University of Cambridge > Talks.cam > Computer Laboratory Security Seminar

Computer Laboratory Security Seminar

Add to your list(s) Send you e-mail reminders Further detail
Subscribe using ical/vcal (Help)

Seminars organised by the Computer Laboratory’s Security Research Group.

More information, including past talks, is available at the Security Group’s seminar page.

Tell a friend about this list:

If you have a question about this list, please contact: Markus Kuhn; Hridoy Sankar Dutta; Alice Hutchings. If you have a question about a specific talk, click on that talk to find its organiser.

4 upcoming talks and 399 talks in the archive.

Characterizing Machine Unlearning through Definitions and Implementations

UserNicolas Papernot, University of Toronto and Vector Institute.

HouseWebinar & FW11, Computer Laboratory, William Gates Building..

ClockThursday 29 February 2024, 14:00-15:00

Two Sides of the Same Crime

UserMichael Dewar, Vice President for Data Science at Mastercard.

HouseWebinar & LT2, Computer Laboratory, William Gates Building..

ClockFriday 19 January 2024, 16:00-17:00

Securing Supply Chains with Compilers

UserNicholas Boucher, University of Cambridge.

HouseWebinar & LT2, Computer Laboratory, William Gates Building..

ClockTuesday 05 December 2023, 14:00-15:00

25 years of crypto wars and privacy tussles – where next?

UserRoss Anderson, Duncan Campbell, Ben Collier, Ahana Datta, Merlin Erroll, Gus Hosein, Julian Huppert, Jim Killock, Jen Persson, Sam Smith and Martyn Thomas.

HouseWebinar & LT2, Computer Laboratory, William Gates Building..

ClockThursday 30 November 2023, 16:00-18:00

Human-producible Adversarial Examples

UserDavid Khachaturov, University of Cambridge.

HouseWebinar & FW11, Computer Laboratory, William Gates Building..

ClockTuesday 28 November 2023, 14:00-15:00

Red teaming privacy-preserving systems using AI

UserYves-Alexandre de Montjoye, Imperial College London.

HouseWebinar & LT2, Computer Laboratory, William Gates Building..

ClockTuesday 14 November 2023, 14:00-15:00

CIA to AIC: Why Cyber Must Enable the Business

UserKeith A Price, Chief Security Officer, National Highways.

HouseWebinar & FW11, Computer Laboratory, William Gates Building..

ClockTuesday 17 October 2023, 14:00-15:00

A Tale of Two Internet (In)Security Problems

UserMichael Schapira, Hebrew University of Jerusalem.

HouseWebinar & FW26, Computer Laboratory, William Gates Building..

ClockTuesday 10 October 2023, 14:00-15:00

On the Insecurity of PLC Systems

UserEli Biham, Technion.

HouseWebinar & LT2, Computer Laboratory, William Gates Building..

ClockTuesday 19 September 2023, 14:00-15:00

A View of the Dark Web through the Lens of NLP and Language Modeling

UserYoungjin Jin, Korea Advanced Institute of Science & Technology (KAIST).

HouseWebinar - link on talks.cam page after 12 noon Tuesday.

ClockTuesday 27 June 2023, 14:00-15:00

The Unlearning Problem(s)

UserAnvith Thudi, University of Toronto.

HouseWebinar & LT2, Computer Laboratory, William Gates Building..

ClockTuesday 20 June 2023, 14:00-15:00

The Nym mixnet: Design and Evaluation

UserHarry Halpin & Ania Piotrowska, Nym Technologies.

HouseWebinar & SS03, Computer Laboratory, William Gates Building..

ClockTuesday 06 June 2023, 14:00-15:00

On the motivations and challenges of affiliates involved in cybercrime

UserMasarah Paquet-Clouston, Université de Montréal.

HouseWebinar - link on talks.cam page after 12 noon Tuesday.

ClockTuesday 28 February 2023, 14:00-15:00

A Sociotechnical Audit: Assessing Police use of Facial Recognition

Note unusual time

UserEvani Radiya-Dixit, Minderoo Centre for Tech & Democracy.

HouseWebinar - link on talks.cam page after 12 noon Tuesday.

ClockTuesday 13 December 2022, 16:00-17:00

Towards Meaningful Stochastic Defences in Machine Learning

UserIlia Shumailov, University of Oxford.

HouseWebinar & FW11, Computer Laboratory, William Gates Building..

ClockTuesday 15 November 2022, 14:00-15:00

Secure and efficient networks

UserOleh Stupak, University of Cambridge.

HouseWebinar & FW11, Computer Laboratory, William Gates Building..

ClockTuesday 25 October 2022, 14:00-15:00

Exploring Internet services mis-configuration at scale

UserDanny Willems and Gregory Boddin, LeakIX; Raphael Proust, Nomadic Labs.

HouseWebinar & FW11, Computer Laboratory, William Gates Building..

ClockFriday 10 June 2022, 16:00-17:00

Reward Sharing for Mixnets

UserClaudia Diaz, KU Leuven.

HouseWebinar - link on talks.cam page after 12 noon Tuesday.

ClockTuesday 07 June 2022, 14:00-15:00

VerLoc: Verifiable Localization in Decentralized Systems

UserKatharina Kohls, Radboud University.

HouseWebinar - link on talks.cam page after 12 noon Tuesday.

ClockTuesday 17 May 2022, 14:00-15:00

“You’re never left alone:” the use of digital technologies in domestic abuse

UserLisa Sugiura, Jason R.C. Nurse, Jacki Tapley and Chloe Hawkins.

HouseWebinar - link on talks.cam page after 12 noon Tuesday.

ClockTuesday 10 May 2022, 14:00-15:00

The gap between research and practice in authentication

UserArvind Narayanan, Princeton University.

HouseWebinar - link on talks.cam page after 12 noon Tuesday.

