University of Cambridge > Talks.cam > Security-related talks

Security-related talks

Add to your list(s) Send you e-mail reminders Further detail
Subscribe using ical/vcal (Help)

This is a meta series of talks which may be of interest to computer-security researchers in Cambridge. Most talks added here will belong to some other talk series. Note that any talks in the Computer Laboratory Security Group seminar and meeting-presentations series will already show up here automatically, others can be added individually.

Tell a friend about this list:

If you have a question about this list, please contact: Markus Kuhn; Robert Watson; Professor Frank Stajano; Dr Andrew Moore; Eiko Yoneki; Jack Hughes; Alice Hutchings; Martin Kleppmann; Hridoy Sankar Dutta; Richard Mortier; Tina Marjanov; Anna Talas. If you have a question about a specific talk, click on that talk to find its organiser.

6 upcoming talks and 594 talks in the archive.

Computer Laboratory Security Seminar

How Misinformation Creators (Ab)use Generative AI Tools

UserAmelia (Mia) Hassoun, University of Cambridge.

HouseComputer Lab, FW11.

ClockTuesday 11 June 2024, 14:00-15:00

Computer Laboratory Systems Research Group Seminar

Towards identifying neglected, obsolete and abandoned IoT and OT devices

https://cl-cam-ac-uk.zoom.us/j/97216272378?pwd=M2diTFhMTnppckJtNWhFVTBKK0REZz09

UserRicardo Yaben, Technical University of Denmark (DTU).

HouseFW11.

ClockThursday 16 May 2024, 15:00-16:00

Computer Laboratory Security Seminar

Two Sides of the Same Crime

UserMichael Dewar, Vice President for Data Science at Mastercard.

HouseWebinar & LT2, Computer Laboratory, William Gates Building..

ClockFriday 19 January 2024, 16:00-17:00

Computer Laboratory Security Seminar

25 years of crypto wars and privacy tussles – where next?

UserRoss Anderson, Duncan Campbell, Ben Collier, Ahana Datta, Merlin Erroll, Gus Hosein, Julian Huppert, Jim Killock, Jen Persson, Sam Smith and Martyn Thomas.

HouseWebinar & LT2, Computer Laboratory, William Gates Building..

ClockThursday 30 November 2023, 16:00-18:00

Computer Laboratory Security Seminar

Red teaming privacy-preserving systems using AI

UserYves-Alexandre de Montjoye, Imperial College London.

HouseWebinar & LT2, Computer Laboratory, William Gates Building..

ClockTuesday 14 November 2023, 14:00-15:00

Wednesday Seminars - Department of Computer Science and Technology

Coherence Attacks and Defenses in 2.5D Integrated Systems

UserProfessor Paul Gratz - Professor in the Department of Electrical and Computer Engineering, Texas A&M University. Visiting academic at the Department of Computer Science and Technology, University of Cambridge .

HouseLecture Theatre 1, Computer Laboratory, William Gates Building.

ClockWednesday 08 November 2023, 15:05-15:55

Computer Laboratory Security Seminar

CIA to AIC: Why Cyber Must Enable the Business

UserKeith A Price, Chief Security Officer, National Highways.

HouseWebinar & FW11, Computer Laboratory, William Gates Building..

ClockTuesday 17 October 2023, 14:00-15:00

Logic and Semantics Seminar (Computer Laboratory)

Optimizations in a formally verified compiler

UserDavid Monniaux, CNRS/VERIMAG and École Polytechnique.

HouseFW11, Computer Laboratory.

ClockThursday 20 July 2023, 14:00-15:00

Computer Laboratory Security Seminar

A View of the Dark Web through the Lens of NLP and Language Modeling

UserYoungjin Jin, Korea Advanced Institute of Science & Technology (KAIST).

HouseWebinar - link on talks.cam page after 12 noon Tuesday.

ClockTuesday 27 June 2023, 14:00-15:00

Computer Laboratory Security Seminar

The Nym mixnet: Design and Evaluation

UserHarry Halpin & Ania Piotrowska, Nym Technologies.

HouseWebinar & SS03, Computer Laboratory, William Gates Building..

ClockTuesday 06 June 2023, 14:00-15:00

Computer Laboratory Security Seminar

A Sociotechnical Audit: Assessing Police use of Facial Recognition

Note unusual time

UserEvani Radiya-Dixit, Minderoo Centre for Tech & Democracy.

HouseWebinar - link on talks.cam page after 12 noon Tuesday.

ClockTuesday 13 December 2022, 16:00-17:00

Computer Laboratory Security Seminar

Exploring Internet services mis-configuration at scale

UserDanny Willems and Gregory Boddin, LeakIX; Raphael Proust, Nomadic Labs.

HouseWebinar & FW11, Computer Laboratory, William Gates Building..

ClockFriday 10 June 2022, 16:00-17:00

Computer Laboratory Security Seminar

Design rules and Maxims for insecurity engineering for lock designs

Note unusual time and location

UserMarc Weber Tobias, School of Engineering, University of Pittsburgh.

HouseWebinar & FW11, Computer Laboratory, William Gates Building..

ClockFriday 18 March 2022, 16:00-17:00

Computer Laboratory Security Seminar

Incident Response as a Lawyers' Service

UserDaniel Woods, University of Innsbruck, Austria.

HouseWebinar - link on talks.cam page after 12 noon Tuesday.

ClockTuesday 25 January 2022, 14:00-15:00

Computer Laboratory Security Seminar

Hansa Market, Cyberbunker, and Encrochat: The Security Practices of Organized Crime

UserErik van de Sandt, Dutch National Police and University of Bristol.

HouseWebinar.

ClockFriday 14 January 2022, 15:00-16:00

Computer Laboratory Security Seminar

Why Johnny doesn’t write secure software?

UserAwais Rashid, University of Bristol.

HouseWebinar.

ClockTuesday 07 December 2021, 15:00-16:00

Computer Laboratory Security Seminar

Securing the Future: Futures Literacy in Cyber Security

UserGenevieve Liveley, University of Bristol.

HouseWebinar.

ClockTuesday 30 November 2021, 14:00-15:00

Computer Laboratory Security Seminar

Teardown of encrypted USB Flash drives

UserSergei Skorobogatov, University of Cambridge.

HouseLT1, Computer Laboratory, William Gates Building..

