Vergangene Distinguished Lectures

DLS in Cybersecurity mit Alice J O'Toole: Turning a face recognition black box white: Understanding what deep convolutional neural networks learn about faces

Prof. Alice J. O’Toole, The University of Texas at Dallas, USA

03. Juni 2019

  - Achtung: diese DLS findet ausnahmesweise an einem Montag statt -

Real-world face recognition requires an ability to perceive the uniqueness of a face across multiple, variable images. Deep convolutional neural networks (DCNNs) accomplish this feat and can be analyzed in a multidimensional “face space”.

Details anzeigen

DLS in Cybersecurity mit Gene Tsudik: VRASED: Verifiable Remote Attestation for Simple Embedded Devices

Prof. Gene Tsudik, University of California, Irvine, USA

19. März 2019

  - Achtung: diese DLS findet ausnahmesweise an einem Dienstag statt -

Remote Attestation (RA) is a security service that allows a trusted verifier (Vrf) to measure the software state of an untrusted remote device -- Prv. If correctly implemented, RA allows Vrf to remotely detect if Prv is in an illegal or compromised state. Although several RA architectures have been proposed, little attention has been devoted to their verifiability and security guarantees that can be derived through formal verification of RA architectures.

Details anzeigen

DLS in Cybersecurity mit N. Asokan: Hardware-assisted run-time protection: on balancing security and deployability

Prof. N. Asokan, Aalto University, Espoo, Finland

14. Februar 2019

Run-time attacks are a prominent attack vector for compromising systems written in memory-unsafe languages like C and C++. Over the last decade there has been significant advances by both researchers and practitioners in understanding and defending against run-time attacks, especially those that attempt to defeat control-flow integrity (CFI). As CFI defenses are gradually being deployed, data-oriented attacks will become increasingly attractive. ....

Details anzeigen

DLS in Cybersecurity mit Daniel Keim: The Power of Visual Analytics for Security Applications

Prof. Daniel Keim, Universität Konstanz

31. Januar 2019

Never before in history data is generated and collected at such high volumes as it is today, in particular in security applications. For the analysis of large data sets to be effective, it is important to include the human in the data exploration process and combine the flexibility, creativity, and general knowledge of humans with the enormous storage capacity and the computational power of today's computers.

Details anzeigen

CANCELLED: DLS in Cybersecurity - Tracing Stolen Bitcoin

Prof. Ross Anderson, University of Cambridge Computer Laboratory, UK

12. Juli 2018

Diese DLS in Cybersecurity kann leider nicht stattfinden. Sie wird zu einem späteren Zeitpunkt nachgeholt werden.

We've been exploring how to track stolen bitcoin. Previous attempts to do this had got entangled in the problem of dealing with transactions that split bitcoin into change, or that consolidate smaller sums into larger ones, and with mining fees. One answer comes from an unexpected direction: a legal precedent in 1816....

Details anzeigen

DLS in Cybersecurity mit Ari Juels: Beyond Smarts: Toward Correct, Private, Data-Rich Smart Contracts

Prof. Ari Juels, Cornell Tech, New York, USA

21. Juni 2018

Smart contracts are applications that run on and inherit the special properties of blockchains. These properties alone, though, do not make smart contracts broadly useful. Persistence prevents tampering, but makes errors irreversible. Transparency supports behavioral assurances, but at the cost of confidentiality. 

Details anzeigen

DLS in Cyberecurity: Grand Research Challenges for Cybersecurity of Critical Information and Infrastructures

Prof. Paulo Esteves-Veríssimo, University of Luxembourg

24. Mai 2018

Computing and communications infrastructures have become commodities which societies largely depend on, transacting huge quantities of data and exhibiting pervasive interconnections, sometimes in critical conditions. However, the actual magnitude that security and dependability risks may assume, is often misperceived. The information society has been assuming risk behaviours, without the adequate protection. Many stakeholders, not only end-users but vendors, service providers, public administrations and - what may be surprising - even governments, seem to ignore those risks, in different ways.

Details anzeigen

DLS in Cybersecurity: From Provable Security to Secure Cryptographic Implementations

Prof. Gilles Barthe, University of Manchester, UK

19. April 2018

Building secure cryptographic implementations is notoriously hard. In this talk, I will outline a general methodology that delivers formal guarantees on assembly-level implementations through a combination of ideas from deductive program verification, program analysis, and verified compilation.

Details anzeigen

DLS in Cybersecurity: Secure Deduplication - Models and Optimization

Colin Boyd, Norwegian University of Science and Technology (NTNU), Norwegen

16. November 2017

Deduplication is a widely used mechanism in cloud storage systems which can greatly increase efficiency. The basic idea is to remove duplicate stored files, replacing copies with a pointer to a single version. Empirical evidence shows that deduplication can be extremely effective in reducing both storage requirements and bandwidth used for uploading. However, deduplication also introduces severe challenges to security. There is an inherent conflict between the use of deduplication and the desire of users to encrypt their files prior to uploading. Even if this problem can be solved, client-side deduplication opens up a side channel which can reveal information to an adversary, as shown in 2010 by Harnik et al.

Details anzeigen

DLS in Cybersecurity: Security as a Science - Are we making progress?

Paul van Oorschot, Carleton University, Ottawa, Canada

19. Oktober 2017

Recent years have seen increasing calls to make security research more “scientific”. Who can argue with science being desirable? But what exactly do people mean when they suggest this, and what are they really seeking? There is little clarity on what a “Science of Security” would look like. We consider this question, in the context of historical science and more recent security research, offer observations and insights, and suggest where things might be improved.

Details anzeigen

Seite 1 von 4
nächste Seite