Friday 22 September 2006

Joseph Bonneau, Stanford University
Cache collision timing attacks against AES

Friday 27 October 2006

Steven J. Murdoch (Computer Laboratory, University of Cambridge)
Hot or Not: Revealing Hidden Services by their Clock Skew Practice talk for ACM CCS

Friday 17 November 2006

Ford Long Wong
Identity-based and inter-domain password authenticated key exchange for pervasive systems

Friday 24 November 2006

JoonWoong Kim, Computer Laboratory
Towards a security policy for ubiquitous healthcare systems

Thursday 01 March 2007

Jean-Pierre Hubaux, EPFL
Securing vehicular networks

Friday 13 April 2007

Marcus Granado
Resiliency aspects of security protocols Practice talk for Security Protocols Workshop

Friday 18 May 2007

Alejandro Vinao
Composer in residence conversation

Friday 25 May 2007

Feng Hao, Computer Laboratory
On password-based key exchange

Friday 01 June 2007
Friday 22 June 2007

Jean Martina, Comupter Laboratory, University of Cambridge
OpenHSM: An Open key life cycle protocol for Public Key Infrastructure's Hardware Security Modules

Friday 29 June 2007

Steven J. Murdoch (Computer Laboratory, University of Cambridge)
Experiences as an e-counting election observer

Friday 13 July 2007

Frank Stajano, Computer Laboratory
Cyberdice: peer-to-peer gambling in the presence of cheaters

Friday 20 July 2007

Frank Stajano, Computer Laboratory
Cyberdice 2: Peer-to-peer gambling in presence of cheaters

Friday 27 July 2007

Saar Drimer, CL
Keep your enemies close: Distance bounding against smartcard relay attacks Practice talk for USENIX Security

Friday 03 August 2007

Robert Watson (University of Cambridge)
Exploiting concurrency vulnerabilities in system call wrappers Practice talk for USENIX Security WOOT

Friday 10 August 2007
Friday 17 August 2007

Steven J. Murdoch (Computer Laboratory, University of Cambridge)
Summary of USENIX Security 2007

Friday 07 September 2007

Frank Stajano, Dan Cvrcek, Matt Lewis
Attacks on real-world wireless sensor networks

Friday 05 October 2007

Matthew Johnson, Computer Laboratory
A new approach to E-banking Practice talk for NordSec

Friday 12 October 2007

Matt Thomson, Australian Federal Police
Short presentation on research by the AFP Computer Forensic Team

Friday 19 October 2007

Steven J. Murdoch (Computer Laboratory, University of Cambridge)
Discussion: Bi-directional authentication in TLS

Friday 02 November 2007

Luke Church (University of Cambridge)
HCI perspectives on security

Friday 09 November 2007

Steven J. Murdoch (Computer Laboratory, University of Cambridge)
Practical web application security

Friday 07 December 2007

Jeff Yan, University of Newcastle
Security seminar presentation

Friday 14 December 2007

Emilia Käsper, ESAT, KU Leuven
The eStream stream-cipher contest

Friday 18 January 2008

Steven J. Murdoch (Computer Laboratory, University of Cambridge)
Summary of the 24th Chaos Communication Congress

Friday 15 February 2008

Philip Woodall
Healthcare data research

Friday 29 February 2008

Poul-Henning Kamp
MD5crypt and GBDE: observations of a non-union cryptographer

Thursday 27 March 2008

Chris Lesniewski-Laas, MIT
A Sybil-proof one-hop DHT

Friday 02 May 2008
Friday 09 May 2008

Steven J. Murdoch (Computer Laboratory, University of Cambridge)
Thinking inside the box: system-level failures of tamper proofing Practice talk for IEEE Security and Privacy (Oakland)

Friday 13 June 2008

David Spiegelhalter, DPMMS
Public understanding of risk (discussion)

Friday 05 September 2008

Deborah C. Peel, Patient Privacy Rights
Electronic health records: which is worse, the UK system or the US System? Please note the unusual day

Friday 19 September 2008

Pythagoras Petratos, Oxford University
Security economics

Friday 31 October 2008

Steven J. Murdoch (Computer Laboratory, University of Cambridge)
ATM Security 2008 Conference

Friday 14 November 2008
Friday 21 November 2008

Jeff Yan, Newcastle University
The robustness of CAPTCHAs

Friday 16 January 2009

Mohammed Al-Ubaydli
How secure is my messaging protocol for clinical communication?

