Security and Privacy

Available Speakers on this Topic

Shantanu Bhattacharya

Swarup Bhunia

  • FPGA Security: New Frontiers
    Reconfigurable hardware platforms, e.g. Field Programmable Gate Arrays (FPGAs) are being increasingly deployed in diverse applications including the emerging Internet of Things (IoT) edge devices, biomedical,...
  • Security of the Internet of Things: Are We Paranoid Enough?
    Security has become a critical design challenge for modern electronic hardware. With the emergence of the Internet of Things (IoT) regime that promises exciting new applications from smart cities...

Christophe Bobda

Dipankar Dasgupta

Tassos Dimitriou

Chuck Easttom

  • Applying Graph Theory to Digital Forensics
    Graph theory is an area of discrete mathematics that is used to model the relationships between entities. Previously, graph theory has been used to model network traffic, biological systems, and social...
  • Cryptographic Backdoors
    This is an overview of cryptographic backdoors, their function and purpose. Specific research is discussed including examples such as Dual_EC_DRBG and backdoors in RSA. This is appropriate for general...
  • Quantum Computing and Lattice Based Cryptography
    This lecture provides an overview of the current state of quantum computing and what impact that will have on cryptography.  Then cryptogrphic algorithms that are believed to be resistent to quantum...
  • S-Box Design
    Symmetric ciphers are widely used to provide secure communications and data storage.  The ubiquitous nature of the symmetric cipher, indicates that its underlying structure is worth study. ...
  • Steganography
    This lecture begins with an overview of steganography, including the history of steganography techniques. Basic current methods (LSB and DCT) are discussed. The lecture then describes more advanced...

Jennifer - Golbeck

  • The Human Side of Cyber Security
    Security experts often claim that people are the most unreliable part of their systems. I argue that the problem is not people behaving insecurely, but security systems that are designed with no concern...

Shiyan Hu

Ashish Kundu

  • Baking Compliance into Cloud: Art or Science?
    With the (obvious) evolution of cloud from being a compute-centric infrastructure to a data-and-compute-centric infrastructure, more and more enterprises are bringing their data to cloud in search...
  • Blockchain Security, Privacy and Compliance

    Given that security threats and privacy breaches are commonplace today, it is an important problem for one to know whether their device(s) are in a "good state of security",...

  • Energy Attacks on Mobile and IoT Devices
    All mobile devices are energy-constrained. They use batteries thatallows using the device for a limited amount of time. In general, energy attacks on mobile devices are denial of service...
  • Exploiting Placement New of C++
    In this talk, we would explore how to exploit the "placement new" expression in C++. "Placement new" facilitates placement of an object/array at a specific memory location. When...
  • HMACs for Graphs
    Graphs are widely used in the representation and processing of data in several domains. Assurance of integrity of graph data is essential. Related work has shown that the digital signatures for graphs...
  • Network Flow Security Analytics for IoT and Mobile Devices

    Given that security threats and privacy breaches are commonplace today, it is an important problem for one to know whether their device(s) are in a "good state of security",...

  • Privacy-preserving Authentication of Graphs on Cloud
    Leakages of structural information in trees and graphs due to (redactable) signatures lead to privacy and confidentiality breaches. So leakage-free redactable signatures are an important topic especially...

Sanjay Kumar Madria

Jeanna N Matthews

  • Big Data? Big Promise, Big Problems
    The data that we record daily about ourselves through our cell phones, credit card purchases, emails, social media postings, etc., helps us connect with each other and improve our life quality....
  • Rapid Recovery Architecture and Virtual Machine Contracts
    Many seemingly innocent actions can render your personal computer unusable and the road to recovery can be painful. For example, reinstall the OS (if you know how), reinstall the applications...

Prabhat Mishra

  • Validation of Hardware Security and Trust
    Reusable hardware Intellectual Property (IP) based System-on-Chip (SoC) design has emerged as a pervasive design practice in the industry to dramatically reduce design/verification cost while meeting...

James F. O'Brien

  • Adaptive Simulation with Triangle Meshes
    This talk will discuss the development of high-fidelity finite element simulation methods based on adaptive mesh refinement. These methods dynamically refine and coarsen meshes so that they automatically...
  • Image and Video Forensics through Content Analysis
    Advances in computational photography, computer vision, and computer graphics allow for the creation of visually compelling photographic forgeries. Forged images have appeared in tabloid magazines,...

Sharath Pankanti

Abhik Roychoudhury

  • Automated Program Repair
    Software debugging is extremely time consuming, and hence techniques to aid automated program repair are of value. Moreover, even after software errors are identified, fixing the errors...
  • Testing and Debugging of Software Regressions
    Software regressions, where a previously working program fails on certain tests after changes, constitute a major source of delays and missed schedules in any large software development...

Sandeep K Shukla

Richard Stallman

  • A Free Digital Society: What Makes Digital Inclusion Good Or Bad?
    There are many threats to freedom in the digital society. They include massive surveillance, censorship, digital handcuffs, nonfree software that controls users, and the War on Sharing. Other...
  • Computing, Freedom and Privacy
    The way digital technology is developing, it threatens our freedom, within our computers and in the internet. What are the threats? What must we change?
  • Copyright vs. Community in the Age of Computer Networks
    Copyright developed in the age of the printing press, and was designed to fit with the system of centralized copying imposed by the printing press. But the copyright system does not fit well...
  • Free Software and Your Freedom
    The Free Software Movement campaigns for computer users' freedom to cooperate and control their own computing. The Free Software Movement developed the GNU operating system, typically used...
  • The Danger of Software Patents
    Richard Stallman will explain how software patents obstruct software development. Software patents are patents that cover software ideas. They restrict the development of software, so that every design...

Rakesh Verma

  • Phish or Not is the Question
    All of us have received emails threatening us with dire consequences, if we do not increase our mail quota or reset our account, and intent on stealing our digital identities.  I myself receive...
  • Security Analytics - The New Frontier in Cyber Security ?
    Techniques from Data Analytics, by which I mean: Natural Language Processing, Data Mining, Machine Learning and Statistics, are being applied increasingly to security challenges such as phishing, intrusion...
  • Wireless Sensor Networks: Security, Protocols and Countermeasures
    Wireless Sensor Networks are increasingly being deployed in hazardous and hostile environments for numerous civil and military applications such as sensing the environment, biosensors, etc. They pose...

Tao Xie

Moustafa A Youssef