ClockTuesday 03 May 2022, 14:00-15:00

Attacking and Fixing the Bitcoin Network

UserMuoi Tran, National University of Singapore.

HouseWebinar - link on talks.cam page after 12 noon Tuesday.

ClockTuesday 26 April 2022, 14:00-15:00

Design rules and Maxims for insecurity engineering for lock designs

Note unusual time and location

UserMarc Weber Tobias, School of Engineering, University of Pittsburgh.

HouseWebinar & FW11, Computer Laboratory, William Gates Building..

ClockFriday 18 March 2022, 16:00-17:00

Sex, money, and the mating market: How big data helps us understand sexual politics

Note unusual time

UserKhandis Blake, University of Melbourne.

HouseWebinar - link on talks.cam page from Monday afternoon.

ClockTuesday 08 March 2022, 10:00-11:00

Machine Learning in context of Computer Security

UserIlia Shumailov, University of Cambridge.

HouseWebinar & LT2, Computer Laboratory, William Gates Building..

ClockTuesday 15 February 2022, 14:00-15:00

Trojan Source: Invisible Vulnerabilities

UserNicholas Boucher, University of Cambridge.

HouseWebinar & LT2, Computer Laboratory, William Gates Building..

ClockTuesday 08 February 2022, 14:00-15:00

Incident Response as a Lawyers' Service

UserDaniel Woods, University of Innsbruck, Austria.

HouseWebinar - link on talks.cam page after 12 noon Tuesday.

ClockTuesday 25 January 2022, 14:00-15:00

Hansa Market, Cyberbunker, and Encrochat: The Security Practices of Organized Crime

UserErik van de Sandt, Dutch National Police and University of Bristol.

HouseWebinar.

ClockFriday 14 January 2022, 15:00-16:00

Why Johnny doesn’t write secure software?

UserAwais Rashid, University of Bristol.

HouseWebinar.

ClockTuesday 07 December 2021, 15:00-16:00

Securing the Future: Futures Literacy in Cyber Security

UserGenevieve Liveley, University of Bristol.

HouseWebinar.

ClockTuesday 30 November 2021, 14:00-15:00

Teardown of encrypted USB Flash drives

UserSergei Skorobogatov, University of Cambridge.

HouseLT1, Computer Laboratory, William Gates Building..

ClockTuesday 23 November 2021, 14:00-15:00

Cybersecurity for Democracy: Providing Independent Auditing Frameworks for Platform Accountability

UserDamon McCoy, New York University.

HouseWebinar.

ClockTuesday 16 November 2021, 14:00-15:00

Blind Backdoors in Deep Learning

UserEugene Bagdasaryan, Cornell Tech.

HouseWebinar.

ClockTuesday 09 November 2021, 14:00-15:00

Computational Methods to Measure and Mitigate Weaponized Online Information

UserGianluca Stringhini, Boston University.

HouseWebinar.

ClockMonday 01 November 2021, 14:00-15:00

Super-Posters in Extremist Forums

UserStephane Baele, University of Exeter .

HouseWebinar - link on talks.cam page after 12 noon Tuesday.

ClockTuesday 12 October 2021, 14:00-15:00

It's not only the dark web: Distributed surface web marketplaces

UserConstantinos Patsakis, University of Piraeus.

HouseWebinar.

ClockTuesday 20 July 2021, 14:00-15:00

Apple, App Tracking Transparency, and the Hidden Costs of More Privacy

UserSam Gilbert, University of Cambridge.

HouseWebinar.

ClockTuesday 18 May 2021, 14:00-15:00

FastPay: High-Performance Byzantine Fault Tolerant Settlement

UserAlberto Sonnino, UCL.

HouseWebinar.

ClockTuesday 04 May 2021, 14:00-15:00

Dark web marketplaces and COVID-19: Flexible and resilient

UserAndrea Baronchelli, City University of London and The Alan Turing Institute.

HouseWebinar.

ClockTuesday 23 March 2021, 14:00-15:00

Understanding Modern Phishing

UserBrad Wardman and Adam Oest, PayPal.

HouseWebinar.

ClockTuesday 16 March 2021, 14:00-15:00

Deep Learning Assisted Side-Channel Attacks

UserElena Dubrova, KTH Royal Institute of Technology.

HouseWebinar.

ClockTuesday 09 March 2021, 14:00-15:00

Crowdsourcing Security Research: A case study of AdObserver

UserLaura Edelson and Damon McCoy, New York University.

HouseWebinar.

ClockTuesday 02 March 2021, 14:00-15:00

Dmitry goes to Hollywood: Criminal Excellence in (Cyber) La La Land

UserLuca Allodi, Eindhoven University of Technology.

HouseWebinar.

ClockTuesday 23 February 2021, 14:00-15:00

A Liar and a Copycat: Nonverbal Coordination Increases with Lie Difficulty

UserSophie van der Zee, Erasmus University Rotterdam.

HouseWebinar.

ClockTuesday 16 February 2021, 14:00-15:00

Cybersecurity Risk to Hospitals from Building Services

UserSheryn Gillin, University of Cambridge.

HouseWebinar.

ClockTuesday 09 February 2021, 14:00-15:00

Towards Provable Physical Safety Against False Actuation Attacks in CPS

UserAlvaro Cardenas, University of California, Santa Cruz.

HouseWebinar.

ClockTuesday 26 January 2021, 16:00-17:00

User Privacy Concerns and Preferences in Smart Buildings

UserMaryam Mehrnezhad, Newcastle University.

HouseWebinar.

ClockTuesday 01 December 2020, 13:00-14:00

Cultural Convergence in the time of COVID

UserAlicia Bargar and Erin McAweeney, Graphika.

HouseWebinar.