Friday 20 February 2009

Philip Paeps, FreeBSD security team
Security lessons from embedded devices

Friday 27 February 2009

John Tang, Computer Laboratory
Mobile malware prevention using temporal information

Friday 06 March 2009

Steven J. Murdoch (Computer Laboratory, University of Cambridge)
Conference report: Financial Cryptography 2009

Friday 28 August 2009

Emilia Kasper, KU Leuven
Faster and timing-attack resistant AES-GCM

Friday 18 September 2009

Hyoungschick Kim, University of Cambridge
A spatial cloaking framework based on range search for nearest neighbor search

Friday 25 September 2009

Andrew Lewis (University of Cambridge)
Towards copy-evident JPEG images Practice talk for Informatik 2009

Friday 22 January 2010

Joseph Bonneau, Cambridge University
Statistical Attacks on Personal Knowledge Questions

Friday 29 January 2010

George Danezis, Microsoft Research
Machiavelli confronts 21st century digital technology

Friday 26 February 2010

Robert Watson (University of Cambridge)
Capsicum: Practical capabilities for UNIX

Friday 12 March 2010

Markus Kuhn, Computer Laboratory
GPS jamming & interference (workshop report)

Friday 19 March 2010

Matt Scott, ACI
Notes on security breaches

Friday 09 April 2010

Feng Hao
A DRE-based e-voting scheme

Friday 30 April 2010

Pete Warden
How I got sued by Facebook

Friday 14 May 2010

Steven J. Murdoch (Computer Laboratory, University of Cambridge)
Chip and PIN is broken Practice talk for IEEE Security and Privacy (Oakland)

Friday 28 May 2010

Omar Choudary, Computer Laboratory
Smart card detective: an EMV interceptor

Friday 04 June 2010

Jonathan Parris, Intercede
Title to be confirmed

Friday 02 July 2010
Friday 30 July 2010

Ken Mai, Carnegie-Mellon University
Side-Channel Attack Resistant ROM-Based AES S-Box

Friday 06 August 2010

Steven J. Murdoch (Computer Laboratory, University of Cambridge)
Trip report for PETS 2010

Friday 27 August 2010

Sergei Skorobogatov
Trip report for CHES and FDTC 2010

Friday 19 November 2010

Wei Ming Khoo, University of Cambridge
Do you Skyhoo? or Inside a killer IMBot

Friday 25 February 2011

Omar Choudary ( Computer Laboratory)
Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV

Friday 18 March 2011

Andrew Lewis (University of Cambridge)
Defragmentation of compressed bitstreams for H.264/AVC video evidence recovery

Friday 15 April 2011
Friday 27 May 2011

Speaker to be confirmed
Title to be confirmed

Friday 01 July 2011

Jonathan Craymer, PinPlus Limited
The world needs something stronger than passwords which we can all use

Friday 08 July 2011

Wayne Burleson, University of Massachusetts, Amherst
Hardware security in nanometer CMOS

Friday 23 September 2011

Rainer Böhme, University of Münster
The security cost of cheap user interaction

Friday 09 December 2011

Richard Clayton (University of Cambridge)
Trends in sophisticated hacking

Friday 03 February 2012

Philip Withnall (University of Cambridge)
Encoding D-Bus protocol state machines for testing client implementations

Friday 17 February 2012

Joseph Bonneau
Linguistic properties of multi-word passphrases

Friday 02 March 2012

Yuki Kinebuchi and Hiromasa Shimada (Waseda University)
Automatic generation of the kernel integrity monitor and how to protect the integrity monitor itself

Friday 30 March 2012

Najmi Zabidi
Malware analysis with multiple features

Friday 18 May 2012

Jonathan Millican (University of Cambridge)
Title to be confirmed

Friday 01 June 2012

Dongting Yu
BGP security and where BGPSEC is heading

Friday 08 June 2012

Wei Ming Khoo (University of Cambridge)
Polymorphic attacks against sequence-based software birthmarks

Friday 15 June 2012

José Manuel Liñares-Zegarra & Bernardo Batiz-Lazo
Title to be confirmed

Friday 22 June 2012

Tara Whalen, Office of the Privacy Commissioner of Canada
Perky "Canada" Has Own Privacy Governance, Laws

