Security Group
Security Seminar
2025-03-04
2025-02-25 – Downvoted to Oblivion: Censorship in Online, LGBTQ+ Communities
Kyle Beadle, UCL
2025-01-31 – Police responses to young people’s experiences of cyberstalking
Tahreem Tahir, University of Central Lancashire
2024-11-22 – Bluesky and the AT Protocol: Usable Decentralized Social Media
Martin Kleppmann (University of Cambridge)
2024-11-19 – On the critical path to implant backdoors and the effectiveness of potential mitigation techniques: Learnings from XZ
Mario Lins, Johannes Kepler University Linz
2024-11-12 – Federated Deep Learning for Intrusion Detection in Smart Critical Infrastructure
Segun Popoola, Anglia Ruskin University
2024-11-08 – Tracking the Takes and Trajectories of News Narratives from Trustworthy and Worrisome Websites
Hans Hanley, Stanford University
2024-10-29 – Developing Technical Interventions for Technical Abuse
Kieron Ivy Turk, University of Cambridge
2024-09-20 – Latency-aware routing in mix networks
Mahdi Rahimi, KU Leuven
2024-07-16 – Data-Agnostic Model Poisoning to Manipulating Federated Learning
Kai (Lukas) Li, CISTER research centre, Portugal
2024-06-11 – How Misinformation Creators (Ab)use Generative AI Tools
Amelia (Mia) Hassoun, University of Cambridge
2024-06-07 – The end of world as we know it
Arturo Bejar
2024-05-07 – Automated detection of cryptocurrency investment scams at scale
Jose Gilberto Atondo Siu (University of Cambridge)
2024-04-26 – A biography of Tor - a cultural and technological history of power, privacy, and global politics at the internet's core
Ben Collier, University of Edinburgh
2024-03-19 – Data Poisoning and Fakes in Mobile, Web and Cyber Physical Systems
Soteris Demetriou, Imperial College London
2024-03-12 – Mysticeti: Low-Latency DAG Consensus with Fast Commit Path
Alberto Sonnino, Mysten Labs
2024-03-05 – How to Catch an AI Liar: Lie Detection in Black-Box LLMs by Asking Unrelated Questions
Lorenzo Pacchiardi, University of Cambridge
2024-02-29 – Characterizing Machine Unlearning through Definitions and Implementations
Nicolas Papernot, University of Toronto and Vector Institute
2024-02-20 – Owl - an augmented password-authenticated key exchange protocol
Feng Hao, University of Warwick
2024-02-06 – Dead Code Removal at Meta: Automatically Deleting Millions of Lines of Code and Petabytes of Deprecated Data
Will Shackleton, Meta
2024-01-23 – A Comprehensive Study of the Extremist Narratives and the Role of Alternative Social Networks that Facilitate Radical Discourse
Antonis Papasavva, University College London
2023-12-18 – Differential Privacy: Theory to Practice for the 2020 US Census
Simson Garfinkel
2023-12-05 – Securing Supply Chains with Compilers
Nicholas Boucher, University of Cambridge
2023-11-28 – Human-producible Adversarial Examples
David Khachaturov, University of Cambridge
2023-11-24 – Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks
Pranav Dahiya, University of Cambridge
2023-10-31 – Data, Identity and Governance: Evolution and Trajectory of Digital Public Infrastructure in India
Aakansha Natani, IIIT Hyderabad, India
2023-10-18 – CIA to AIC: Why Cyber Must Enable the Business
Keith A Price, Chief Security Officer, National Highways
2023-10-10 – A Tale of Two Internet (In)Security Problems
Michael Schapira, Hebrew University of Jerusalem
2023-09-19 – On the Insecurity of PLC Systems
Eli Biham, Technion
2023-07-21 – EviHunter: Identifying Digital Forensic Artifacts from Android Apps/Devices via Static & Dynamic Analysis + Android™ App Forensic Artifacts Database
Yong Guan, Iowa State University
2023-06-27 – A View of the Dark Web through the Lens of NLP and Language Modeling
Youngjin Jin, Korea Advanced Institute of Science & Technology (KAIST)
2023-06-20 – The Unlearning Problem(s)
Anvith Thudi, University of Toronto
2023-06-06 – The Nym mixnet: Design and Evaluation
Harry Halpin & Ania Piotrowska, Nym Technologies
2023-05-16 – The INCEL Movement: A New Form of Technology-Facilitated Abuse
Melissa Hamilton, University of Surrey
2023-05-09 – Testing the Effectiveness of Targeted Financial Sanctions on Russia: Law or War?