ClockTuesday 17 November 2020, 14:00-15:00

Hardware and Software Fingerprinting of Mobile Devices

UserJiexin (Stan) Zhang, University of Cambridge.

HouseWebinar.

ClockTuesday 10 November 2020, 13:00-14:00

SHB Seminar

UserMultiple Speakers.

HouseWebinar.

ClockThursday 05 November 2020, 14:00-16:00

Eavesdropping at Scale: Shifting the Threat Model in Satellite Broadband

UserJames Pavur, University of Oxford.

HouseWebinar.

ClockTuesday 03 November 2020, 14:00-15:00

Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble

UserKit Murdock, University of Birmingham.

HouseWebinar.

ClockTuesday 27 October 2020, 14:00-15:00

Sponge Examples: Energy-Latency Attacks on Neural Networks

UserIlia Shumailov, University of Cambridge.

HouseWebinar.

ClockTuesday 20 October 2020, 14:00-15:00

TRRespass: Exploiting the Many Sides of Target Row Refresh

UserKaveh Razavi, ETH Zurich.

HouseWebinar.

ClockTuesday 02 June 2020, 14:00-15:00

Collaborative Deanonymization

UserRainer Böhme, University of Innsbruck.

HouseWebinar.

ClockTuesday 26 May 2020, 14:00-15:00

Understanding Privacy-Related Questions on Stack Overflow

UserKami Vaniea, University of Edinburgh.

HouseWebinar.

ClockTuesday 19 May 2020, 14:00-15:00

The politics of data-driven governance

UserLina Dencik, Data Justice Lab, Cardiff University.

HouseWebinar.

ClockTuesday 12 May 2020, 14:00-15:00

Tech Abuse in the Intimate Partner Violence Setting: Issues, Challenges, and Mitigations

UserDamon McCoy, New York University.

HouseWebinar.

ClockTuesday 05 May 2020, 14:00-15:00

SEAL: sealed-bid auction without auctioneers

UserFeng Hao, Department of Computer Science, University of Warwick.

HouseWebinar.

ClockTuesday 28 April 2020, 14:00-15:00

Trustable Hardware as a TOCTOU Problem: Overview and Potential Remedies

UserDr. Andrew 'bunnie' Huang, Independent Researcher.

HouseWebinar.

ClockTuesday 21 April 2020, 14:00-15:00

Product Design, Liability, and Insecurity Engineering

UserMarc Weber Tobias, School of Engineering, University of Pittsburgh.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 25 February 2020, 14:00-15:00

Measuring Cryptocurrency Fraud

UserMarie Vasek, Department of Computer Science, UCL.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 18 February 2020, 14:00-15:00

Security economics to inform behaviour change support

UserSimon Parkin, Information Security Group, University College London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 28 January 2020, 14:00-15:00

It's Damn Hard to Decentralise the Web

UserGareth Tyson, School of Electronic Engineering and Computer Science, Queen Mary University of London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 21 January 2020, 14:00-15:00

Radio Protocol Vulnerabilities in 5G Networks

UserRavishankar Borgaonkar, SINTEF Digital.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 19 November 2019, 14:00-15:00

Realistic Adversarial Machine Learning

UserNicholas Carlini, Google Brain.

HouseLT2, Computer Laboratory, William Gates Building.

ClockMonday 11 November 2019, 13:00-14:00

Automatically Dismantling Online Dating Fraud

UserMatthew Edwards, Faculty of Engineering, University of Bristol.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 29 October 2019, 14:00-15:00

Reducing Metadata Leakage from Encrypted Files and Communication

UserNikitin Kirill, Decentralized/Distributed Systems Lab, EPFL.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 15 October 2019, 14:00-15:00

An analysis of the threats of the consumer spyware industry

UserDiarmaid Harkin, Alfred Deakin Institute, Deakin University.

HouseLT2, Computer Laboratory, William Gates Building.

ClockThursday 12 September 2019, 14:00-15:00

Deploying Differential Privacy for the 2020 Census of Population and Housing

UserSimson L. Garfinkel, Senior Computer Scientist for Confidentiality and Data Access, U.S. Census Bureau.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 23 July 2019, 14:00-15:00

A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions

UserAlisa Frik, International Computer Science Institute (ICSI), University of California Berkeley.

HouseLT1, Computer Laboratory, William Gates Building.

ClockTuesday 30 April 2019, 14:00-15:00

Securing Systems with Insecure Hardware

UserKaveh Razavi, Systems and Network Security Group, Vrije Universiteit Amsterdam.

HouseLT2, Computer Laboratory, William Gates Building.

ClockThursday 21 March 2019, 14:00-15:00

Keeping authorities honest with verifiable append-only logs, and making backdoored software updates detectable

UserMustafa Al Bassam, Department of Computer Science, University College London (UCL).

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 29 January 2019, 14:00-15:00

Evil on the Internet

UserRichard Clayton, Computer Laboratory, University of Cambridge.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 22 January 2019, 14:00-16:00

Trustworthy and Accountable Function-as-a-Service using Intel SGX

UserAndrew Paverd, Microsoft Research Cambridge.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 15 January 2019, 14:00-15:00

Function-Based Access Control

UserYvo G. Desmedt, Department of Computer Science, University of Texas at Dallas.

HouseFW11, Computer Laboratory, William Gates Building.

ClockTuesday 04 December 2018, 16:00-17:00

The ideal versus the real: A brief history of secure isolation in virtual machines and containers

UserAllison Randal, Computer Laboratory, University of Cambridge.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 27 November 2018, 14:00-15:00

Displacing big data: How cybercriminals cheat the system

UserAlice Hutchings, Computer Laboratory, University of Cambridge.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 13 November 2018, 14:00-15:00

You think you're not a target? A tale of three developers

UserChris Lamb, Debian Project Leader.

HouseFW26, Computer Laboratory, William Gates Building.