ClockTuesday 23 November 2021, 14:00-15:00

Computer Laboratory Security Seminar

Blind Backdoors in Deep Learning

UserEugene Bagdasaryan, Cornell Tech.

HouseWebinar.

ClockTuesday 09 November 2021, 14:00-15:00

Computer Laboratory Security Seminar

Computational Methods to Measure and Mitigate Weaponized Online Information

UserGianluca Stringhini, Boston University.

HouseWebinar.

ClockMonday 01 November 2021, 14:00-15:00

Computer Laboratory Security Seminar

It's not only the dark web: Distributed surface web marketplaces

UserConstantinos Patsakis, University of Piraeus.

HouseWebinar.

ClockTuesday 20 July 2021, 14:00-15:00

Computer Laboratory Security Seminar

Apple, App Tracking Transparency, and the Hidden Costs of More Privacy

UserSam Gilbert, University of Cambridge.

HouseWebinar.

ClockTuesday 18 May 2021, 14:00-15:00

Computer Laboratory Security Seminar

Dark web marketplaces and COVID-19: Flexible and resilient

UserAndrea Baronchelli, City University of London and The Alan Turing Institute.

HouseWebinar.

ClockTuesday 23 March 2021, 14:00-15:00

Computer Laboratory Security Seminar

Understanding Modern Phishing

UserBrad Wardman and Adam Oest, PayPal.

HouseWebinar.

ClockTuesday 16 March 2021, 14:00-15:00

Computer Laboratory Security Seminar

Deep Learning Assisted Side-Channel Attacks

UserElena Dubrova, KTH Royal Institute of Technology.

HouseWebinar.

ClockTuesday 09 March 2021, 14:00-15:00

Computer Laboratory Security Seminar

Crowdsourcing Security Research: A case study of AdObserver

UserLaura Edelson and Damon McCoy, New York University.

HouseWebinar.

ClockTuesday 02 March 2021, 14:00-15:00

Technical Talks - Department of Computer Science and Technology

Entrust: Is Quantum Computing really a threat to Security Systems?

UserDr Pali Surdhar, Product Security Director, Entrust.

HouseOnline.

ClockTuesday 02 March 2021, 13:05-13:55

Computer Laboratory Security Seminar

Dmitry goes to Hollywood: Criminal Excellence in (Cyber) La La Land

UserLuca Allodi, Eindhoven University of Technology.

HouseWebinar.

ClockTuesday 23 February 2021, 14:00-15:00

Computer Laboratory Security Seminar

A Liar and a Copycat: Nonverbal Coordination Increases with Lie Difficulty

UserSophie van der Zee, Erasmus University Rotterdam.

HouseWebinar.

ClockTuesday 16 February 2021, 14:00-15:00

Computer Laboratory Security Seminar

Cybersecurity Risk to Hospitals from Building Services

UserSheryn Gillin, University of Cambridge.

HouseWebinar.

ClockTuesday 09 February 2021, 14:00-15:00

Computer Laboratory Security Seminar

Towards Provable Physical Safety Against False Actuation Attacks in CPS

UserAlvaro Cardenas, University of California, Santa Cruz.

HouseWebinar.

ClockTuesday 26 January 2021, 16:00-17:00

Computer Laboratory Security Seminar

User Privacy Concerns and Preferences in Smart Buildings

UserMaryam Mehrnezhad, Newcastle University.

HouseWebinar.

ClockTuesday 01 December 2020, 13:00-14:00

Computer Laboratory Security Seminar

Cultural Convergence in the time of COVID

UserAlicia Bargar and Erin McAweeney, Graphika.

HouseWebinar.

ClockTuesday 17 November 2020, 14:00-15:00

Computer Laboratory Security Seminar

Hardware and Software Fingerprinting of Mobile Devices

UserJiexin (Stan) Zhang, University of Cambridge.

HouseWebinar.

ClockTuesday 10 November 2020, 13:00-14:00

Computer Laboratory Security Seminar

SHB Seminar

UserMultiple Speakers.

HouseWebinar.

ClockThursday 05 November 2020, 14:00-16:00

Computer Laboratory Security Seminar

Eavesdropping at Scale: Shifting the Threat Model in Satellite Broadband

UserJames Pavur, University of Oxford.

HouseWebinar.

ClockTuesday 03 November 2020, 14:00-15:00

Computer Laboratory Security Seminar

Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble

UserKit Murdock, University of Birmingham.

HouseWebinar.

ClockTuesday 27 October 2020, 14:00-15:00

Computer Laboratory Security Seminar

Sponge Examples: Energy-Latency Attacks on Neural Networks

UserIlia Shumailov, University of Cambridge.

HouseWebinar.

ClockTuesday 20 October 2020, 14:00-15:00

Computer Laboratory Security Seminar

Collaborative Deanonymization

UserRainer Böhme, University of Innsbruck.

HouseWebinar.

ClockTuesday 26 May 2020, 14:00-15:00

Computer Laboratory Security Seminar

Understanding Privacy-Related Questions on Stack Overflow

UserKami Vaniea, University of Edinburgh.

HouseWebinar.

ClockTuesday 19 May 2020, 14:00-15:00

Computer Laboratory Security Seminar

The politics of data-driven governance

UserLina Dencik, Data Justice Lab, Cardiff University.

HouseWebinar.

ClockTuesday 12 May 2020, 14:00-15:00

Computer Laboratory Security Seminar

SEAL: sealed-bid auction without auctioneers

UserFeng Hao, Department of Computer Science, University of Warwick.

HouseWebinar.

ClockTuesday 28 April 2020, 14:00-15:00

Computer Laboratory Security Seminar

Trustable Hardware as a TOCTOU Problem: Overview and Potential Remedies

UserDr. Andrew 'bunnie' Huang, Independent Researcher.

HouseWebinar.

ClockTuesday 21 April 2020, 14:00-15:00

LGBTQ+@CL Talks

Security, Privacy and Community in a Connected World

UserGeorge Neville-Neil, Computer Laboratory, University of Cambridge.

HouseFW26, William Gates Building, Computer Laboratory.