Jason Sharman, University of Cambridge
2023-03-07 – Algorithms and the criminal justice system: promises and challenges in deployment and research
Miri Zilka, University of Cambridge
2023-02-28 – On the motivations and challenges of affiliates involved in cybercrime
Masarah Paquet-Clouston, Université de Montréal
2023-02-14 – Binary Stars: How Crime Shapes Insurance and Insurance Shapes Crime
Anja Shortland, King's College London
2023-01-31 – Influence Policing: Mapping the Rise of Strategic Communications and Digital Behaviour Change within UK Law Enforcement and Security Services
Ben Collier, University Of Edinburgh
2022-12-13 – A Sociotechnical Audit: Assessing Police use of Facial Recognition
Evani Radiya-Dixit, Minderoo Centre for Tech & Democracy
2022-11-29 – The Security of Post-Quantum Telco Networks, or changing 10 billion door-locks in 197 countries
Zygmunt A Lozinski, IBM
2022-11-22 – Bad men, good men, and loving women: Gender Constructions in the UK’s Online Action Counters Terrorism (ACT) Campaign
Harmonie Toros, University of Kent
2022-11-15 – Towards Meaningful Stochastic Defences in Machine Learning
Ilia Shumailov, University of Oxford
2022-10-25 – Secure and efficient networks
Oleh Stupak, University of Cambridge
2022-10-18 – Technology-Facilitated Abuse: The Role of Tech in the Context of Intimate Partner Violence
Leonie Tanczer, University College London
2022-10-11 – Generative Language Model, Deepfake, and Fake News 2.0: Scenarios and Implications
Dongwon Lee, Penn State University
2022-07-15 – Mapping the Geography of Cybercrime - findings from an expert survey
Miranda Bruce, University of Oxford
2022-06-14 – No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis
Arwa Al Alsadi, Delft University of Technology
2022-06-07 – Reward Sharing for Mixnets
Claudia Diaz, KU Leuven
2022-05-24 – Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps
Kassem Fawaz, University of Wisconsin-Madison
2022-05-17 – VerLoc: Verifiable Localization in Decentralized Systems
Katharina Kohls, Radboud University
2022-05-10 – “You’re never left alone:” the use of digital technologies in domestic abuse
Lisa Sugiura, Jason R.C. Nurse, Jacki Tapley and Chloe Hawkins
2022-05-03 – The gap between research and practice in authentication
Arvind Narayanan, Princeton University
2022-04-26 – Attacking and Fixing the Bitcoin Network
Muoi Tran, National University of Singapore
2022-03-22 – Risk and Resilience: Promoting Adolescent Online Safety and Privacy through Human-Centered Computing
Pamela Wisniewski, University of Central Florida
2022-03-18 – Design rules and Maxims for insecurity engineering for lock designs
Marc Weber Tobias, School of Engineering, University of Pittsburgh
2022-03-08 – Sex, money, and the mating market: How big data helps us understand sexual politics
Khandis Blake, University of Melbourne
2022-02-08 – Trojan Source: Invisible Vulnerabilities
Nicholas Boucher, University of Cambridge
2022-01-25 – Incident Response as a Lawyers' Service
Daniel Woods, University of Innsbruck, Austria
2022-01-18 – Transcending Transcend: Revisiting Malware Classification with Conformal Evaluation
Federico Barbero, University of Cambridge
2022-01-14 – Hansa Market, Cyberbunker, and Encrochat: The Security Practices of Organized Crime