ClockTuesday 06 November 2018, 14:00-15:00

The Guardian Council: Using many-core architectures to support programmable hardware security

UserSam Ainsworth, Computer Laboratory, University of Cambridge.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 30 October 2018, 14:00-15:00

Combating a hydra: Islamic State's digital jihad as a threat to international security

UserMiron Lakomy, Department of International Relations, University of Silesia.

HouseLT2, Computer Laboratory, William Gates Building.

ClockMonday 16 July 2018, 15:00-16:00

Detecting Spies in Sensor-Rich Environments using Cyber-Physical Correlation

UserBrent Lagesse, University of Washington Bothell (visiting Cambridge as a Fulbright Scholar).

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 22 May 2018, 14:00-15:00

Ethical Issues in Network Measurement

UserShehar Bano, Dept. of Computer Science, University College London (UCL).

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 15 May 2018, 14:00-15:00

Data science approaches to understanding key actors on online hacking forums

UserSergio Pastrana/Andrew Caines, Computer Laboratory, University of Cambridge.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 08 May 2018, 14:00-15:00

Wireless Physical-layer Security: Fundamentals and Jamming with Coding for Secrecy

UserJoão P. Vilela, Informatics Engineering, University of Coimbra.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 27 March 2018, 14:00-15:00

Large Scale Ubiquitous Data Sources for Crime Prediction

UserCristina Kadar, ETH Zurich.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 20 February 2018, 14:00-15:00

Psychological predictors of risky online behaviour: The cases of online piracy and privacy

UserPiers Fleming, School of Psychology, University of East Anglia.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 06 February 2018, 15:00-16:00

Anonymity in Cryptocurrencies

UserSarah Meiklejohn, Information Security Group, University College London (UCL).

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 30 January 2018, 14:00-15:00

Bayes, not Naive: Security Bounds on Website Fingerprinting Defenses

UserGiovanni Cherubin, Information Security Group (ISG), Royal Holloway, University of London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 28 November 2017, 14:00-15:00

Analysis and Classification of Android Malware

UserLorenzo Cavallaro, Information Security Group (ISG), Royal Holloway, University of London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 10 October 2017, 14:00-15:00

Conditional Linear Cryptanalysis

UserEli Biham, Computer Science Department, Technion - Israel Institute of Technology.

HouseLT2, Computer Laboratory, William Gates Building.

ClockWednesday 04 October 2017, 14:00-15:00

Protecting Analog Sensor Security

UserKevin Fu, Associate Professor in Electrical Engineering and Computer Science, University of Michigan.

HouseLT2, Computer Laboratory, William Gates Building.

ClockThursday 28 September 2017, 14:00-15:00

abraCARDabra: understanding carding forums

UserJeremiah Onaolapo, University College London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 27 June 2017, 14:00-15:00

Improving the Impact of Smartphone Apps

UserVincent Taylor, University of Oxford.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 23 May 2017, 14:00-15:00

Free-Form Gesture Passwords: Security, Memorability, Usability

UserJanne Lindqvist, assistant professor of electrical and computer engineering, Rutgers University.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 28 March 2017, 14:00-15:00

On the Privacy and Security of the Ultrasound Ecosystem

UserVasilios Mavroudis, University College London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 21 February 2017, 14:00-15:00

Trends in Online Payment Security

UserMohammed Aamir Ali, Newcastle University.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 17 January 2017, 14:00-15:00

Reversing chip design for hardware security characterization

UserFranck Courbon, Security group, University of Cambridge.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 29 November 2016, 14:00-15:00

Drammer: Deterministic Rowhammer Attacks on Mobile Platforms

UserKaveh Razavi, Vrije Universiteit Amsterdam.

HouseRoom SS03, Computer Laboratory, William Gates Building.

ClockFriday 04 November 2016, 13:15-14:15

Wednesday Seminars - Department of Computer Science and Technology

End-to-end encryption: Behind the scenes

UserD Vasile, M Kleppmann & D Thomas - University of Cambridge Computer Laboratory.

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 26 October 2016, 16:15-17:15

Putting wireless signal security in a system security context

note unusual date

UserWade Trappe, Rutgers University.

HouseLT2, Computer Laboratory, William Gates Building.

ClockFriday 21 October 2016, 14:00-15:00

Computer Laboratory Computer Architecture Group Meeting

Design for Security Test against Fault Injection Attack, and Fast Test with Compressive Sensing

Note unusual time and venue. Talk follows 14:00 to 14:45 talk.

UserProf Huiyun Li, Shenzhen Institutes of Advanced Technology.

HouseLecture Theatre 1, Computer Laboratory.

ClockTuesday 02 August 2016, 14:45-15:30

Cyberinsurance: good for your company, bad for your country?

UserFabio Massacci - University of Trento.

HouseRoom FW26, Computer Laboratory, William Gates Building.

ClockTuesday 21 June 2016, 14:00-15:00

Understanding, Characterizing, and Detecting Facebook Like Farms

UserDr. Emiliano De Cristofaro, Senior Lecturer (Associate Professor), University College London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 22 March 2016, 14:00-15:00

Do You See What I See? Differential Treatment of Anonymous Users

UserSheharbano Khattak, University of Cambridge.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 16 February 2016, 14:00-15:00

The Unfalsifiability of security claims

UserCormac Herley, Microsoft Research, Redmond.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 09 February 2016, 14:00-15:00

Android security: Protecting users, a billion at a time

UserAdrian Ludwig, Android Security Team.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 24 November 2015, 14:00-15:00

Technical Talks - Department of Computer Science and Technology

nShield HSMs

Food provided so please register for the talk so that we can gauge numbers.

UserRichard Kettlewell, Thales.

HouseFW26, Computer Laboratory.