ClockFriday 06 March 2020, 15:00-16:00

Computer Laboratory Security Seminar

Product Design, Liability, and Insecurity Engineering

UserMarc Weber Tobias, School of Engineering, University of Pittsburgh.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 25 February 2020, 14:00-15:00

Computer Laboratory Security Seminar

Measuring Cryptocurrency Fraud

UserMarie Vasek, Department of Computer Science, UCL.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 18 February 2020, 14:00-15:00

Darwin College Lecture Series

Alan Turing and the Enigma Machine

UserDr James Grime, Mathematician, Lecturer.

HouseLMH, Lady Mitchell Hall.

ClockFriday 07 February 2020, 17:30-18:30

Computer Laboratory Security Seminar

Security economics to inform behaviour change support

UserSimon Parkin, Information Security Group, University College London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 28 January 2020, 14:00-15:00

Computer Laboratory Security Seminar

It's Damn Hard to Decentralise the Web

UserGareth Tyson, School of Electronic Engineering and Computer Science, Queen Mary University of London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 21 January 2020, 14:00-15:00

Computer Laboratory Security Seminar

Automatically Dismantling Online Dating Fraud

UserMatthew Edwards, Faculty of Engineering, University of Bristol.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 29 October 2019, 14:00-15:00

Computer Laboratory Security Seminar

Reducing Metadata Leakage from Encrypted Files and Communication

UserNikitin Kirill, Decentralized/Distributed Systems Lab, EPFL.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 15 October 2019, 14:00-15:00

Computer Laboratory Security Seminar

An analysis of the threats of the consumer spyware industry

UserDiarmaid Harkin, Alfred Deakin Institute, Deakin University.

HouseLT2, Computer Laboratory, William Gates Building.

ClockThursday 12 September 2019, 14:00-15:00

Computer Laboratory Security Seminar

Deploying Differential Privacy for the 2020 Census of Population and Housing

UserSimson L. Garfinkel, Senior Computer Scientist for Confidentiality and Data Access, U.S. Census Bureau.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 23 July 2019, 14:00-15:00

Computer Laboratory Security Seminar

A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions

UserAlisa Frik, International Computer Science Institute (ICSI), University of California Berkeley.

HouseLT1, Computer Laboratory, William Gates Building.

ClockTuesday 30 April 2019, 14:00-15:00

Computer Laboratory Security Seminar

Securing Systems with Insecure Hardware

UserKaveh Razavi, Systems and Network Security Group, Vrije Universiteit Amsterdam.

HouseLT2, Computer Laboratory, William Gates Building.

ClockThursday 21 March 2019, 14:00-15:00

C.U. Ethics in Mathematics Society (CUEiMS)

Backdoors always backfire

UserTanja Lange (Eindhoven), to be joined by Daniel J. Bernstein (Chicago) for Q+A.

HouseMR2, Centre for Mathematical Sciences.

ClockThursday 21 February 2019, 17:00-18:00

Technical Talks - Department of Computer Science and Technology

Security Engineering @ nCipher

Food provided

UserPali Surdhar, nCipher.

HouseFW26, Computer Laboratory.

ClockWednesday 06 February 2019, 13:15-14:15

C.U. Ethics in Mathematics Society (CUEiMS)

Reflections on Ethics and Cryptography

UserMartin Hellman (via live videolink).

HouseMR2, Centre for Mathematical Sciences.

ClockTuesday 29 January 2019, 16:00-17:30

Computer Laboratory Security Seminar

Evil on the Internet

UserRichard Clayton, Computer Laboratory, University of Cambridge.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 22 January 2019, 14:00-16:00

Computer Laboratory Security Seminar

Function-Based Access Control

UserYvo G. Desmedt, Department of Computer Science, University of Texas at Dallas.

HouseFW11, Computer Laboratory, William Gates Building.

ClockTuesday 04 December 2018, 16:00-17:00

Cybercrime in the Sky

UserAlice Hutchings, Computer Laboratory, University of Cambridge.

HouseS3 Seminar Room, Institute of Criminology.

ClockThursday 22 November 2018, 17:30-19:00

Computer Laboratory Security Seminar

Displacing big data: How cybercriminals cheat the system

UserAlice Hutchings, Computer Laboratory, University of Cambridge.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 13 November 2018, 14:00-15:00

Computer Laboratory Security Seminar

Combating a hydra: Islamic State's digital jihad as a threat to international security

UserMiron Lakomy, Department of International Relations, University of Silesia.

HouseLT2, Computer Laboratory, William Gates Building.

ClockMonday 16 July 2018, 15:00-16:00

Computer Laboratory Security Seminar

Detecting Spies in Sensor-Rich Environments using Cyber-Physical Correlation

UserBrent Lagesse, University of Washington Bothell (visiting Cambridge as a Fulbright Scholar).

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 22 May 2018, 14:00-15:00

Computer Laboratory Security Seminar

Ethical Issues in Network Measurement

UserShehar Bano, Dept. of Computer Science, University College London (UCL).

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 15 May 2018, 14:00-15:00

Computer Laboratory Security Seminar

Data science approaches to understanding key actors on online hacking forums

UserSergio Pastrana/Andrew Caines, Computer Laboratory, University of Cambridge.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 08 May 2018, 14:00-15:00

Computer Laboratory Security Seminar

Anonymity in Cryptocurrencies

UserSarah Meiklejohn, Information Security Group, University College London (UCL).

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 30 January 2018, 14:00-15:00

Computer Laboratory Security Seminar

Bayes, not Naive: Security Bounds on Website Fingerprinting Defenses

UserGiovanni Cherubin, Information Security Group (ISG), Royal Holloway, University of London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 28 November 2017, 14:00-15:00

Computer Laboratory NetOS Group Talklets

Mining Large-Scale Internet Data to Find Stealthy Abuse

This is a full talk NOT a talklet.

UserMobin Javed, ICSI Berkeley.

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockTuesday 07 November 2017, 13:00-14:00

C.U. Ethics in Mathematics Society (CUEiMS)

The dangers of success

UserWilliam Binney and Arjen Kamphuis.

HouseMR2, Centre for Mathematical Sciences.

ClockThursday 12 October 2017, 17:30-18:30

Computer Laboratory Security Seminar

Analysis and Classification of Android Malware

UserLorenzo Cavallaro, Information Security Group (ISG), Royal Holloway, University of London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 10 October 2017, 14:00-15:00

Computer Laboratory Security Seminar

Conditional Linear Cryptanalysis

UserEli Biham, Computer Science Department, Technion - Israel Institute of Technology.

