University of Cambridge > Talks.cam > Computer Laboratory Security Seminar

Computer Laboratory Security Seminar

Add to your list(s) Send you e-mail reminders Further detail
Subscribe using ical/vcal (Help)

Seminars organised by the Computer Laboratory’s Security Research Group.

More information, including past talks, is available at the Security Group’s seminar page.

Tell a friend about this list:

If you have a question about this list, please contact: Markus Kuhn; Ross Anderson; Alexander Vetterl. If you have a question about a specific talk, click on that talk to find its organiser.

3 upcoming talks and 270 talks in the archive.

Bayes, not Naive: Security Bounds on Website Fingerprinting Defenses

UserGiovanni Cherubin, Information Security Group (ISG), Royal Holloway, University of London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 28 November 2017, 14:00-15:00

Analysis and Classification of Android Malware

UserLorenzo Cavallaro, Information Security Group (ISG), Royal Holloway, University of London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 10 October 2017, 14:00-15:00

Conditional Linear Cryptanalysis

UserEli Biham, Computer Science Department, Technion - Israel Institute of Technology.

HouseLT2, Computer Laboratory, William Gates Building.

ClockWednesday 04 October 2017, 14:00-15:00

Protecting Analog Sensor Security

UserKevin Fu, Associate Professor in Electrical Engineering and Computer Science, University of Michigan.

HouseLT2, Computer Laboratory, William Gates Building.

ClockThursday 28 September 2017, 14:00-15:00

abraCARDabra: understanding carding forums

UserJeremiah Onaolapo, University College London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 27 June 2017, 14:00-15:00

Improving the Impact of Smartphone Apps

UserVincent Taylor, University of Oxford.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 23 May 2017, 14:00-15:00

Free-Form Gesture Passwords: Security, Memorability, Usability

UserJanne Lindqvist, assistant professor of electrical and computer engineering, Rutgers University.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 28 March 2017, 14:00-15:00

Computer Laboratory Wednesday Seminars

CHERI - Architectural support for software memory protection and compartmentalisation

UserRobert N. M. Watson - University of Cambridge, Computer Laboratory.

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 22 February 2017, 16:15-17:15

On the Privacy and Security of the Ultrasound Ecosystem

UserVasilios Mavroudis, University College London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 21 February 2017, 14:00-15:00

Trends in Online Payment Security

UserMohammed Aamir Ali, Newcastle University.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 17 January 2017, 14:00-15:00

Reversing chip design for hardware security characterization

UserFranck Courbon, Security group, University of Cambridge.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 29 November 2016, 14:00-15:00

Drammer: Deterministic Rowhammer Attacks on Mobile Platforms

UserKaveh Razavi, Vrije Universiteit Amsterdam.

HouseRoom SS03, Computer Laboratory, William Gates Building.

ClockFriday 04 November 2016, 13:15-14:15

Computer Laboratory Wednesday Seminars

End-to-end encryption: Behind the scenes

UserD Vasile, M Kleppmann & D Thomas - University of Cambridge Computer Laboratory.

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 26 October 2016, 16:15-17:15

Putting wireless signal security in a system security context

note unusual date

UserWade Trappe, Rutgers University.

HouseLT2, Computer Laboratory, William Gates Building.

ClockFriday 21 October 2016, 14:00-15:00

Computer Laboratory Computer Architecture Group Meeting

Design for Security Test against Fault Injection Attack, and Fast Test with Compressive Sensing

Note unusual time and venue. Talk follows 14:00 to 14:45 talk.

UserProf Huiyun Li, Shenzhen Institutes of Advanced Technology.

HouseLecture Theatre 1, Computer Laboratory.

ClockTuesday 02 August 2016, 14:45-15:30

Cyberinsurance: good for your company, bad for your country?

UserFabio Massacci - University of Trento.

HouseRoom FW26, Computer Laboratory, William Gates Building.