Friday 20 July 2012

Ellis Weinberger
Observation skill and personal safety – workshop

Friday 24 August 2012

Steven Wenham (
Weightless: a new standard for M2M communication

Friday 07 September 2012

Omar Choudary ( Computer Laboratory)
Summary of ECRYPT II summer school

Friday 14 September 2012

Omar, Markus, Sergei
crypt@b-it, ECRYPT Summer School, CHES 2012

Friday 05 October 2012

Tony Chew (Monetary Authority of Singapore)
Technology Risk Management Guidelines and Regulations for the Safety & Soundness of the Financial Industry in Singapore

Wednesday 27 March 2013

Michael Kosinski
Facebook and privacy

Friday 29 March 2013

Michal Kosinski
Facebook and privacy

Friday 12 April 2013
Friday 21 June 2013

Robin Bloomfield
Security informed safety

Friday 05 July 2013

Kumar Sharad, Computer Laboratory
De-anonymizing D4D datasets

Friday 12 July 2013

Graham Titmus, Computer Laboratory
Meeting with CL System Administration

Friday 23 August 2013

Marta Piekarska, Technische Universität Berlin
GPU-mediated direct-memory-access attacks in a smart phone

Friday 30 August 2013

Nik Sultana, University of Cambridge Computer Laboratory
Selective Disclosure in Datalog-based Trust Management

Friday 18 October 2013

Sheharbano Khattak, University of Cambridge Computer Laboratory
Effect of Internet censorship on user behavior

Friday 22 November 2013

Omar Choudary ( Computer Laboratory)
Efficient Template Attacks

Friday 21 February 2014

Nora Ni Loideain, PhD Candidate in Law, Magdalene College, University of Cambridge
Discussion on AG's recent Opinion concerning the Data Retention Directive Note change of room to SS03 (for this day only)

Friday 18 April 2014

Michael Schapira (Hebrew University of Jerusalem)
(How) can we secure Internet routing?

Friday 02 May 2014

John Dale, handling partnering and M&A for Raytheon UK
Building a Cyber eco-system

Friday 09 May 2014

Omar Choudary (Computer Laboratory)
Chip and Skim: cloning EMV cards with the pre-play attack

Friday 30 May 2014

Steven Murdoch
Oakland 2014 summary Room changed

Friday 11 July 2014

Jens Neisius, TU Munich
Orchestrated crime: the high yield investment fraud ecosystem

Friday 01 August 2014

Eran Tromer, Tel Aviv University
Who by sound and who by ground, who by pin and who by skin: side-channel key extraction from PCs

Friday 24 October 2014

Sheharbano Khattak, Cambridge University
A Look at the Consequences of Internet Censorship Through an ISP Lens

Friday 28 November 2014

Nicola Dimitri, Professor of Economics, University of Siena
Applying game theory to cybersecurity problems

Friday 24 April 2015

Speaker to be confirmed
John Ioannidis visits

Friday 05 June 2015

Sergey Bratus, Dartmouth College
Informal talk about Wassenaar and/or work at our lab

Friday 04 September 2015

Alex Dalgleish and Agnes Cameron, University of Cambridge
Pico: user authentication for Internet of Things

Friday 11 September 2015

Fin Brown, University of Cambridge
Pico prototype

Tuesday 20 October 2015

Ashish R. Hota, PhD Student, School of Electrical and Computer Engineering Purdue University
Behavioral Decision Making in Interdependent Security Games

Friday 30 October 2015

Carlos Javier Hernández-Castro, Complutense University, Madrid, Spain
About the (in)security of CAPTCHAs

Graham Rymer, University of Cambridge
Raven – attacks and countermeasures

Friday 13 November 2015

Andriana E. Gkaniatsou, Edinburgh University
Breaking Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit

Friday 27 November 2015

Marios O. Chaudary
Secure multipath communications

Friday 11 March 2016

Nik Sultana (University of Cambridge)
A new packet filtering technique

Friday 28 October 2016

Irwin Olian, ACME Cold Storage Inc.
AXIOM Beyond Encryption

Friday 25 November 2016

Kami Vaniea, University of Edinburgh
The human factor in software updates

Friday 24 February 2017

Florian Gondesen, Hamburg University of Technology
Hack the brain

Friday 24 March 2017

Joseph Bonneau, Stanford University
Verifyable random bit generation

Friday 21 April 2017

Daniel Thomas (University of Cambridge)
1000 days of UDP amplification DDoS attacks

Friday 09 June 2017

Priyesh Patel, Daniel Chatfield, Monzo
Building a secure bank from the ground up

Friday 11 August 2017
Friday 15 December 2017

Andrew D. Zonenberg, IOActive
Antikernel: a decentralized secure hardware-software operating system architecture

Powered by