HouseLT2, Computer Laboratory, William Gates Building.

ClockWednesday 04 October 2017, 14:00-15:00

Computer Laboratory Security Seminar

Protecting Analog Sensor Security

UserKevin Fu, Associate Professor in Electrical Engineering and Computer Science, University of Michigan.

HouseLT2, Computer Laboratory, William Gates Building.

ClockThursday 28 September 2017, 14:00-15:00

Computer Laboratory Security Seminar

abraCARDabra: understanding carding forums

UserJeremiah Onaolapo, University College London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 27 June 2017, 14:00-15:00

Computer Laboratory Security Seminar

Free-Form Gesture Passwords: Security, Memorability, Usability

UserJanne Lindqvist, assistant professor of electrical and computer engineering, Rutgers University.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 28 March 2017, 14:00-15:00

Computer Laboratory Security Group meeting presentations

Hack the brain

UserFlorian Gondesen, Hamburg University of Technology.

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockFriday 24 February 2017, 16:00-16:30

Darwin College Lecture Series

Extreme Events and How to Live with Them

UserProfessor Nassim Nicholas Taleb, New York.

HouseLMH, Lady Mitchell Hall.

ClockFriday 27 January 2017, 17:30-18:30

Computer Laboratory Security Seminar

Trends in Online Payment Security

UserMohammed Aamir Ali, Newcastle University.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 17 January 2017, 14:00-15:00

Emmy Noether Society

Composition in Differential Privacy

Last talk of term

UserDr Cynthia Dwork, Microsoft Research.

HouseMill Lane Lecture Room 1, 8 Mill Lane, Cambridge CB2 1RX.

ClockThursday 01 December 2016, 17:45-19:00

Computer Laboratory Security Seminar

Reversing chip design for hardware security characterization

UserFranck Courbon, Security group, University of Cambridge.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 29 November 2016, 14:00-15:00

Technical Talks - Department of Computer Science and Technology

Building a Secure Bank

UserDaniel Chatfield, Security Engineer, Monzo.

HouseFW26, Computer Laboratory.

ClockWednesday 09 November 2016, 13:05-14:05

Isaac Newton Institute Seminar Series

German Mathematicians and Cryptology during WWII

FOS - Probability and statistics in forensic science

UserSandy Zabell (Northwestern University).

HouseSeminar Room 2, Newton Institute.

ClockThursday 03 November 2016, 11:00-12:00

Wednesday Seminars - Department of Computer Science and Technology

End-to-end encryption: Behind the scenes

UserD Vasile, M Kleppmann & D Thomas - University of Cambridge Computer Laboratory.

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 26 October 2016, 16:15-17:15

Cambridge Centre for Alternative Finance

LECTURE AND HACKATHON: SPEAKER BALAJI SRINIVASAN, 21.co | HOW BITCOIN ENABLES A MACHINE-PAYABLE WEB

Places are limited, please register and RSVP to n.robinson@jbs.cam.ac.uk

UserBalaji Srinivasan, CEO 21.co.

HouseLecture Theatre 2, Cambridge Judge Business School.

ClockMonday 03 October 2016, 18:00-21:00

Microsoft Research Cambridge, public talks

Reflections on Code-Reuse Attacks and Defenses

Please note, this event may be recorded. Microsoft will own the copyright of any recording and reserves the right to distribute it as required.

UserThorsten Holz, Ruhr-University Bochum.

HouseAuditorium, Microsoft Research Ltd, 21 Station Road, Cambridge, CB1 2FB.

ClockThursday 04 August 2016, 16:00-17:00

Computer Laboratory Computer Architecture Group Meeting

Design for Security Test against Fault Injection Attack, and Fast Test with Compressive Sensing

Note unusual time and venue. Talk follows 14:00 to 14:45 talk.

UserProf Huiyun Li, Shenzhen Institutes of Advanced Technology.

HouseLecture Theatre 1, Computer Laboratory.

ClockTuesday 02 August 2016, 14:45-15:30

Computer Laboratory Computer Architecture Group Meeting

Barrier-Aware Warp Scheduling for Throughput Processors

Note unusual time

UserProf Yu Zhibin, Shenzhen Institutes of Advanced Technology.

HouseLecture Theatre 1, Computer Laboratory.

ClockTuesday 02 August 2016, 14:00-14:45

Computer Laboratory Security Seminar

Understanding, Characterizing, and Detecting Facebook Like Farms

UserDr. Emiliano De Cristofaro, Senior Lecturer (Associate Professor), University College London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 22 March 2016, 14:00-15:00

Computer Laboratory Security Seminar

The Unfalsifiability of security claims

UserCormac Herley, Microsoft Research, Redmond.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 09 February 2016, 14:00-15:00

REMS lunch

Cache Storage Channels: Alias-Driven Attacks

NON-STANDARD DAY: NEXT MONDAY

UserRoberto Guanciale, KTH.

HouseFW26.

ClockMonday 08 February 2016, 13:00-14:00

Computer Laboratory Security Group meeting presentations

About the (in)security of CAPTCHAs

UserCarlos Javier Hernández-Castro, Complutense University, Madrid, Spain.

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockFriday 30 October 2015, 16:00-16:20

Technical Talks - Department of Computer Science and Technology

nShield HSMs

Food provided so please register for the talk so that we can gauge numbers.

UserRichard Kettlewell, Thales.

HouseFW26, Computer Laboratory.

ClockMonday 26 October 2015, 13:00-13:30

Technical Talks - Department of Computer Science and Technology

Break into a hacker’s mind

UserAldwin Saugere (Vice President, IT Security Architecture, Morgan Stanley).

HouseFW11, Computer Laboratory.

ClockFriday 23 October 2015, 13:00-14:00

Ethics of Big Data

Inside Snowden’s suitcase

UserEvan Light, Concordia University.

House Room SG1, Alison Richard Building, 7 West Road, Cambridge, CB3 9DT.

ClockWednesday 21 October 2015, 12:00-14:00

Computer Laboratory Security Group meeting presentations

Behavioral Decision Making in Interdependent Security Games

UserAshish R. Hota, PhD Student, School of Electrical and Computer Engineering Purdue University.