ClockTuesday 21 June 2016, 14:00-15:00

Understanding, Characterizing, and Detecting Facebook Like Farms

UserDr. Emiliano De Cristofaro, Senior Lecturer (Associate Professor), University College London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 22 March 2016, 14:00-15:00

Do You See What I See? Differential Treatment of Anonymous Users

UserSheharbano Khattak, University of Cambridge.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 16 February 2016, 14:00-15:00

The Unfalsifiability of security claims

UserCormac Herley, Microsoft Research, Redmond.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 09 February 2016, 14:00-15:00

Android security: Protecting users, a billion at a time

UserAdrian Ludwig, Android Security Team.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 24 November 2015, 14:00-15:00

Computer Laboratory Tech Talks

nShield HSMs

Food provided so please register for the talk so that we can gauge numbers.

UserRichard Kettlewell, Thales.

HouseFW26, Computer Laboratory.

ClockMonday 26 October 2015, 13:00-13:30

Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer

UserFlavio Garcia, University of Birmingham.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 13 October 2015, 14:00-15:00

Massively Parallel Hardware Security Platform

UserPetr Svenda, Masaryk University, Czech Republic.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 28 July 2015, 14:00-15:00

Making Better Privacy Decisions in Ubiquitous Computing Environments

UserSerge Egelman, International Computer Science Institute (ICSI) and Department of Electrical Engineering and Computer Sciences (EECS) at the University of California, Berkeley.

HouseRoom FW26, Computer Laboratory, William Gates Building.

ClockFriday 26 June 2015, 14:00-15:00

Massively Parallel Hardware Security Platform

UserPetr Svenda, Masaryk University, Czech Republic.

HouseLT2, Computer Laboratory, William Gates Building.

ClockThursday 28 May 2015, 14:00-15:00

Captchas - the state of play

UserDr Jeff Yan, Newcastle University.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 28 April 2015, 14:00-15:00

Understanding and Fighting Malicious Activity on Online Social Networks

UserGianluca Stringhini, Assistant Professor, University College London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 21 April 2015, 14:00-15:00

Chupja--PHY Covert Channels: Can you see the Idles?

UserHakim Weatherspoon, assistant professor, Department of Computer Science, Cornell University.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 31 March 2015, 14:00-15:00

Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation

UserNathan Dautenhahn, University of Illinois at Urbana-Champaign.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 10 March 2015, 14:00-15:00

Human factors and missed solutions to WWII Enigma design weaknesses

UserProf. Harold Thimbleby CEng FIET FRCPE FLSW HonFRSA HonFRCP.

HouseLT2, Computer Laboratory, William Gates Building.

ClockThursday 05 February 2015, 14:00-15:00

Single Password Authentication

UserAlptekin Küpçü, Assistant Professor, Cryptography, Security & Privacy Research Group, Koç University.

HouseFW11, Computer Laboratory, William Gates Building.

ClockTuesday 13 January 2015, 14:00-15:00

Cloud-centric assured information sharing

User Dr. Bhavani Thuraisingham, Executive Director of the Cyber Security Research Institute, The University of Texas at Dallas.

HouseFW11, Computer Laboratory, William Gates Building.

ClockThursday 27 November 2014, 11:00-12:00

Hacking is not random: a case-control study of webserver-compromise risk

UserMarie Vasek, PhD student in the Computer Science and Engineering department, Southern Methodist University (SMU).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockWednesday 19 November 2014, 15:05-16:05

Bitcoin as a source of verifiable public randomness

UserJoseph Bonneau, Center For Information Technology Policy, Princeton.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 30 September 2014, 14:00-15:00

DP5: Privacy-preserving Presence Protocols

UserIan Goldberg, University of Waterloo [currently on sabbatical at the University of Cambridge].

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 23 September 2014, 14:00-15:00

Micro-Policies: A Framework for Tag-Based Security Monitors

UserBenjamin C. Pierce, University of Pennsylvania.

HouseFW26, Computer Laboratory, William Gates Building.