Erik van de Sandt, Dutch National Police and University of Bristol
2021-11-23 – Teardown of encrypted USB Flash drives
Sergei Skorobogatov, University of Cambridge
2021-11-16 – Cybersecurity for Democracy: Providing Independent Auditing Frameworks for Platform Accountability
Damon McCoy, New York University
2021-11-09 – Blind Backdoors in Deep Learning
Eugene Bagdasaryan, Cornell Tech
2021-11-01 – Computational Methods to Measure and Mitigate Weaponized Online Information
Gianluca Stringhini, Boston University
2021-10-26 – Resilient Machine Learning: A Systems-Security Perspective
Roei Schuster, Cornell Tech
2021-10-12 – Super-Posters in Extremist Forums
Stephane Baele, University of Exeter
2021-07-20 – It's not only the dark web: Distributed surface web marketplaces
Constantinos Patsakis, University of Piraeus
2021-05-18 – Apple, App Tracking Transparency, and the Hidden Costs of More Privacy
Sam Gilbert, University of Cambridge
2021-05-04 – FastPay: High-Performance Byzantine Fault Tolerant Settlement
Alberto Sonnino, UCL
2021-03-23 – Dark web marketplaces and COVID-19: Flexible and resilient
Andrea Baronchelli, City University of London and The Alan Turing Institute
2021-03-16 – Understanding Modern Phishing
Brad Wardman and Adam Oest, PayPal
2021-03-02 – Crowdsourcing Security Research: A case study of AdObserver
Laura Edelson and Damon McCoy, New York University
2021-02-23 – Dmitry goes to Hollywood: Criminal Excellence in (Cyber) La La Land
Luca Allodi, Eindhoven University of Technology
2021-02-16 – A Liar and a Copycat: Nonverbal Coordination Increases with Lie Difficulty
Sophie van der Zee, Erasmus University Rotterdam
2021-02-09 – Cybersecurity Risk to Hospitals from Building Services
Sheryn Gillin, University of Cambridge
2020-11-24 – Alternative sanctions for juvenile criminal hackers: The evaluation of the Dutch “Hack_Right” intervention
Rutger Leukfeldt, NSCR
2020-11-17 – Cultural Convergence in the time of COVID
Alicia Bargar and Erin McAweeney, Graphika
2020-11-10 – Hardware and Software Fingerprinting of Mobile Devices
Jiexin (Stan) Zhang, University of Cambridge
2020-11-05 – SHB Seminar
Multiple Speakers
2020-11-03 – Eavesdropping at Scale: Shifting the Threat Model in Satellite Broadband
James Pavur, University of Oxford
2020-10-27 – Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble
Kit Murdock, University of Birmingham
2020-10-20 – Sponge Examples: Energy-Latency Attacks on Neural Networks
Ilia Shumailov, University of Cambridge
2020-06-02 – TRRespass: Exploiting the Many Sides of Target Row Refresh
Kaveh Razavi, ETH Zurich
2020-05-26 – Collaborative Deanonymization
Rainer Böhme, University of Innsbruck
2020-05-19 – Understanding Privacy-Related Questions on Stack Overflow
Kami Vaniea, University of Edinburgh
2020-05-12 – The politics of data-driven governance
Lina Dencik, Data Justice Lab, Cardiff University
2020-05-05 – Tech Abuse in the Intimate Partner Violence Setting: Issues, Challenges, and Mitigations
Damon McCoy, New York University
2020-04-28 – SEAL: sealed-bid auction without auctioneers
Feng Hao, Department of Computer Science, University of Warwick
2017-10-04 – Conditional Linear Cryptanalysis
Eli Biham, Computer Science Department, Technion - Israel Institute of Technology
Total duration: 81:24:04