ClockMonday 26 October 2015, 13:00-13:30

Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer

UserFlavio Garcia, University of Birmingham.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 13 October 2015, 14:00-15:00

Massively Parallel Hardware Security Platform

UserPetr Svenda, Masaryk University, Czech Republic.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 28 July 2015, 14:00-15:00

Making Better Privacy Decisions in Ubiquitous Computing Environments

UserSerge Egelman, International Computer Science Institute (ICSI) and Department of Electrical Engineering and Computer Sciences (EECS) at the University of California, Berkeley.

HouseRoom FW26, Computer Laboratory, William Gates Building.

ClockFriday 26 June 2015, 14:00-15:00

Massively Parallel Hardware Security Platform

UserPetr Svenda, Masaryk University, Czech Republic.

HouseLT2, Computer Laboratory, William Gates Building.

ClockThursday 28 May 2015, 14:00-15:00

Captchas - the state of play

UserDr Jeff Yan, Newcastle University.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 28 April 2015, 14:00-15:00

Understanding and Fighting Malicious Activity on Online Social Networks

UserGianluca Stringhini, Assistant Professor, University College London.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 21 April 2015, 14:00-15:00

Chupja--PHY Covert Channels: Can you see the Idles?

UserHakim Weatherspoon, assistant professor, Department of Computer Science, Cornell University.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 31 March 2015, 14:00-15:00

Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation

UserNathan Dautenhahn, University of Illinois at Urbana-Champaign.

HouseLT2, Computer Laboratory, William Gates Building.

ClockTuesday 10 March 2015, 14:00-15:00

Human factors and missed solutions to WWII Enigma design weaknesses

UserProf. Harold Thimbleby CEng FIET FRCPE FLSW HonFRSA HonFRCP.

HouseLT2, Computer Laboratory, William Gates Building.

ClockThursday 05 February 2015, 14:00-15:00

Single Password Authentication

UserAlptekin Küpçü, Assistant Professor, Cryptography, Security & Privacy Research Group, Koç University.

HouseFW11, Computer Laboratory, William Gates Building.

ClockTuesday 13 January 2015, 14:00-15:00

Cloud-centric assured information sharing

User Dr. Bhavani Thuraisingham, Executive Director of the Cyber Security Research Institute, The University of Texas at Dallas.

HouseFW11, Computer Laboratory, William Gates Building.

ClockThursday 27 November 2014, 11:00-12:00

Hacking is not random: a case-control study of webserver-compromise risk

UserMarie Vasek, PhD student in the Computer Science and Engineering department, Southern Methodist University (SMU).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockWednesday 19 November 2014, 15:05-16:05

Bitcoin as a source of verifiable public randomness

UserJoseph Bonneau, Center For Information Technology Policy, Princeton.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 30 September 2014, 14:00-15:00

DP5: Privacy-preserving Presence Protocols

UserIan Goldberg, University of Waterloo [currently on sabbatical at the University of Cambridge].

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 23 September 2014, 14:00-15:00

Micro-Policies: A Framework for Tag-Based Security Monitors

UserBenjamin C. Pierce, University of Pennsylvania.

HouseFW26, Computer Laboratory, William Gates Building.

ClockWednesday 10 September 2014, 13:00-14:00

From TLS to secure websites: the HTTPS landmine

UserAntoine Delignat-Lavaud, Inria Paris, team Prosecco (Programming Securely with Cryptography.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 09 September 2014, 14:00-15:00

Trust, Religion, and Tribalism: Reflections on the Sociological Data from the Balkans

UserGorazd Andrejč, Junior Research Fellow, Woolf Institute, Cambridge.

HouseFW26, Computer Laboratory, William Gates Building.

ClockTuesday 03 June 2014, 15:00-16:00

Security, Reliability and Backdoors

UserDr Sergei Skorobogatov, Security Group, University of Cambridge Computer Laboratory.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 13 May 2014, 15:00-16:00

Psychology of malware warnings

UserDavid Modic, Cambridge University.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 06 May 2014, 15:00-16:00

Protecting Programs During Resource Retrieval

UserProfessor Trent Jaeger, CSE Department, Pennsylvania State University.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 29 April 2014, 15:00-16:00

Website Fingerprinting

UserNikita Borisov, University of Illinois.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 22 April 2014, 15:00-16:00

Bitcoin: A Full Employment Act for security engineers?

UserJoseph Bonneau, Center For Information Technology Policy, Princeton.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 18 March 2014, 15:00-16:00

Introduction to DNSSEC

UserTony Finch, University of Cambridge Computing Service.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 25 February 2014, 15:00-16:00

On the (in)security of widely-used RFID access control systems

UserDr. Flavio D. Garcia, University of Birmingham.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 11 February 2014, 15:00-16:00

Reviewing Cybercrime; Epistemology, Political Economy and Models

UserDr Michael McGuire, University of Surrey.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 03 December 2013, 16:15-17:15

TESLA: Temporally-enhanced security logic assertions

UserJonathan Anderson, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 26 November 2013, 16:15-17:15

SCION: Scalability, Control, and Isolation On Next-Generation Networks

UserProf. Adrian Perrig, Department of Computer Science at the Swiss Federal Institute of Technology (ETH).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockMonday 18 November 2013, 14:00-15:00

In-depth crypto attacks: "It always takes two bugs"

UserKarsten Nohl, Security Research Labs.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockFriday 25 October 2013, 14:00-15:30

Psychology of scams

UserDavid Modic, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 22 October 2013, 16:15-17:15

TLS Security - Where Do We Stand?