ClockWednesday 10 September 2014, 13:00-14:00

From TLS to secure websites: the HTTPS landmine

UserAntoine Delignat-Lavaud, Inria Paris, team Prosecco (Programming Securely with Cryptography.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 09 September 2014, 14:00-15:00

Trust, Religion, and Tribalism: Reflections on the Sociological Data from the Balkans

UserGorazd Andrejč, Junior Research Fellow, Woolf Institute, Cambridge.

HouseFW26, Computer Laboratory, William Gates Building.

ClockTuesday 03 June 2014, 15:00-16:00

Security, Reliability and Backdoors

UserDr Sergei Skorobogatov, Security Group, University of Cambridge Computer Laboratory.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 13 May 2014, 15:00-16:00

Psychology of malware warnings

UserDavid Modic, Cambridge University.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 06 May 2014, 15:00-16:00

Protecting Programs During Resource Retrieval

UserProfessor Trent Jaeger, CSE Department, Pennsylvania State University.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 29 April 2014, 15:00-16:00

Website Fingerprinting

UserNikita Borisov, University of Illinois.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 22 April 2014, 15:00-16:00

Bitcoin: A Full Employment Act for security engineers?

UserJoseph Bonneau, Center For Information Technology Policy, Princeton.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 18 March 2014, 15:00-16:00

Introduction to DNSSEC

UserTony Finch, University of Cambridge Computing Service.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 25 February 2014, 15:00-16:00

On the (in)security of widely-used RFID access control systems

UserDr. Flavio D. Garcia, University of Birmingham.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 11 February 2014, 15:00-16:00

Reviewing Cybercrime; Epistemology, Political Economy and Models

UserDr Michael McGuire, University of Surrey.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 03 December 2013, 16:15-17:15

TESLA: Temporally-enhanced security logic assertions

UserJonathan Anderson, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 26 November 2013, 16:15-17:15

SCION: Scalability, Control, and Isolation On Next-Generation Networks

UserProf. Adrian Perrig, Department of Computer Science at the Swiss Federal Institute of Technology (ETH).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockMonday 18 November 2013, 14:00-15:00

In-depth crypto attacks: "It always takes two bugs"

UserKarsten Nohl, Security Research Labs.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockFriday 25 October 2013, 14:00-15:30

Psychology of scams

UserDavid Modic, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 22 October 2013, 16:15-17:15

TLS Security - Where Do We Stand?

UserKenny Paterson, Royal Holloway.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 15 October 2013, 16:15-17:15

Rendezvous: A search engine for binary code

UserWei Ming Khoo, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 14 May 2013, 16:15-17:15

An Updated Threat Model for Security Ceremonies

UserJean Martina (Federal University of Santa Catarina / Brazil).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 20 November 2012, 16:15-17:15

Exploring compartmentalisation hypotheses with SOAAP

UserKhilan Gudka (University of Cambridge).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 23 October 2012, 16:15-17:15

Analysis of FileVault 2: Apple's full disk encryption scheme

UserOmar Choudary (University of Cambridge).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 16 October 2012, 16:15-17:15

Microsoft Research Cambridge, public talks

Dynamically Enforcing Knowledge-based Security Policies

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attendin

UserMichael Hicks, University of Maryland.

HouseSmall lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockFriday 12 October 2012, 10:00-11:00

Technology Risk Management - Achilles Heels, Myths and Mirages

Note the change in timing

UserTony Chew (Monetary Authority of Singapore).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockThursday 04 October 2012, 17:00-18:00

Explorations of Science in Cyber Security

UserGreg Shannon (CERT and Carnegie Mellon University).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockMonday 01 October 2012, 15:00-16:00

Security Analysis of Industrial Control Systems

UserArthur Gervais (Aalto University).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 10 July 2012, 16:15-17:15

Computer Laboratory Systems Research Group Seminar

Towards Trustworthy Embedded Systems

UserGernot Heiser (University of New South Wales/NICTA).

HouseFW26, Computer Laboratory, William Gates Builiding.

