Department of Computer Science and Technology

Security Group

Security Seminar

2022-05-03

2022-04-26 – Attacking and Fixing the Bitcoin Network

Muoi Tran, National University of Singapore

2022-03-22 – Risk and Resilience: Promoting Adolescent Online Safety and Privacy through Human-Centered Computing

Pamela Wisniewski, University of Central Florida

2022-03-18 – Design rules and Maxims for insecurity engineering for lock designs

Marc Weber Tobias, School of Engineering, University of Pittsburgh

2022-03-08 – Sex, money, and the mating market: How big data helps us understand sexual politics

Khandis Blake, University of Melbourne

2022-02-15 – Machine Learning in context of Computer Security

Ilia Shumailov, University of Cambridge

2022-02-08 – Trojan Source: Invisible Vulnerabilities

Nicholas Boucher, University of Cambridge

2022-01-25 – Incident Response as a Lawyers' Service

Daniel Woods, University of Innsbruck, Austria

2022-01-18 – Transcending Transcend: Revisiting Malware Classification with Conformal Evaluation

Federico Barbero, University of Cambridge

2022-01-14 – Hansa Market, Cyberbunker, and Encrochat: The Security Practices of Organized Crime

Erik van de Sandt, Dutch National Police and University of Bristol

2021-11-23 – Teardown of encrypted USB Flash drives

Sergei Skorobogatov, University of Cambridge

2021-11-16 – Cybersecurity for Democracy: Providing Independent Auditing Frameworks for Platform Accountability

Damon McCoy, New York University

2021-11-09 – Blind Backdoors in Deep Learning

Eugene Bagdasaryan, Cornell Tech

2021-11-01 – Computational Methods to Measure and Mitigate Weaponized Online Information

Gianluca Stringhini, Boston University

2021-10-26 – Resilient Machine Learning: A Systems-Security Perspective

Roei Schuster, Cornell Tech

2021-10-12 – Super-Posters in Extremist Forums

Stephane Baele, University of Exeter

2021-07-20 – It's not only the dark web: Distributed surface web marketplaces

Constantinos Patsakis, University of Piraeus

2021-05-18 – Apple, App Tracking Transparency, and the Hidden Costs of More Privacy

Sam Gilbert, University of Cambridge

2021-05-04 – FastPay: High-Performance Byzantine Fault Tolerant Settlement

Alberto Sonnino, UCL

2021-03-23 – Dark web marketplaces and COVID-19: Flexible and resilient

Andrea Baronchelli, City University of London and The Alan Turing Institute

2021-03-16 – Understanding Modern Phishing

Brad Wardman and Adam Oest, PayPal

2021-03-02 – Crowdsourcing Security Research: A case study of AdObserver

Laura Edelson and Damon McCoy, New York University

2021-02-23 – Dmitry goes to Hollywood: Criminal Excellence in (Cyber) La La Land

Luca Allodi, Eindhoven University of Technology

2021-02-16 – A Liar and a Copycat: Nonverbal Coordination Increases with Lie Difficulty

Sophie van der Zee, Erasmus University Rotterdam

2021-02-09 – Cybersecurity Risk to Hospitals from Building Services

Sheryn Gillin, University of Cambridge

2020-11-24 – Alternative sanctions for juvenile criminal hackers: The evaluation of the Dutch “Hack_Right” intervention

Rutger Leukfeldt, NSCR

2020-11-17 – Cultural Convergence in the time of COVID

Alicia Bargar and Erin McAweeney, Graphika

2020-11-10 – Hardware and Software Fingerprinting of Mobile Devices

Jiexin (Stan) Zhang, University of Cambridge

2020-11-05 – SHB Seminar

Multiple Speakers

2020-11-03 – Eavesdropping at Scale: Shifting the Threat Model in Satellite Broadband

James Pavur, University of Oxford

2020-10-27 – Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble

Kit Murdock, University of Birmingham

2020-10-20 – Sponge Examples: Energy-Latency Attacks on Neural Networks

Ilia Shumailov, University of Cambridge

2020-06-02 – TRRespass: Exploiting the Many Sides of Target Row Refresh

Kaveh Razavi, ETH Zurich

2020-05-26 – Collaborative Deanonymization

Rainer Böhme, University of Innsbruck

2020-05-19 – Understanding Privacy-Related Questions on Stack Overflow

Kami Vaniea, University of Edinburgh

2020-05-12 – The politics of data-driven governance

Lina Dencik, Data Justice Lab, Cardiff University

2020-05-05 – Tech Abuse in the Intimate Partner Violence Setting: Issues, Challenges, and Mitigations

Damon McCoy, New York University

2020-04-28 – SEAL: sealed-bid auction without auctioneers

Feng Hao, Department of Computer Science, University of Warwick

2017-10-04 – Conditional Linear Cryptanalysis

Eli Biham, Computer Science Department, Technion - Israel Institute of Technology

Total duration: 37:44:11