UserKenny Paterson, Royal Holloway.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 15 October 2013, 16:15-17:15

Rendezvous: A search engine for binary code

UserWei Ming Khoo, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 14 May 2013, 16:15-17:15

An Updated Threat Model for Security Ceremonies

UserJean Martina (Federal University of Santa Catarina / Brazil).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 20 November 2012, 16:15-17:15

Exploring compartmentalisation hypotheses with SOAAP

UserKhilan Gudka (University of Cambridge).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 23 October 2012, 16:15-17:15

Analysis of FileVault 2: Apple's full disk encryption scheme

UserOmar Choudary (University of Cambridge).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 16 October 2012, 16:15-17:15

Microsoft Research Cambridge, public talks

Dynamically Enforcing Knowledge-based Security Policies

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attendin

UserMichael Hicks, University of Maryland.

HouseSmall lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockFriday 12 October 2012, 10:00-11:00

Technology Risk Management - Achilles Heels, Myths and Mirages

Note the change in timing

UserTony Chew (Monetary Authority of Singapore).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockThursday 04 October 2012, 17:00-18:00

Explorations of Science in Cyber Security

UserGreg Shannon (CERT and Carnegie Mellon University).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockMonday 01 October 2012, 15:00-16:00

Security Analysis of Industrial Control Systems

UserArthur Gervais (Aalto University).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 10 July 2012, 16:15-17:15

Computer Laboratory Systems Research Group Seminar

Towards Trustworthy Embedded Systems

UserGernot Heiser (University of New South Wales/NICTA).

HouseFW26, Computer Laboratory, William Gates Builiding.

ClockFriday 22 June 2012, 11:00-12:00

Some recent results on TLS and DTLS

UserKenny Paterson (Royal Holloway).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 29 May 2012, 16:15-17:15

New evidence on consumers’ willingness to pay for privacy

UserSören Preibusch (University of Cambridge).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 01 May 2012, 16:15-17:15

Microsoft Research Cambridge, public talks

Confining the Ghost in the Machine: Using Types to Secure JavaScript Sandboxing

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserShriram Krishnamurthi, Brown University.

HouseLarge lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockWednesday 18 April 2012, 10:30-11:30

Microsoft Research Cambridge, public talks

Efficient Cryptography for the Next Generation Secure Cloud

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserAlptekin Küpçü, Koç University.

HousePrimrose Room, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockTuesday 17 April 2012, 16:00-17:00

Microsoft Research Cambridge, public talks

The science of guessing

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserJoseph Bonneau (Cambridge University).

HouseSmall lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockThursday 05 April 2012, 09:30-10:30

Microsoft Research Cambridge, public talks

Non-Interactive Verifiable Computation

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserBryan Parno, Microsoft Research.

HouseSmall lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockWednesday 28 March 2012, 14:00-15:00

Trustworthy Medical Device Software

UserKevin Fu (University of Massachusetts Amherst).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 20 March 2012, 16:15-17:15

Microsoft Research Cambridge, public talks

Malleability in Modern Cryptography

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserMarkulf Kohlweiss, MSRC.

HouseLarge lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockWednesday 14 March 2012, 10:00-11:00

The Yin and Yang Sides of Embedded Security

UserChristof Paar (Ruhr University Bochum).

HouseSS03, Computer Laboratory, William Gates Building.

ClockTuesday 31 January 2012, 12:45-14:00

User choice of PINs and passphrases

UserJoseph Bonneau (University of Cambridge).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 24 January 2012, 16:15-17:15

Microsoft Research Cambridge, public talks

Homomorphic Encryption from Ring Learning with Errors

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserMichael Naehrig, Technische Universiteit Eindhoven.

HouseLarge lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockTuesday 10 January 2012, 10:00-11:00

Computer Laboratory Systems Research Group Seminar

Quantifying Location Privacy

UserGeorge Theodorakopoulos (EPFL, University of Derby).

HouseSS03, Computer Lab, William Gates Building.

ClockThursday 17 November 2011, 16:00-17:00

Facial Analysis for Lie Detection

UserHassan Ugail (University of Bradford).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 25 October 2011, 16:15-17:15

Building Trusted Systems with Protected Modules

UserBryan Parno (Microsoft Research).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockThursday 06 October 2011, 14:15-15:15

Computer Laboratory Systems Research Group Seminar

Twitter bots

UserMiranda Mowbray (HP Labs Bristol).

HouseFW26, Computer Laboratory, William Gates Builiding.

ClockThursday 29 September 2011, 16:00-17:00

Microsoft Research Cambridge, public talks

The IITM Model and its Application to the Analysis of Real-World Security Protocol

This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending

UserRalf Küsters, University of Trier.

HouseLarge lecture theatre, Microsoft Research Ltd, 7 J J Thomson Avenue (Off Madingley Road), Cambridge.

ClockThursday 08 September 2011, 13:30-14:30

Evolutionary Software Repair

UserStephanie Forrest, University of New Mexico.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 19 July 2011, 16:15-17:15

Practical Linguistic Steganography using Synonym Substitution

UserChing-Yun (Frannie) Chang & Stephen Clark, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 17 May 2011, 16:15-17:15

Architectures for Practical Client-Side Security

UserVirgil Gligor, Carnegie Mellon University.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 03 May 2011, 15:45-16:45

CTSRD: Capability CPUs revisited

UserPeter Neumann, SRI International / Robert Watson, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 03 May 2011, 14:45-15:45

What is Software Assurance?

UserJohn Rushby, SRI International.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 12 April 2011, 16:15-17:15

Caveat coercitor: towards coercion-evident elections

UserMark Ryan (University of Birmingham).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 15 March 2011, 16:15-17:15

Computer Laboratory Systems Research Group Seminar

Promoting location privacy... one lie at a time

UserDaniele Quercia (University of Cambridge).

HouseSS03 of the Computer Lab.