ClockFriday 22 June 2012, 11:00-12:00

Some recent results on TLS and DTLS

UserKenny Paterson (Royal Holloway).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 29 May 2012, 16:15-17:15

New evidence on consumers’ willingness to pay for privacy

UserSören Preibusch (University of Cambridge).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 01 May 2012, 16:15-17:15

Microsoft Research Cambridge, public talks

Confining the Ghost in the Machine: Using Types to Secure JavaScript Sandboxing

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserShriram Krishnamurthi, Brown University.

HouseLarge lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockWednesday 18 April 2012, 10:30-11:30

Microsoft Research Cambridge, public talks

Efficient Cryptography for the Next Generation Secure Cloud

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserAlptekin Küpçü, Koç University.

HousePrimrose Room, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockTuesday 17 April 2012, 16:00-17:00

Microsoft Research Cambridge, public talks

The science of guessing

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserJoseph Bonneau (Cambridge University).

HouseSmall lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockThursday 05 April 2012, 09:30-10:30

Microsoft Research Cambridge, public talks

Non-Interactive Verifiable Computation

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserBryan Parno, Microsoft Research.

HouseSmall lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockWednesday 28 March 2012, 14:00-15:00

Trustworthy Medical Device Software

UserKevin Fu (University of Massachusetts Amherst).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 20 March 2012, 16:15-17:15

Microsoft Research Cambridge, public talks

Malleability in Modern Cryptography

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserMarkulf Kohlweiss, MSRC.

HouseLarge lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockWednesday 14 March 2012, 10:00-11:00

The Yin and Yang Sides of Embedded Security

UserChristof Paar (Ruhr University Bochum).

HouseSS03, Computer Laboratory, William Gates Building.

ClockTuesday 31 January 2012, 12:45-14:00

User choice of PINs and passphrases

UserJoseph Bonneau (University of Cambridge).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 24 January 2012, 16:15-17:15

Microsoft Research Cambridge, public talks

Homomorphic Encryption from Ring Learning with Errors

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserMichael Naehrig, Technische Universiteit Eindhoven.

HouseLarge lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockTuesday 10 January 2012, 10:00-11:00

Computer Laboratory Systems Research Group Seminar

Quantifying Location Privacy

UserGeorge Theodorakopoulos (EPFL, University of Derby).

HouseSS03, Computer Lab, William Gates Building.

ClockThursday 17 November 2011, 16:00-17:00

Facial Analysis for Lie Detection

UserHassan Ugail (University of Bradford).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 25 October 2011, 16:15-17:15

Building Trusted Systems with Protected Modules

UserBryan Parno (Microsoft Research).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockThursday 06 October 2011, 14:15-15:15

Computer Laboratory Systems Research Group Seminar

Twitter bots

UserMiranda Mowbray (HP Labs Bristol).

HouseFW26, Computer Laboratory, William Gates Builiding.

ClockThursday 29 September 2011, 16:00-17:00

Microsoft Research Cambridge, public talks

The IITM Model and its Application to the Analysis of Real-World Security Protocol

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserRalf Küsters, University of Trier.

HouseLarge lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockThursday 08 September 2011, 13:30-14:30

Evolutionary Software Repair

UserStephanie Forrest, University of New Mexico.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 19 July 2011, 16:15-17:15

Practical Linguistic Steganography using Synonym Substitution

UserChing-Yun (Frannie) Chang & Stephen Clark, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 17 May 2011, 16:15-17:15

Architectures for Practical Client-Side Security

UserVirgil Gligor, Carnegie Mellon University.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 03 May 2011, 15:45-16:45

CTSRD: Capability CPUs revisited

UserPeter Neumann, SRI International / Robert Watson, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 03 May 2011, 14:45-15:45

What is Software Assurance?

UserJohn Rushby, SRI International.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 12 April 2011, 16:15-17:15

Caveat coercitor: towards coercion-evident elections

UserMark Ryan (University of Birmingham).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 15 March 2011, 16:15-17:15

Computer Laboratory Systems Research Group Seminar

Promoting location privacy... one lie at a time

UserDaniele Quercia (University of Cambridge).

HouseSS03 of the Computer Lab.

