Security Group
Security Seminar
2023-03-07
2023-02-28
2023-01-31 – Influence Policing: Mapping the Rise of Strategic Communications and Digital Behaviour Change within UK Law Enforcement and Security Services
Ben Collier, University Of Edinburgh
2022-12-13 – A Sociotechnical Audit: Assessing Police use of Facial Recognition
Evani Radiya-Dixit, Minderoo Centre for Tech & Democracy
2022-11-29 – The Security of Post-Quantum Telco Networks, or changing 10 billion door-locks in 197 countries
Zygmunt A Lozinski, IBM
2022-11-22 – Bad men, good men, and loving women: Gender Constructions in the UK’s Online Action Counters Terrorism (ACT) Campaign
Harmonie Toros, University of Kent
2022-11-15 – Towards Meaningful Stochastic Defences in Machine Learning
Ilia Shumailov, University of Oxford
2022-10-25 – Secure and efficient networks
Oleh Stupak, University of Cambridge
2022-10-18 – Technology-Facilitated Abuse: The Role of Tech in the Context of Intimate Partner Violence
Leonie Tanczer, University College London
2022-10-11 – Generative Language Model, Deepfake, and Fake News 2.0: Scenarios and Implications
Dongwon Lee, Penn State University
2022-07-15 – Mapping the Geography of Cybercrime - findings from an expert survey
Miranda Bruce, University of Oxford
2022-06-14 – No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis
Arwa Al Alsadi, Delft University of Technology
2022-06-07 – Reward Sharing for Mixnets
Claudia Diaz, KU Leuven
2022-05-24 – Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps
Kassem Fawaz, University of Wisconsin-Madison
2022-05-17 – VerLoc: Verifiable Localization in Decentralized Systems
Katharina Kohls, Radboud University
2022-05-10 – “You’re never left alone:” the use of digital technologies in domestic abuse
Lisa Sugiura, Jason R.C. Nurse, Jacki Tapley and Chloe Hawkins
2022-05-03 – The gap between research and practice in authentication
Arvind Narayanan, Princeton University
2022-04-26 – Attacking and Fixing the Bitcoin Network
Muoi Tran, National University of Singapore
2022-03-22 – Risk and Resilience: Promoting Adolescent Online Safety and Privacy through Human-Centered Computing
Pamela Wisniewski, University of Central Florida
2022-03-18 – Design rules and Maxims for insecurity engineering for lock designs
Marc Weber Tobias, School of Engineering, University of Pittsburgh
2022-03-08 – Sex, money, and the mating market: How big data helps us understand sexual politics
Khandis Blake, University of Melbourne
2022-02-15 – Machine Learning in context of Computer Security
Ilia Shumailov, University of Cambridge
2022-02-08 – Trojan Source: Invisible Vulnerabilities
Nicholas Boucher, University of Cambridge
2022-01-25 – Incident Response as a Lawyers' Service
Daniel Woods, University of Innsbruck, Austria
2022-01-18 – Transcending Transcend: Revisiting Malware Classification with Conformal Evaluation
Federico Barbero, University of Cambridge
2022-01-14 – Hansa Market, Cyberbunker, and Encrochat: The Security Practices of Organized Crime
Erik van de Sandt, Dutch National Police and University of Bristol
2021-11-23 – Teardown of encrypted USB Flash drives
Sergei Skorobogatov, University of Cambridge
2021-11-16 – Cybersecurity for Democracy: Providing Independent Auditing Frameworks for Platform Accountability
Damon McCoy, New York University
2021-11-09 – Blind Backdoors in Deep Learning
Eugene Bagdasaryan, Cornell Tech
2021-11-01 – Computational Methods to Measure and Mitigate Weaponized Online Information
Gianluca Stringhini, Boston University
2021-10-26 – Resilient Machine Learning: A Systems-Security Perspective
Roei Schuster, Cornell Tech
2021-10-12 – Super-Posters in Extremist Forums
Stephane Baele, University of Exeter
2021-07-20 – It's not only the dark web: Distributed surface web marketplaces
Constantinos Patsakis, University of Piraeus
2021-05-18 – Apple, App Tracking Transparency, and the Hidden Costs of More Privacy
Sam Gilbert, University of Cambridge
2021-05-04 – FastPay: High-Performance Byzantine Fault Tolerant Settlement
Alberto Sonnino, UCL
2021-03-23 – Dark web marketplaces and COVID-19: Flexible and resilient
Andrea Baronchelli, City University of London and The Alan Turing Institute
2021-03-16 – Understanding Modern Phishing
Brad Wardman and Adam Oest, PayPal
2021-03-02 – Crowdsourcing Security Research: A case study of AdObserver
Laura Edelson and Damon McCoy, New York University
2021-02-23 – Dmitry goes to Hollywood: Criminal Excellence in (Cyber) La La Land
Luca Allodi, Eindhoven University of Technology
2021-02-16 – A Liar and a Copycat: Nonverbal Coordination Increases with Lie Difficulty
Sophie van der Zee, Erasmus University Rotterdam
2021-02-09 – Cybersecurity Risk to Hospitals from Building Services
Sheryn Gillin, University of Cambridge
2020-11-24 – Alternative sanctions for juvenile criminal hackers: The evaluation of the Dutch “Hack_Right” intervention
Rutger Leukfeldt, NSCR
2020-11-17 – Cultural Convergence in the time of COVID
Alicia Bargar and Erin McAweeney, Graphika
2020-11-10 – Hardware and Software Fingerprinting of Mobile Devices
Jiexin (Stan) Zhang, University of Cambridge
2020-11-05 – SHB Seminar
Multiple Speakers
2020-11-03 – Eavesdropping at Scale: Shifting the Threat Model in Satellite Broadband
James Pavur, University of Oxford
2020-10-27 – Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble
Kit Murdock, University of Birmingham
2020-10-20 – Sponge Examples: Energy-Latency Attacks on Neural Networks
Ilia Shumailov, University of Cambridge
2020-06-02 – TRRespass: Exploiting the Many Sides of Target Row Refresh
Kaveh Razavi, ETH Zurich
2020-05-26 – Collaborative Deanonymization
Rainer Böhme, University of Innsbruck
2020-05-19 – Understanding Privacy-Related Questions on Stack Overflow
Kami Vaniea, University of Edinburgh
2020-05-12 – The politics of data-driven governance
Lina Dencik, Data Justice Lab, Cardiff University
2020-05-05 – Tech Abuse in the Intimate Partner Violence Setting: Issues, Challenges, and Mitigations
Damon McCoy, New York University
2020-04-28 – SEAL: sealed-bid auction without auctioneers
Feng Hao, Department of Computer Science, University of Warwick
2017-10-04 – Conditional Linear Cryptanalysis
Eli Biham, Computer Science Department, Technion - Israel Institute of Technology
Total duration: 51:42:17