ClockThursday 03 March 2011, 16:00-17:00

Reverse Engineering Malware

UserHassen Saidi, SRI International.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockThursday 09 December 2010, 14:15-15:15

Bumping attacks: the affordable way of obtaining chip secrets

UserSergei Skorobogatov - Computer Laboratory ( University of Cambridge).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 07 December 2010, 16:15-17:15

Physical Attacks on PIN Entry Devices

UserMatt Scott, ACI Worldwide.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 23 November 2010, 16:15-17:15

The distribution of different sources of malware

UserFrancis Turner, ThreatSTOP Inc..

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 16 November 2010, 16:15-17:15

Privacy preserving smart-metering

UserGeorge Danezis, Microsoft Research.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 09 November 2010, 16:15-17:15

Computer Laboratory Programming Research Group Seminar

Extracting the Semantic Signature of Malware, Metamorphic Viruses and Worms

UserRK Shyamasundar; Tata Institute of Fundamental Research, Mumbai.

HouseFW11, Computer Laboratory.

ClockFriday 08 October 2010, 14:00-15:00

Colour, usability and computer security

Note unusual time

UserJeff Yan, Newcastle University.

HouseRoom SS03, Computer Laboratory, William Gates Building.

ClockThursday 01 July 2010, 16:15-17:15

Internet Voting: Threat or Menace

UserJeremy Epstein, SRI International.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 27 April 2010, 16:15-17:15

Darwin College Lecture Series

Risk, Security and Terrorism

UserProfessor Lucia Zedner, University of Oxford.

HouseLMH, Lady Mitchell Hall.

ClockFriday 19 February 2010, 17:30-18:30

Proactive Fraud Management over Financial Data Streams

UserPedro Sampaio, University of Manchester.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockThursday 21 January 2010, 14:15-15:15

The impact of incident vs. forensic response

UserAndrew Sheldon (Evidence Talks).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 19 January 2010, 16:15-17:15

Optimization and Incentives Seminar

Anonymity via networks of mixes

UserVenkat Anantharam, EECS Department, University of California Berkeley..

HouseMR5, CMS, Wilberforce Road, Cambridge, CB3 0WB.

ClockMonday 18 January 2010, 15:00-16:00

MPhil Mini-Symposium Security Talks

UserMPhil students, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockFriday 04 December 2009, 10:00-11:10

Surveillance in Speculative Fiction: Have Our Artists Been Sufficiently Imaginative?

UserRoger Clarke, University of New South Wales.

HouseFW11.

ClockMonday 02 November 2009, 14:00-15:00

Wednesday Seminars - Department of Computer Science and Technology

Aggregated Security Monitoring in 10GB networks

UserNathan Macrides and Nick McKenzie - Security Engineering, RBS.

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 28 October 2009, 14:15-15:15

Whither Challenge Question Authentication?

UserMike Just, University of Edinburgh.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 12 May 2009, 16:15-17:15

A conversation with Phil Zimmermann

UserPhil Zimmerman.

HouseLecture Theatre 2.

ClockThursday 30 April 2009, 17:00-18:00

Bypassing Physical Security Systems

UserMarc Weber Tobias, Investigative Law Offices.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 28 April 2009, 16:15-17:15

Privacy Implications of Public Listings on Social Networks

UserJoseph Bonneau, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 24 March 2009, 16:15-17:15

Privacy-Preserving 802.11 Access-Point Discovery

UserJanne Lindqvist - Helsinki University of Technology, Finland.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 03 February 2009, 16:15-17:15

Wednesday Seminars - Department of Computer Science and Technology

A Framework for the Analysis of Mix-Based Steganographic File Systems

UserClaudia Diaz - Department of Electrical Engineering (ESAT), K.U.Leuven, Belgium.

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 28 January 2009, 14:15-15:15

Hardware security: trends and pitfalls of the past decade

UserSergei Skorobogatov - Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 20 January 2009, 16:15-17:15

Identity Theft and the Mobile Device

UserAndy Jones - Head of Information Security Research, Centre for Information & Security Systems Research, BT Innovate.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 13 January 2009, 16:15-17:15

Bayesian Inference and Traffic Analysis

UserCarmela Troncoso, Microsoft Research Cambridge/KU Leuven(COSIC).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 09 December 2008, 16:15-17:15

Talking to strangers

UserBruce Christianson, University of Hertfordshire.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 02 December 2008, 16:15-17:15

Improving Tor using a TCP-over-DTLS Tunnel

UserJoel Reardon, University of Waterloo.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 04 November 2008, 16:15-17:45

Browsing with the enemy: a German view

Please note the extended duration.

UserKai Buchholz-Stepputtis and Boris Hemkemeier.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 21 October 2008, 16:15-17:45

Electronic health records: which is worse, the UK system or the US System?

Please note the unusual day

UserDeborah C. Peel, Patient Privacy Rights.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockFriday 05 September 2008, 16:00-17:00

Advances in Hash Cryptanalysis

UserChristian Rechberger, IAIK, Graz University of Technology.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 24 June 2008, 16:15-17:15

Wednesday Seminars - Department of Computer Science and Technology

Copyright vs Community

Please note the extended duration

UserRichard Stallman, www.gnu.org.

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 30 April 2008, 14:15-16:00

Fighting online crime

Note unusual day

UserMikko Hyppönen, Chief Research Officer, F-Secure Corporation.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockWednesday 23 April 2008, 16:15-17:15

Process isolation for cloud computing using commodity operating systems

UserWenbo Mao, Director and Chief Engineer, EMC Research China.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 15 April 2008, 16:15-17:15

An Empirical Analysis of Phishing Attack and Defense

UserTyler Moore (Computer Laboratory, University of Cambridge).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 08 April 2008, 16:15-17:15

Minimal TCB Code Execution

UserJonathan M. McCune, Carnegie Mellon University.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 25 March 2008, 16:15-17:15

Is SSL provably secure ?