ClockThursday 03 March 2011, 16:00-17:00

Reverse Engineering Malware

UserHassen Saidi, SRI International.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockThursday 09 December 2010, 14:15-15:15

Bumping attacks: the affordable way of obtaining chip secrets

UserSergei Skorobogatov - Computer Laboratory ( University of Cambridge).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 07 December 2010, 16:15-17:15

Physical Attacks on PIN Entry Devices

UserMatt Scott, ACI Worldwide.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 23 November 2010, 16:15-17:15

The distribution of different sources of malware

UserFrancis Turner, ThreatSTOP Inc..

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 16 November 2010, 16:15-17:15

Privacy preserving smart-metering

UserGeorge Danezis, Microsoft Research.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 09 November 2010, 16:15-17:15

Computer Laboratory Programming Research Group Seminar

Extracting the Semantic Signature of Malware, Metamorphic Viruses and Worms

UserRK Shyamasundar; Tata Institute of Fundamental Research, Mumbai.

HouseFW11, Computer Laboratory.

ClockFriday 08 October 2010, 14:00-15:00

Colour, usability and computer security

Note unusual time

UserJeff Yan, Newcastle University.

HouseRoom SS03, Computer Laboratory, William Gates Building.

ClockThursday 01 July 2010, 16:15-17:15

Internet Voting: Threat or Menace

UserJeremy Epstein, SRI International.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 27 April 2010, 16:15-17:15

Computer Laboratory Wednesday Seminars

Privacy in Advertising: Not all Adware is Badware

UserPaul Francis - MPI Kaiserslautern, Germany.

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 21 April 2010, 14:15-15:15

Computer Laboratory Wednesday Seminars

Aura: A Programming Language with Authorization and Audit

UserSteve Zdancewic - University of Pennsylvania, USA.

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 10 March 2010, 14:15-15:15

Darwin College Lecture Series

Risk, Security and Terrorism

UserProfessor Lucia Zedner, University of Oxford.

HouseLMH, Lady Mitchell Hall.

ClockFriday 19 February 2010, 17:30-18:30

Proactive Fraud Management over Financial Data Streams

UserPedro Sampaio, University of Manchester.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockThursday 21 January 2010, 14:15-15:15

The impact of incident vs. forensic response

UserAndrew Sheldon (Evidence Talks).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 19 January 2010, 16:15-17:15

Optimization and Incentives Seminar

Anonymity via networks of mixes

UserVenkat Anantharam, EECS Department, University of California Berkeley..

HouseMR5, CMS, Wilberforce Road, Cambridge, CB3 0WB.

ClockMonday 18 January 2010, 15:00-16:00

MPhil Mini-Symposium Security Talks

UserMPhil students, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockFriday 04 December 2009, 10:00-11:10

Surveillance in Speculative Fiction: Have Our Artists Been Sufficiently Imaginative?

UserRoger Clarke, University of New South Wales.

HouseFW11.

ClockMonday 02 November 2009, 14:00-15:00

Computer Laboratory Wednesday Seminars

Aggregated Security Monitoring in 10GB networks

UserNathan Macrides and Nick McKenzie - Security Engineering, RBS.

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 28 October 2009, 14:15-15:15

Whither Challenge Question Authentication?

UserMike Just, University of Edinburgh.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 12 May 2009, 16:15-17:15

A conversation with Phil Zimmermann

UserPhil Zimmerman.

HouseLecture Theatre 2.

ClockThursday 30 April 2009, 17:00-18:00

Bypassing Physical Security Systems

UserMarc Weber Tobias, Investigative Law Offices.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 28 April 2009, 16:15-17:15

Privacy Implications of Public Listings on Social Networks

UserJoseph Bonneau, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 24 March 2009, 16:15-17:15

Privacy-Preserving 802.11 Access-Point Discovery

UserJanne Lindqvist - Helsinki University of Technology, Finland.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 03 February 2009, 16:15-17:15

Computer Laboratory Wednesday Seminars

A Framework for the Analysis of Mix-Based Steganographic File Systems

UserClaudia Diaz - Department of Electrical Engineering (ESAT), K.U.Leuven, Belgium.