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockTuesday 20 October 2015, 16:00-17:00

Microsoft Research Cambridge, public talks

Human factors of software updates

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserKami Vaniea, University of Edinburgh.

HouseSmall Lecture Theatre, Microsoft Research Ltd, 21 Station Road, Cambridge, CB1 2FB.

ClockWednesday 16 September 2015, 15:00-16:00

REMS lunch

Rozzle: De-Cloaking Internet Malware

UserBen Livshits.

HouseFW11.

ClockWednesday 16 September 2015, 13:00-14:00

Computer Laboratory Security Seminar

Massively Parallel Hardware Security Platform

UserPetr Svenda, Masaryk University, Czech Republic.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 28 July 2015, 14:00-15:00

Computer Laboratory Security Seminar

Making Better Privacy Decisions in Ubiquitous Computing Environments

UserSerge Egelman, International Computer Science Institute (ICSI) and Department of Electrical Engineering and Computer Sciences (EECS) at the University of California, Berkeley.

HouseRoom FW26, Computer Laboratory, William Gates Building.

ClockFriday 26 June 2015, 14:00-15:00

Computer Laboratory Security Seminar

Massively Parallel Hardware Security Platform

UserPetr Svenda, Masaryk University, Czech Republic.

HouseLT2, Computer Laboratory, William Gates Building.

ClockThursday 28 May 2015, 14:00-15:00

Computer Laboratory Security Seminar

Captchas - the state of play

UserDr Jeff Yan, Newcastle University.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 28 April 2015, 14:00-15:00

Computer Laboratory Security Seminar

Understanding and Fighting Malicious Activity on Online Social Networks

UserGianluca Stringhini, Assistant Professor, University College London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 21 April 2015, 14:00-15:00

Computer Laboratory Security Seminar

Chupja--PHY Covert Channels: Can you see the Idles?

UserHakim Weatherspoon, assistant professor, Department of Computer Science, Cornell University.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 31 March 2015, 14:00-15:00

Computer Laboratory Security Seminar

Human factors and missed solutions to WWII Enigma design weaknesses

UserProf. Harold Thimbleby CEng FIET FRCPE FLSW HonFRSA HonFRCP.

HouseLT2, Computer Laboratory, William Gates Building.

ClockThursday 05 February 2015, 14:00-15:00

Microsoft Research Cambridge, public talks

Dynamic PDP vs. Dynamic POR: Are they really different?

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserAlptekin Kupcu, Koc University.

HouseSmall Lecture Theatre, Microsoft Research Ltd, 21 Station Road, Cambridge, CB1 2FB.

ClockWednesday 14 January 2015, 11:30-12:30

Computer Laboratory Security Seminar

Single Password Authentication

UserAlptekin Küpçü, Assistant Professor, Cryptography, Security & Privacy Research Group, Koç University.

HouseFW11, Computer Laboratory, William Gates Building.

ClockTuesday 13 January 2015, 14:00-15:00

Women@CL Events

women@CL Talklets - Security

UserJeunese Payne, Alice Hutchings and Sophie Van Der Zee, Computer Laboratory, University of Cambridge.

HouseComputer Laboratory, William Gates Building, Room FW26.

ClockThursday 04 December 2014, 13:00-14:00

Computer Laboratory Security Seminar

Cloud-centric assured information sharing

User Dr. Bhavani Thuraisingham, Executive Director of the Cyber Security Research Institute, The University of Texas at Dallas.

HouseFW11, Computer Laboratory, William Gates Building.

ClockThursday 27 November 2014, 11:00-12:00

Computer Laboratory Security Seminar

Hacking is not random: a case-control study of webserver-compromise risk

UserMarie Vasek, PhD student in the Computer Science and Engineering department, Southern Methodist University (SMU).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockWednesday 19 November 2014, 15:05-16:05

C.U. Cryptographic Currency Society

Bitcoin: the good, the bad, and the ugly!

UserDr Nicolas T. Courtois, UCL Department of Computer Science.

HouseCentre for Mathematical Sciences, Meeting Room 3.

ClockTuesday 21 October 2014, 18:30-19:30

C.U. Cryptographic Currency Society

Blockchain Technology

UserVitalik Buterin & Stephan Tual, ethereum.

HouseBateman Auditorium, Gonville and Caius College.

ClockTuesday 14 October 2014, 20:15-21:30

Computer Laboratory Security Seminar

Bitcoin as a source of verifiable public randomness

UserJoseph Bonneau, Center For Information Technology Policy, Princeton.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 30 September 2014, 14:00-15:00

Computer Laboratory Security Seminar

DP5: Privacy-preserving Presence Protocols

UserIan Goldberg, University of Waterloo [currently on sabbatical at the University of Cambridge].

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 23 September 2014, 14:00-15:00

Computer Laboratory Security Seminar

From TLS to secure websites: the HTTPS landmine

UserAntoine Delignat-Lavaud, Inria Paris, team Prosecco (Programming Securely with Cryptography.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 09 September 2014, 14:00-15:00

Computer Laboratory Security Seminar

Security, Reliability and Backdoors

UserDr Sergei Skorobogatov, Security Group, University of Cambridge Computer Laboratory.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 13 May 2014, 15:00-16:00

Computer Laboratory Security Group meeting presentations

Building a Cyber eco-system

UserJohn Dale, handling partnering and M&A for Raytheon UK.

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockFriday 02 May 2014, 16:00-16:30

Computer Laboratory Security Seminar

Protecting Programs During Resource Retrieval

UserProfessor Trent Jaeger, CSE Department, Pennsylvania State University.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 29 April 2014, 15:00-16:00

Computer Laboratory Security Seminar

Website Fingerprinting

UserNikita Borisov, University of Illinois.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 22 April 2014, 15:00-16:00

Computer Laboratory Security Seminar

Bitcoin: A Full Employment Act for security engineers?

UserJoseph Bonneau, Center For Information Technology Policy, Princeton.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 18 March 2014, 15:00-16:00

Women@CL Events

Computer crime and the gender ratio problem

UserDr Alice Hutchings, Security Group, Univ. of Cambridge Computer Laboratory.

HouseComputer Laboratory, William Gates Building, Room FW26.