UserNigel Smart, Department of Computer Science, University of Bristol.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockFriday 22 February 2008, 16:00-17:00

Hot or Not: Fingerprinting hosts through clock skew

UserSteven J. Murdoch (Computer Laboratory, University of Cambridge).

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 12 February 2008, 16:15-17:15

Exploiting Online Games

Note unusual time and room

UserGary McGraw, CTO, Cigital.

HouseRoom FW11, Computer Laboratory, William Gates Building.

ClockTuesday 29 January 2008, 10:30-11:30

Wednesday Seminars - Department of Computer Science and Technology

Searching for Evil

UserRoss Anderson and Richard Clayton, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 16 January 2008, 14:15-15:15

Graphical passwords: some recent results

Note special time and day of week

UserJeff Yan, University of Newcastle.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockFriday 07 December 2007, 16:00-17:00

The Anti-Bank: the privatized delivery of social grants using biometric encrypted smart-cards in southern Africa

UserKeith Breckenridge, Professor of History and Internet Studies, University of KwaZulu-Natal, South Africa.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 04 December 2007, 16:15-17:15

Networked information processing and privacy in Japan

UserAndrew A. Adams, School of Systems Engineering, University of Reading.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 27 November 2007, 16:15-17:15

Authentication protocols based on human interaction in security pervasive computing

UserNguyen Hoang Long, Oxford University Computing Laboratory.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 13 November 2007, 16:15-17:15

Key amplification in unstructured networks

UserShishir Nagaraja, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 30 October 2007, 16:15-17:15

The economics of revealing and protecting private information: Evidence from human subject experiments and surveys

Note unusual day of the week

UserJens Grossklags, School of Information, University of California Berkeley.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockMonday 30 July 2007, 16:15-17:15

Wednesday Seminars - Department of Computer Science and Technology

Smart-card based authentication on an insecure network

UserPeter Sweeney, Centre for Communication Systems Research, University of Surrey..

HouseLecture Theatre 1, Computer Laboratory.

ClockWednesday 30 May 2007, 14:15-15:15

The commercial malware industry

UserPeter Gutmann, University of Auckland.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 01 May 2007, 16:15-17:15

Phishing tips and techniques: tackle, rigging, and how and when to phish

Note unusual time of talk in addition to our regularly scheduled one

UserPeter Gutmann, University of Auckland.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 01 May 2007, 14:15-15:15

Alternative security mechanisms for WiFi networks

UserDaniel Cvrcek, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 06 March 2007, 16:15-17:15

Power analysis attacks

UserElisabeth Oswald, Department of Computer Science, University of Bristol.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 27 February 2007, 16:15-17:15

Anonymity in the wild: Mixes on unstructured networks

UserShishir Nagaraja, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 13 February 2007, 16:15-17:15

Data sharing and privacy in multi-agency working

UserAdam Warren, Department of Information Science, Loughborough University.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 06 February 2007, 16:15-17:15

Privacy preserving censorship

UserYvo Desmedt, Department of Computer Science, University College London.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 23 January 2007, 16:15-17:15

Politics of Internet Security

UserRichard Allan, Cisco.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 21 November 2006, 16:15-17:15

Optically enhanced position-locked power analysis

UserSergei Skorobogatov, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 31 October 2006, 16:15-17:15

The Polygraph

Note unusual day of the week

UserMarc Weber Tobias, Investigative Law Offices.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockWednesday 18 October 2006, 16:15-17:15

Distance bounding protocols: Authentication logic analysis

Note unusual room, day and hour

UserCatherine Meadows, Naval Research Laboratory.

HouseLecture Theatre 1, Computer Laboratory, William Gates Building.

ClockFriday 06 October 2006, 16:00-17:00

Privacy preserving data mining in distributed databases

UserEhud Gudes, Department of Computer Science, Ben-Gurion University.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 26 September 2006, 16:15-17:15

Peer-to-peer network topologies and anonymity

UserNikita Borisov, Electrical and Computer Engineering Department, University of Illinois at Urbana-Champaign.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockFriday 08 September 2006, 16:00-17:00

Milk or wine: does software security improve with age?

UserAndy Ozment, Computer Laboratory, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 25 July 2006, 16:15-17:15

Opening locks by bumping in five seconds or less: is it really a threat to physical security?

Note change from originally publicized time

UserMarc Weber Tobias, Investigative Law Offices.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 23 May 2006, 14:15-15:15

Network Security Monitoring

UserRichard Bejtlich, TaoSecurity.

HouseRoom FW11, Computer Laboratory, William Gates Building.

ClockFriday 19 May 2006, 16:00-17:00

An overview of vulnerability research and exploitation

UserPeter Winter-Smith and Chris Anley, NGS Software.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 16 May 2006, 16:15-17:15

On inverting the VMPC one-way function

UserKamil Kulesza, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 09 May 2006, 16:15-17:15

Enhancing Signature-based Collaborative Spam Detection

UserJeff Yan, University of Newcastle upon Tyne.

HouseFW11, Computer Laboratory, William Gates Building.

ClockFriday 31 March 2006, 16:00-17:00

Security Flaws in Tunnel Mode IPsec

UserKenny Paterson, Royal Holloway, University of London.

HouseFW11, Computer Laboratory, William Gates Building.

ClockTuesday 07 March 2006, 16:15-17:15

Hiding on an Ethernet

UserRichard Clayton, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 28 February 2006, 16:15-17:15

Covert channels in TCP/IP: attack and defence

UserSteven J. Murdoch, University of Cambridge.

HouseLecture Theatre 2, Computer Laboratory, William Gates Building.

ClockTuesday 31 January 2006, 16:15-17:15

Please see above for contact details for this list.

 

© 2006-2024 Talks.cam, University of Cambridge. Contact Us | Help and Documentation | Privacy and Publicity