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 28 January 2009, 14:15-15:15

Hardware security: trends and pitfalls of the past decade

UserSergei Skorobogatov - Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 20 January 2009, 16:15-17:15

Identity Theft and the Mobile Device

UserAndy Jones - Head of Information Security Research, Centre for Information & Security Systems Research, BT Innovate.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 13 January 2009, 16:15-17:15

Bayesian Inference and Traffic Analysis

UserCarmela Troncoso, Microsoft Research Cambridge/KU Leuven(COSIC).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 09 December 2008, 16:15-17:15

Talking to strangers

UserBruce Christianson, University of Hertfordshire.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 02 December 2008, 16:15-17:15

Improving Tor using a TCP-over-DTLS Tunnel

UserJoel Reardon, University of Waterloo.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 04 November 2008, 16:15-17:45

Browsing with the enemy: a German view

Please note the extended duration.

UserKai Buchholz-Stepputtis and Boris Hemkemeier.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 21 October 2008, 16:15-17:45

Electronic health records: which is worse, the UK system or the US System?

Please note the unusual day

UserDeborah C. Peel, Patient Privacy Rights.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockFriday 05 September 2008, 16:00-17:00

Advances in Hash Cryptanalysis

UserChristian Rechberger, IAIK, Graz University of Technology.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 24 June 2008, 16:15-17:15

Computer Laboratory Wednesday Seminars

Copyright vs Community

Please note the extended duration

UserRichard Stallman, www.gnu.org.

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 30 April 2008, 14:15-16:00

Fighting online crime

Note unusual day

UserMikko Hyppönen, Chief Research Officer, F-Secure Corporation.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockWednesday 23 April 2008, 16:15-17:15

Process isolation for cloud computing using commodity operating systems

UserWenbo Mao, Director and Chief Engineer, EMC Research China.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 15 April 2008, 16:15-17:15

An Empirical Analysis of Phishing Attack and Defense

UserTyler Moore (Computer Laboratory, University of Cambridge).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 08 April 2008, 16:15-17:15

Minimal TCB Code Execution

UserJonathan M. McCune, Carnegie Mellon University.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 25 March 2008, 16:15-17:15

Is SSL provably secure ?

UserNigel Smart, Department of Computer Science, University of Bristol.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockFriday 22 February 2008, 16:00-17:00

Hot or Not: Fingerprinting hosts through clock skew

UserSteven J. Murdoch (Computer Laboratory, University of Cambridge).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 12 February 2008, 16:15-17:15

Computer Laboratory Wednesday Seminars

Defence against the Dark Arts

UserMike Prettejohn, Netcraft.

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 06 February 2008, 14:15-15:15

Exploiting Online Games

Note unusual time and room

UserGary McGraw, CTO, Cigital.

HouseRoom FW11, Computer Laboratory, William Gates Building.

ClockTuesday 29 January 2008, 10:30-11:30

Computer Laboratory Wednesday Seminars

Searching for Evil

UserRoss Anderson and Richard Clayton, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 16 January 2008, 14:15-15:15

Graphical passwords: some recent results

Note special time and day of week

UserJeff Yan, University of Newcastle.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockFriday 07 December 2007, 16:00-17:00

The Anti-Bank: the privatized delivery of social grants using biometric encrypted smart-cards in southern Africa

UserKeith Breckenridge, Professor of History and Internet Studies, University of KwaZulu-Natal, South Africa.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 04 December 2007, 16:15-17:15

Networked information processing and privacy in Japan

UserAndrew A. Adams, School of Systems Engineering, University of Reading.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 27 November 2007, 16:15-17:15

Authentication protocols based on human interaction in security pervasive computing

UserNguyen Hoang Long, Oxford University Computing Laboratory.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 13 November 2007, 16:15-17:15

Key amplification in unstructured networks

UserShishir Nagaraja, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 30 October 2007, 16:15-17:15

The economics of revealing and protecting private information: Evidence from human subject experiments and surveys

Note unusual day of the week

UserJens Grossklags, School of Information, University of California Berkeley.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockMonday 30 July 2007, 16:15-17:15

Computer Laboratory Wednesday Seminars

Smart-card based authentication on an insecure network

UserPeter Sweeney, Centre for Communication Systems Research, University of Surrey..