ClockThursday 13 March 2014, 13:00-14:00

Computer Laboratory Security Seminar

Introduction to DNSSEC

UserTony Finch, University of Cambridge Computing Service.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 25 February 2014, 15:00-16:00

Computer Laboratory Security Group meeting presentations

Discussion on AG's recent Opinion concerning the Data Retention Directive

Note change of room to SS03 (for this day only)

UserNora Ni Loideain, PhD Candidate in Law, Magdalene College, University of Cambridge.

HouseComputer Laboratory, William Gates Building, Room SS03.

ClockFriday 21 February 2014, 16:00-17:00

Computer Laboratory Security Seminar

SCION: Scalability, Control, and Isolation On Next-Generation Networks

UserProf. Adrian Perrig, Department of Computer Science at the Swiss Federal Institute of Technology (ETH).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockMonday 18 November 2013, 14:00-15:00

Computer Laboratory Security Seminar

Psychology of scams

UserDavid Modic, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 22 October 2013, 16:15-17:15

Computer Laboratory Security Group meeting presentations

Effect of Internet censorship on user behavior

UserSheharbano Khattak, University of Cambridge Computer Laboratory.

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockFriday 18 October 2013, 16:00-16:30

Computer Laboratory Security Seminar

Rendezvous: A search engine for binary code

UserWei Ming Khoo, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 14 May 2013, 16:15-17:15

Computer Laboratory Security Seminar

An Updated Threat Model for Security Ceremonies

UserJean Martina (Federal University of Santa Catarina / Brazil).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 20 November 2012, 16:15-17:15

Microsoft Research Cambridge, public talks

Dynamically Enforcing Knowledge-based Security Policies

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attendin

UserMichael Hicks, University of Maryland.

HouseSmall lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockFriday 12 October 2012, 10:00-11:00

Computer Laboratory Security Seminar

Technology Risk Management - Achilles Heels, Myths and Mirages

Note the change in timing

UserTony Chew (Monetary Authority of Singapore).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockThursday 04 October 2012, 17:00-18:00

Computer Laboratory Security Seminar

Explorations of Science in Cyber Security

UserGreg Shannon (CERT and Carnegie Mellon University).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockMonday 01 October 2012, 15:00-16:00

Computer Laboratory Systems Research Group Seminar

Towards Trustworthy Embedded Systems

UserGernot Heiser (University of New South Wales/NICTA).

HouseFW26, Computer Laboratory, William Gates Builiding.

ClockFriday 22 June 2012, 11:00-12:00

Computer Laboratory Security Group meeting presentations

Title to be confirmed

UserJosé Manuel Liñares-Zegarra & Bernardo Batiz-Lazo.

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockFriday 15 June 2012, 16:00-16:20

Microsoft Research Cambridge, public talks

Confining the Ghost in the Machine: Using Types to Secure JavaScript Sandboxing

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserShriram Krishnamurthi, Brown University.

HouseLarge lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockWednesday 18 April 2012, 10:30-11:30

Microsoft Research Cambridge, public talks

Efficient Cryptography for the Next Generation Secure Cloud

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserAlptekin Küpçü, Koç University.

HousePrimrose Room, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockTuesday 17 April 2012, 16:00-17:00

Microsoft Research Cambridge, public talks

The science of guessing

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserJoseph Bonneau (Cambridge University).

HouseSmall lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockThursday 05 April 2012, 09:30-10:30

Microsoft Research Cambridge, public talks

Non-Interactive Verifiable Computation

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserBryan Parno, Microsoft Research.

HouseSmall lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockWednesday 28 March 2012, 14:00-15:00

Microsoft Research Cambridge, public talks

Malleability in Modern Cryptography

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserMarkulf Kohlweiss, MSRC.

HouseLarge lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockWednesday 14 March 2012, 10:00-11:00

Microsoft Research Cambridge, public talks

Homomorphic Encryption from Ring Learning with Errors

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserMichael Naehrig, Technische Universiteit Eindhoven.

HouseLarge lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockTuesday 10 January 2012, 10:00-11:00

Computer Laboratory Systems Research Group Seminar

Quantifying Location Privacy

UserGeorge Theodorakopoulos (EPFL, University of Derby).

HouseSS03, Computer Lab, William Gates Building.

ClockThursday 17 November 2011, 16:00-17:00

Computer Laboratory Systems Research Group Seminar

Twitter bots

UserMiranda Mowbray (HP Labs Bristol).

HouseFW26, Computer Laboratory, William Gates Builiding.

ClockThursday 29 September 2011, 16:00-17:00

Microsoft Research Cambridge, public talks

The IITM Model and its Application to the Analysis of Real-World Security Protocol

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserRalf Küsters, University of Trier.

HouseLarge lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockThursday 08 September 2011, 13:30-14:30

Computer Laboratory Security Seminar

Evolutionary Software Repair

UserStephanie Forrest, University of New Mexico.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 19 July 2011, 16:15-17:15

Computer Laboratory Computer Architecture Group Meeting

Hardware Protection for Trusted Software

Note unusual time

UserProf. Ruby Lee, Princeton University.

HouseSS03, Computer Laboratory.

ClockFriday 15 July 2011, 15:00-16:00

Arcadia Project Seminars

Google, Crowds and Mobs

UserTom Simpson, Department of Philosophy, Cambridge.

HouseSeminar Room, Wolfson College.

ClockTuesday 14 June 2011, 18:00-19:15

Computer Laboratory Security Seminar

Practical Linguistic Steganography using Synonym Substitution

UserChing-Yun (Frannie) Chang & Stephen Clark, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 17 May 2011, 16:15-17:15

Computer Laboratory Security Seminar

CTSRD: Capability CPUs revisited

UserPeter Neumann, SRI International / Robert Watson, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 03 May 2011, 14:45-15:45

Computer Laboratory Systems Research Group Seminar

Promoting location privacy... one lie at a time

UserDaniele Quercia (University of Cambridge).

HouseSS03 of the Computer Lab.

ClockThursday 03 March 2011, 16:00-17:00

Computer Laboratory Security Seminar

Bumping attacks: the affordable way of obtaining chip secrets

UserSergei Skorobogatov - Computer Laboratory ( University of Cambridge).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 07 December 2010, 16:15-17:15

Computer Laboratory Programming Research Group Seminar

Extracting the Semantic Signature of Malware, Metamorphic Viruses and Worms

UserRK Shyamasundar; Tata Institute of Fundamental Research, Mumbai.

