in which inhabitants...
-
Making sense out of IoT data streams
Internet-of-Things (IoT) generates enormous data streams from a sensing and actuating environment. Extracting valuable information from these data streams enables service providers (smart cities,...
Junaid Qadir – Doha, Qatar
-
Secure and Robust Machine Learning for Healthcare
Recent years have witnessed widespread adoption of machine learning (ML)/deep learning (DL) techniques due to their superior performance for a variety of healthcare applications ranging from the...
Danda B Rawat – Washington, DC, United States
-
Blockchain Technology: Emerging Applications and Use Cases
Blockchain technology stores different transactions/operations in a chain of blocks in a distributed manner without needing a trusted third-party. Furthermore, blockchain is proven to be immutable...
RK Shyamasundar – Mumbai, India
-
A Runtime Monitoring Framework for Correct Execution of Smart Contracts
Smart contracts have been subjected to several attacks that have exploited various vulnerabilities of languages like Solidity, which has resulted in huge financial losses. The...
- A Safety Assessment of ERC20 Standards
Tokens are blockchain-based assets which can be exchanged across users of a blockchain platform. ERC20 defines a standard for the creation of a specific type, called ERC20 token, one of the...- Building Secure Information Systems Using Decentralised Information Flow Control
The ability to control the release and propagation of information lies at the heart of systems security. Lattice model of secure information flow proposed by Dorothy Denning provides...- Data Privacy in Public Data Sets and Statistical Databases
In the context data privacy laws, there is a need to address the general question of protecting privacy when publicly releasing information about a sensitive dataset. With transactional and...- Multi-Level Secure Databases: Security and Privacy
Ever since databases became a ubiquitous part of enterprises or businesses, security and privacy became a requirement. Traditionally, privacy was realized through various methods of...- Smart Contracts, Vulnerability Exploitation in Solidity Smart Contracts and Best Practices
Smart contracts have been subjected to several attacks that have exploited various vulnerabilities of languages like Solidity, which has resulted in huge financial losses. The...- Threat Modelling, and Vulnerability Analysis of Blockchain Systems1
The blockchain platform is a complex system consisting of nodes, network devices, authentication services, dApps, wallets, web interfaces, key storage, miners, etc. It is a network of centralized...Biplab Sikdar – Singapore, Singapore
-
Cyber Security Challenges and Solutions for the Internet of Things
The Internet of Things (IoT) represents a great opportunity to connect people, information, and things, which will in turn cause a paradigm shift in the way we work, interact, and think. The IoT...
-
Cyber Security and Privacy for Smart Cities
As cities strive to maintain their economic growth and provide the civic infrastructure to its residents and businesses, they are increasingly turning to “smart solutions”. The...
Nicolas Sklavos – Patra, Greece
-
Cybersecurity for 5G and 6G Technologies
We are about to witness soon the first incarnation of 5G/6G technologies. It provides many breakthrough capabilities that will enable it as a preferred platform for the digitized business of the...
-
Hardware Security for IoT-Based, Healthcare Applications
This lecture presents an ongoing research on hardware security for healthcare systems that utilize the IoT technology. The main vulnerabilities of these architectures are presented as well as the...
-
In the Era of Cybersecurity: Cryptographic Hardware and Embedded Systems
Cybersecurity is a completely new concept, which has attracted the major interest of both academia and industry. New technologies, such as Internet of Things, have shown special interest for...
Yan Solihin – Orlando, FL, United States
-
Secure Execution Environment: Design Principles and Common Pitfalls
There is an increasing demand for the processor architecture to provide secure execution environment in various compute platforms including the cloud and Internet of Things (IoT) devices. Current...
-
Security Implications of Persistent Memory
Persistent memory allows a new abstraction for persistent data by wrapping data structures into Persistent Memory Objects (PMOs). PMOs offer conveniences but introduces new security...
Houbing Song – Baltimore, MD, United States
-
Counter-Unmanned Aircraft System(s) (C-UAS): State of the Art, Challenges and Future Trends
There is an increasing need to fly Unmanned Aircraft Systems (UAS, commonly known as drones) in the airspace to perform missions of vital importance to national security and defense, emergency...
Gautam Srivastava – Brandon, MB, Canada
-
Blockchain Technology for the Internet of Medical Things
The healthcare industry has been at the cutting edge of technology since time immemorial. Hardware, software, medication, surgical procedures; the quality of care available to patients in...
- Intrusion Detection Systems in Multi-Core Systems
Multi-core processors have been shown to represent a major evolution in computing hardware technology, and are now common. Multi-cores provide a network security application with more...- The Changing Landscape of Blockchain Technology
In this talk, we will discuss Blockchain technology and how the landscape of applicationswhere Blockchain can be applied is changing and progessing. Blockchain is currently...Daniel Takabi – ATLANTA, GA, United States
-
Secure Privacy preserving Machine Learning
Deep learning with neural networks has become a highly popular machine learning method due to recent breakthroughs in computer vision, speech recognition, and other areas. However, the deep...
Salvador Elias Venegas-Andraca – Mexico City, Mexico
-
Cybersecurity and Quantum Computing
Quantum technology is a multidisciplinary field of science and engineering in which physics, mathematics, computer science, and engineering meet with the goal of understanding how quantum...
Stefano Zanero – Milano, Italy
-
Breaking the Laws of Robotics: Attacking Industrial Robots
Industrial robots are complex cyber-physical systems used for manufacturing, and a critical component of any modern factory. These robots aren't just electromechanical devices but include...
-
Crouching hacker, killer robot? Removing FUD from cyber-physical security
Cyber-physical systems are attracting a lot of attention: attacks on connected cars received a lot of media exposure, as did attacks on industrial control systems, airplanes or medical devices. A...
-
MAKING SENSE OF A MILLION SAMPLES PER DAY: BEHAVIOR-BASED METHODS FOR AUTOMATED, SCALABLE MALWARE ANALYSIS
With the astonishing rate of new and modified malware samples being released daily, automation of analysis is needed to classify and cluster together similar samples, exclude basic and...
-
Breaking the Laws of Robotics: Attacking Industrial Robots
- Intrusion Detection Systems in Multi-Core Systems
-
Counter-Unmanned Aircraft System(s) (C-UAS): State of the Art, Challenges and Future Trends
- A Safety Assessment of ERC20 Standards
-
Secure by Design
-
Artificial Intelligence and Cybersecurity: Opportunities and Outlook
- Exploiting Emerging Memory Technologies for Hardware Security
- Risk Modeling and Evaluation for Resilient Cyber-Physical Systems: From Design-Time to Run-Time
-
An interdisciplinary STEAM approach to cyber security research
- Managing the risks of digital transformation
- How safe is your AI application?
-
How can we trust AI in Cybersecurity?