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 30 May 2007, 14:15-15:15

The commercial malware industry

UserPeter Gutmann, University of Auckland.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 01 May 2007, 16:15-17:15

Phishing tips and techniques: tackle, rigging, and how and when to phish

Note unusual time of talk in addition to our regularly scheduled one

UserPeter Gutmann, University of Auckland.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 01 May 2007, 14:15-15:15

Alternative security mechanisms for WiFi networks

UserDaniel Cvrcek, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 06 March 2007, 16:15-17:15

Power analysis attacks

UserElisabeth Oswald, Department of Computer Science, University of Bristol.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 27 February 2007, 16:15-17:15

Anonymity in the wild: Mixes on unstructured networks

UserShishir Nagaraja, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 13 February 2007, 16:15-17:15

Data sharing and privacy in multi-agency working

UserAdam Warren, Department of Information Science, Loughborough University.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 06 February 2007, 16:15-17:15

Privacy preserving censorship

UserYvo Desmedt, Department of Computer Science, University College London.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 23 January 2007, 16:15-17:15

Politics of Internet Security

UserRichard Allan, Cisco.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 21 November 2006, 16:15-17:15

Optically enhanced position-locked power analysis

UserSergei Skorobogatov, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 31 October 2006, 16:15-17:15

The Polygraph

Note unusual day of the week

UserMarc Weber Tobias, Investigative Law Offices.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockWednesday 18 October 2006, 16:15-17:15

Distance bounding protocols: Authentication logic analysis

Note unusual room, day and hour

UserCatherine Meadows, Naval Research Laboratory.

HouseLecture Theatre 1, Computer Laboratory, William Gates Building.

ClockFriday 06 October 2006, 16:00-17:00

Privacy preserving data mining in distributed databases

UserEhud Gudes, Department of Computer Science, Ben-Gurion University.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 26 September 2006, 16:15-17:15

Peer-to-peer network topologies and anonymity

UserNikita Borisov, Electrical and Computer Engineering Department, University of Illinois at Urbana-Champaign.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockFriday 08 September 2006, 16:00-17:00

Milk or wine: does software security improve with age?

UserAndy Ozment, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 25 July 2006, 16:15-17:15

Opening locks by bumping in five seconds or less: is it really a threat to physical security?

Note change from originally publicized time

UserMarc Weber Tobias, Investigative Law Offices.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 23 May 2006, 14:15-15:15

Network Security Monitoring

UserRichard Bejtlich, TaoSecurity.

HouseRoom FW11, Computer Laboratory, William Gates Building.

ClockFriday 19 May 2006, 16:00-17:00

An overview of vulnerability research and exploitation

UserPeter Winter-Smith and Chris Anley, NGS Software.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 16 May 2006, 16:15-17:15

On inverting the VMPC one-way function

UserKamil Kulesza, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 09 May 2006, 16:15-17:15

Enhancing Signature-based Collaborative Spam Detection

UserJeff Yan, University of Newcastle upon Tyne.

HouseFW11, Computer Laboratory, William Gates Building.

ClockFriday 31 March 2006, 16:00-17:00

Security Flaws in Tunnel Mode IPsec

UserKenny Paterson, Royal Holloway, University of London.

HouseFW11, Computer Laboratory, William Gates Building.

ClockTuesday 07 March 2006, 16:15-17:15

Hiding on an Ethernet

UserRichard Clayton, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 28 February 2006, 16:15-17:15

Covert channels in TCP/IP: attack and defence

UserSteven J. Murdoch, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 31 January 2006, 16:15-17:15

Please see above for contact details for this list.

 

© 2006-2017 Talks.cam, University of Cambridge. Contact Us | Help and Documentation | Privacy and Publicity