HouseFW11, Computer Laboratory.

ClockFriday 08 October 2010, 14:00-15:00

Computer Laboratory Security Group meeting presentations

Trip report for PETS 2010

UserSteven J. Murdoch (Computer Laboratory, University of Cambridge).

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockFriday 06 August 2010, 16:00-16:20

Computer Laboratory Security Seminar

Colour, usability and computer security

Note unusual time

UserJeff Yan, Newcastle University.

HouseRoom SS03, Computer Laboratory, William Gates Building.

ClockThursday 01 July 2010, 16:15-17:15

Computer Laboratory Security Group meeting presentations

Chip and PIN is broken

Practice talk for IEEE Security and Privacy (Oakland)

UserSteven J. Murdoch (Computer Laboratory, University of Cambridge).

HouseComputer Laboratory, William Gates Building, Room FW26.

ClockFriday 14 May 2010, 16:00-16:30

Darwin College Lecture Series

Risk, Security and Terrorism

UserProfessor Lucia Zedner, University of Oxford.

HouseLMH, Lady Mitchell Hall.

ClockFriday 19 February 2010, 17:30-18:30

Optimization and Incentives Seminar

Anonymity via networks of mixes

UserVenkat Anantharam, EECS Department, University of California Berkeley..

HouseMR5, CMS, Wilberforce Road, Cambridge, CB3 0WB.

ClockMonday 18 January 2010, 15:00-16:00

Computer Laboratory Security Seminar

Surveillance in Speculative Fiction: Have Our Artists Been Sufficiently Imaginative?

UserRoger Clarke, University of New South Wales.

HouseFW11.

ClockMonday 02 November 2009, 14:00-15:00

Wednesday Seminars - Department of Computer Science and Technology

Aggregated Security Monitoring in 10GB networks

UserNathan Macrides and Nick McKenzie - Security Engineering, RBS.

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 28 October 2009, 14:15-15:15

Computer Laboratory Security Group meeting presentations

Towards copy-evident JPEG images

Practice talk for Informatik 2009

UserAndrew Lewis (University of Cambridge).

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockFriday 25 September 2009, 16:00-16:30

Computer Laboratory Security Group meeting presentations

Conference report: Financial Cryptography 2009

UserSteven J. Murdoch (Computer Laboratory, University of Cambridge).

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockFriday 06 March 2009, 16:00-16:30

Computer Laboratory Security Seminar

Privacy-Preserving 802.11 Access-Point Discovery

UserJanne Lindqvist - Helsinki University of Technology, Finland.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 03 February 2009, 16:15-17:15

Wednesday Seminars - Department of Computer Science and Technology

A Framework for the Analysis of Mix-Based Steganographic File Systems

UserClaudia Diaz - Department of Electrical Engineering (ESAT), K.U.Leuven, Belgium.

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 28 January 2009, 14:15-15:15

Computer Laboratory Security Seminar

Hardware security: trends and pitfalls of the past decade

UserSergei Skorobogatov - Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 20 January 2009, 16:15-17:15

Computer Laboratory Security Seminar

Identity Theft and the Mobile Device

UserAndy Jones - Head of Information Security Research, Centre for Information & Security Systems Research, BT Innovate.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 13 January 2009, 16:15-17:15

Computer Laboratory Security Seminar

Bayesian Inference and Traffic Analysis

UserCarmela Troncoso, Microsoft Research Cambridge/KU Leuven(COSIC).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 09 December 2008, 16:15-17:15

Computer Laboratory Security Seminar

Talking to strangers

UserBruce Christianson, University of Hertfordshire.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 02 December 2008, 16:15-17:15

Computer Laboratory Security Group meeting presentations

ATM Security 2008 Conference

UserSteven J. Murdoch (Computer Laboratory, University of Cambridge).

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockFriday 31 October 2008, 16:00-16:30

Computer Laboratory Security Seminar

Browsing with the enemy: a German view

Please note the extended duration.

UserKai Buchholz-Stepputtis and Boris Hemkemeier.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 21 October 2008, 16:15-17:45

Computer Laboratory Security Seminar

Advances in Hash Cryptanalysis

UserChristian Rechberger, IAIK, Graz University of Technology.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 24 June 2008, 16:15-17:15

Computer Laboratory Security Group meeting presentations

Thinking inside the box: system-level failures of tamper proofing

Practice talk for IEEE Security and Privacy (Oakland)

UserSteven J. Murdoch (Computer Laboratory, University of Cambridge).

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockFriday 09 May 2008, 16:00-16:30

Wednesday Seminars - Department of Computer Science and Technology

Copyright vs Community

Please note the extended duration

UserRichard Stallman, www.gnu.org.

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 30 April 2008, 14:15-16:00

Computer Laboratory Security Seminar

Fighting online crime

Note unusual day

UserMikko Hyppönen, Chief Research Officer, F-Secure Corporation.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockWednesday 23 April 2008, 16:15-17:15

Computer Laboratory Security Seminar

An Empirical Analysis of Phishing Attack and Defense

UserTyler Moore (Computer Laboratory, University of Cambridge).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 08 April 2008, 16:15-17:15

Computer Laboratory Security Seminar

Minimal TCB Code Execution

UserJonathan M. McCune, Carnegie Mellon University.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 25 March 2008, 16:15-17:15

Computer Laboratory Security Seminar

Is SSL provably secure ?

UserNigel Smart, Department of Computer Science, University of Bristol.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockFriday 22 February 2008, 16:00-17:00

Computer Laboratory Security Seminar

Hot or Not: Fingerprinting hosts through clock skew

UserSteven J. Murdoch (Computer Laboratory, University of Cambridge).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 12 February 2008, 16:15-17:15

Computer Laboratory Security Seminar

Exploiting Online Games

Note unusual time and room

UserGary McGraw, CTO, Cigital.

HouseRoom FW11, Computer Laboratory, William Gates Building.

ClockTuesday 29 January 2008, 10:30-11:30

Computer Laboratory Security Group meeting presentations

Summary of the 24th Chaos Communication Congress

UserSteven J. Murdoch (Computer Laboratory, University of Cambridge).

