talk

Program behavior-based fuzzing and vulnerability discovery

Who: Gustavo Grieco (CIFASIS - CONICET and VERIMAG) When: 11:00, May 6 in Where: room EDIT 8103 Title: {{ page.title }} Abstract:\ Mutational fuzzing is a powerful tool to detect vulnerabilities in software.

Two Can Keep a Secret, If One of Them Uses Haskell

Who: Alejandro Russo When: 11:00 am on April 15 Where: Room 3364\ Title: {{ page.title }} Abstract:\ For several decades, researchers from different communities have independently focused on protecting confidentiality of data.

Recent Breakthroughs in Obfuscation

Who: Elena Pagnin When: Friday April 1, 11:00 Where: Room 8103 Title: {{ page.title }} Abstract: This talk is supposed to give an overview of the state of the art in the area of Homomorphic Encryption (HE) and Multi-Linear Maps (MLM).

Formal Security Analysis of Mobile and Web Applications

Who: Matteo Maffei\ When: Thursday, {{ page.date | date_to_long_string }}, 13:30-14:30\ Where: Room 3364\ Title: {{ page.title }} Abstract:\ In this talk, I will present two ongoing projects on the formal verification of security properties for mobile and web applications.

Anonymization of sparse multidimensional data

Who: Manolis Terrovitis\ When: Tuesday, {{ page.date | date_to_long_string }}, 15:00-12:00\ Where: Room 8103\ Title: {{ page.title }} Abstract:\ Data privacy is of increasing importance as most human activities leave digital traces in some information system.

Daniel Hausknecht's Licentiate presentation

##Talk 1: Who: William Robertson\ When: Monday, {{ page.date | date_to_long_string }}, 10:00-11:00\ Where: Room 8103\ Title: on web malware (read abstract and bio below) ##Talk 2: Who: Daniel Hausknecht’s \

Towards more secure and usable text passwords

Who: Prof. Lujo Bauer from Carnegie Mellon University\ When: Thursday, {{ page.date | date_to_long_string }}, 15:00\ Where: Room EA\ Title: {{ page.title }} Abstract: Many security problems arise at the interface between computer systems and their users.

Establishing and Maintaining Root of Trust on Commodity Computer Systems

Who: Virgil Gligor CMU\ When: Friday, {{ page.date | date_to_long_string }}, 11:00-12:00\ Where: Room 8103\ Title: {{ page.title }} Abstract:\ Suppose that a trustworthy program must be booted on a commodity system that may contain persistent malware.