Security and Privacy

Available Speakers on this Topic

Todd Michael Austin – Ann Arbor, MI, United States

Debnath Bhattacharyya – Visakhapatnam, India

  • Design and Analysis of Graphical Password
    Most common computer authentication method is traditional ‘User Name’ and ‘password’. There are numerous Biometric authentication methods also proposed. In...
  • Unsupervised Learning in Data Mining
    The meaning of Unsupervised learning is to find hidden structure in unlabeled data. Approaches of Unsupervised learning can be used in Data Mining. Clustering is an important and popular approach...

Swarup Bhunia – Gainesville, FL, United States

  • FPGA Security: New Frontiers
    Reconfigurable hardware platforms, e.g. Field Programmable Gate Arrays (FPGAs) are being increasingly deployed in diverse applications including the emerging Internet of Things (IoT) edge devices,...
  • Security of the Internet of Things: Are We Paranoid Enough?
    Security has become a critical design challenge for modern electronic hardware. With the emergence of the Internet of Things (IoT) regime that promises exciting new applications from smart...

Christophe Bobda – Fayetteville, AR, United States

Dipankar Dasgupta – Memphis, TN, United States

Tassos Dimitriou – Athens, Greece

Chuck Easttom – Plano, TX, United States

  • Applying Graph Theory to Digital Forensics
    Graph theory is an area of discrete mathematics that is used to model the relationships between entities. Previously, graph theory has been used to model network traffic, biological systems, and...
  • Cryptographic Backdoors
    This is an overview of cryptographic backdoors, their function and purpose. Specific research is discussed including examples such as Dual_EC_DRBG and backdoors in RSA. This is appropriate for...
  • Quantum Computing and Lattice Based Cryptography
    This lecture provides an overview of the current state of quantum computing and what impact that will have on cryptography.  Then cryptogrphic algorithms that are believed to be resistent to...
  • S-Box Design
    Symmetric ciphers are widely used to provide secure communications and data storage.  The ubiquitous nature of the symmetric cipher, indicates that its underlying structure is worth...
  • Steganography
    This lecture begins with an overview of steganography, including the history of steganography techniques. Basic current methods (LSB and DCT) are discussed. The lecture then describes more...

Marcus Foth – Brisbane, QLD, Australia

Jennifer Golbeck – College Park, MD, United States

  • The Human Side of Cyber Security
    Security experts often claim that people are the most unreliable part of their systems. I argue that the problem is not people behaving insecurely, but security systems that are designed with no...

Ashish Kundu – Yorktown Heights, NY, United States

  • Baking Compliance into Cloud: Art or Science?
    With the (obvious) evolution of cloud from being a compute-centric infrastructure to a data-and-compute-centric infrastructure, more and more enterprises are bringing their data to cloud in...
  • Energy Attacks on Mobile and IoT Devices
    All mobile devices are energy-constrained. They use batteries thatallows using the device for a limited amount of time. In general, energy attacks on mobile devices are denial of...
  • Exploiting Placement New of C++
    In this talk, we would explore how to exploit the "placement new" expression in C++. "Placement new" facilitates placement of an object/array at a specific memory location....
  • HMACs for Graph Data
    Graphs are widely used in the representation and processing of data in several domains. Assurance of integrity of graph data is essential. Related work has shown that the digital signatures...
  • Network Flow Security Analytics for IoT and Mobile Devices

    Given that security threats and privacy breaches are commonplace today, it is an important problem for one to know whether their device(s) are in a "good state of...

  • Privacy-preserving Authentication of Graphs on Cloud
    Leakages of structural information in trees and graphs due to (redactable) signatures lead to privacy and confidentiality breaches. So leakage-free redactable signatures are an important topic...
  • Security and Compliance Issues in Blockchain

    Blockchain is a paradigm shift in computing -- it enables computing among distributed untrusted peers without the need for any centralized trusted authority. Transaction...

Jeanna N Matthews – Potsdam, NY, United States

  • Big Data? Big Promise, Big Problems
    The data that we record daily about ourselves through our cell phones, credit card purchases, emails, social media postings, etc., helps us connect with each other and improve our life...
  • Rapid Recovery Architecture and Virtual Machine Contracts
    Many seemingly innocent actions can render your personal computer unusable and the road to recovery can be painful. For example, reinstall the OS (if you know how), reinstall the...

Prabhat Mishra – Gainesville, FL, United States

  • Validation of Hardware Security and Trust
    Reusable hardware Intellectual Property (IP) based System-on-Chip (SoC) design has emerged as a pervasive design practice in the industry to dramatically reduce design/verification cost while...

James F. O'Brien – Berkeley, CA, United States

  • Adaptive Simulation with Triangle Meshes
    This talk will discuss the development of high-fidelity finite element simulation methods based on adaptive mesh refinement. These methods dynamically refine and coarsen meshes so that they...
  • Image and Video Forensics through Content Analysis
    Advances in computational photography, computer vision, and computer graphics allow for the creation of visually compelling photographic forgeries. Forged images have appeared in tabloid...

Sharath Pankanti – Yorktown Heights, NY, United States

Abhik Roychoudhury – Singapore, Singapore

  • Automated Program Repair
    Software debugging is extremely time consuming, and hence techniques to aid automated program repair are of value. Moreover, even after software errors are identified, fixing the...
  • Testing and Debugging of Software Regressions
    Software regressions, where a previously working program fails on certain tests after changes, constitute a major source of delays and missed schedules in any large software...

Sandeep K Shukla – Kanpur, India

Richard Stallman – Boston, MA, United States

  • A Free Digital Society: What Makes Digital Inclusion Good Or Bad?
    There are many threats to freedom in the digital society. They include massive surveillance, censorship, digital handcuffs, nonfree software that controls users, and the War on Sharing....
  • Computing, Freedom and Privacy
    The way digital technology is developing, it threatens our freedom, within our computers and in the internet. What are the threats? What must we change?
  • Copyright vs. Community in the Age of Computer Networks
    Copyright developed in the age of the printing press, and was designed to fit with the system of centralized copying imposed by the printing press. But the copyright system does not fit...
  • Free Software and Your Freedom
    The Free Software Movement campaigns for computer users' freedom to cooperate and control their own computing. The Free Software Movement developed the GNU operating system, typically...
  • The Danger of Software Patents
    Richard Stallman will explain how software patents obstruct software development. Software patents are patents that cover software ideas. They restrict the development of software, so that every...

Shan Suthaharan – Greensboro, NC, United States

Rakesh Verma – Houston, TX, United States

Wan Abdul Rahim Bin Wan Mohd Isa – Shah Alam, Malaysia

  • Culture Influences to Information Privacy
    There is strong inclination on the importance of knowledge management (KM) concept and role towards ensuring components such as ethics and culture are relevant to the applications development,...

Edgar Weippl – Vienna, Austria

Tao Xie – Raleigh, IL, United States

Moustafa A Youssef – New Borg Elarab City, Alexandria, Egypt