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockFriday 18 January 2008, 16:00-16:30

Wednesday Seminars - Department of Computer Science and Technology

Searching for Evil

UserRoss Anderson and Richard Clayton, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 16 January 2008, 14:15-15:15

Computer Laboratory Security Seminar

Graphical passwords: some recent results

Note special time and day of week

UserJeff Yan, University of Newcastle.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockFriday 07 December 2007, 16:00-17:00

Computer Laboratory Security Seminar

The Anti-Bank: the privatized delivery of social grants using biometric encrypted smart-cards in southern Africa

UserKeith Breckenridge, Professor of History and Internet Studies, University of KwaZulu-Natal, South Africa.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 04 December 2007, 16:15-17:15

Computer Laboratory Security Seminar

Networked information processing and privacy in Japan

UserAndrew A. Adams, School of Systems Engineering, University of Reading.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 27 November 2007, 16:15-17:15

Computer Laboratory Security Group meeting presentations

Practical web application security

UserSteven J. Murdoch (Computer Laboratory, University of Cambridge).

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockFriday 09 November 2007, 16:00-16:20

Computer Laboratory Security Seminar

Key amplification in unstructured networks

UserShishir Nagaraja, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 30 October 2007, 16:15-17:15

Computer Laboratory Security Group meeting presentations

Discussion: Bi-directional authentication in TLS

UserSteven J. Murdoch (Computer Laboratory, University of Cambridge).

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockFriday 19 October 2007, 16:00-16:30

Computer Laboratory Security Group meeting presentations

A new approach to E-banking

Practice talk for NordSec

UserMatthew Johnson, Computer Laboratory.

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockFriday 05 October 2007, 16:00-16:30

Computer Laboratory Security Group meeting presentations

Summary of USENIX Security 2007

UserSteven J. Murdoch (Computer Laboratory, University of Cambridge).

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockFriday 17 August 2007, 16:00-16:20

Computer Laboratory Security Group meeting presentations

Exploiting concurrency vulnerabilities in system call wrappers

Practice talk for USENIX Security WOOT

UserRobert Watson (University of Cambridge).

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockFriday 03 August 2007, 16:00-16:30

Computer Laboratory Security Seminar

The economics of revealing and protecting private information: Evidence from human subject experiments and surveys

Note unusual day of the week

UserJens Grossklags, School of Information, University of California Berkeley.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockMonday 30 July 2007, 16:15-17:15

Computer Laboratory Security Group meeting presentations

Experiences as an e-counting election observer

UserSteven J. Murdoch (Computer Laboratory, University of Cambridge).

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockFriday 29 June 2007, 16:00-16:20

Wednesday Seminars - Department of Computer Science and Technology

Smart-card based authentication on an insecure network

UserPeter Sweeney, Centre for Communication Systems Research, University of Surrey..

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 30 May 2007, 14:15-15:15

Computer Laboratory Security Seminar

Phishing tips and techniques: tackle, rigging, and how and when to phish

Note unusual time of talk in addition to our regularly scheduled one

UserPeter Gutmann, University of Auckland.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 01 May 2007, 14:15-15:15

Computer Laboratory Security Group meeting presentations

Resiliency aspects of security protocols

Practice talk for Security Protocols Workshop

UserMarcus Granado.

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockFriday 13 April 2007, 16:00-16:30

Computer Laboratory Security Seminar

Alternative security mechanisms for WiFi networks

UserDaniel Cvrcek, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 06 March 2007, 16:15-17:15

Computer Laboratory Security Seminar

Power analysis attacks

UserElisabeth Oswald, Department of Computer Science, University of Bristol.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 27 February 2007, 16:15-17:15

Computer Laboratory Security Seminar

Anonymity in the wild: Mixes on unstructured networks

UserShishir Nagaraja, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 13 February 2007, 16:15-17:15

Computer Laboratory Security Seminar

Data sharing and privacy in multi-agency working

UserAdam Warren, Department of Information Science, Loughborough University.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 06 February 2007, 16:15-17:15

Computer Laboratory Security Seminar

Privacy preserving censorship

UserYvo Desmedt, Department of Computer Science, University College London.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 23 January 2007, 16:15-17:15

Computer Laboratory Security Seminar

Optically enhanced position-locked power analysis

UserSergei Skorobogatov, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 31 October 2006, 16:15-17:15

Computer Laboratory Security Group meeting presentations

Hot or Not: Revealing Hidden Services by their Clock Skew

Practice talk for ACM CCS

UserSteven J. Murdoch (Computer Laboratory, University of Cambridge).

HouseComputer Laboratory, William Gates Building, Room FW11.

ClockFriday 27 October 2006, 16:00-16:30

Computer Laboratory Security Seminar

The Polygraph

Note unusual day of the week

UserMarc Weber Tobias, Investigative Law Offices.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockWednesday 18 October 2006, 16:15-17:15

Computer Laboratory Security Seminar

Distance bounding protocols: Authentication logic analysis

Note unusual room, day and hour

UserCatherine Meadows, Naval Research Laboratory.

HouseLecture Theatre 1, Computer Laboratory, William Gates Building.

ClockFriday 06 October 2006, 16:00-17:00

Computer Laboratory Security Seminar

Privacy preserving data mining in distributed databases

UserEhud Gudes, Department of Computer Science, Ben-Gurion University.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 26 September 2006, 16:15-17:15

Computer Laboratory Security Seminar

Peer-to-peer network topologies and anonymity

UserNikita Borisov, Electrical and Computer Engineering Department, University of Illinois at Urbana-Champaign.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockFriday 08 September 2006, 16:00-17:00

Computer Laboratory Security Seminar

Opening locks by bumping in five seconds or less: is it really a threat to physical security?

Note change from originally publicized time

UserMarc Weber Tobias, Investigative Law Offices.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 23 May 2006, 14:15-15:15

Computer Laboratory Security Seminar

Security Flaws in Tunnel Mode IPsec

UserKenny Paterson, Royal Holloway, University of London.

HouseFW11, Computer Laboratory, William Gates Building.

ClockTuesday 07 March 2006, 16:15-17:15

Computer Laboratory Security Seminar

Hiding on an Ethernet

UserRichard Clayton, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 28 February 2006, 16:15-17:15

Please see above for contact details for this list.

 

© 2006-2024 Talks.cam, University of Cambridge. Contact Us | Help and Documentation | Privacy and Publicity