Department of Computer Science and Technology

Security Group

Security Seminar



2023-01-31 – Influence Policing: Mapping the Rise of Strategic Communications and Digital Behaviour Change within UK Law Enforcement and Security Services

Ben Collier, University Of Edinburgh

2022-12-13 – A Sociotechnical Audit: Assessing Police use of Facial Recognition

Evani Radiya-Dixit, Minderoo Centre for Tech & Democracy

2022-11-29 – The Security of Post-Quantum Telco Networks, or changing 10 billion door-locks in 197 countries

Zygmunt A Lozinski, IBM

2022-11-22 – Bad men, good men, and loving women: Gender Constructions in the UK’s Online Action Counters Terrorism (ACT) Campaign

Harmonie Toros, University of Kent

2022-11-15 – Towards Meaningful Stochastic Defences in Machine Learning

Ilia Shumailov, University of Oxford

2022-10-25 – Secure and efficient networks

Oleh Stupak, University of Cambridge

2022-10-18 – Technology-Facilitated Abuse: The Role of Tech in the Context of Intimate Partner Violence

Leonie Tanczer, University College London

2022-10-11 – Generative Language Model, Deepfake, and Fake News 2.0: Scenarios and Implications

Dongwon Lee, Penn State University

2022-07-15 – Mapping the Geography of Cybercrime - findings from an expert survey

Miranda Bruce, University of Oxford

2022-06-14 – No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis

Arwa Al Alsadi, Delft University of Technology

2022-06-07 – Reward Sharing for Mixnets

Claudia Diaz, KU Leuven

2022-05-24 – Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps

Kassem Fawaz, University of Wisconsin-Madison

2022-05-17 – VerLoc: Verifiable Localization in Decentralized Systems

Katharina Kohls, Radboud University

2022-05-10 – “You’re never left alone:” the use of digital technologies in domestic abuse

Lisa Sugiura, Jason R.C. Nurse, Jacki Tapley and Chloe Hawkins

2022-05-03 – The gap between research and practice in authentication

Arvind Narayanan, Princeton University

2022-04-26 – Attacking and Fixing the Bitcoin Network

Muoi Tran, National University of Singapore

2022-03-22 – Risk and Resilience: Promoting Adolescent Online Safety and Privacy through Human-Centered Computing

Pamela Wisniewski, University of Central Florida

2022-03-18 – Design rules and Maxims for insecurity engineering for lock designs

Marc Weber Tobias, School of Engineering, University of Pittsburgh

2022-03-08 – Sex, money, and the mating market: How big data helps us understand sexual politics

Khandis Blake, University of Melbourne

2022-02-15 – Machine Learning in context of Computer Security

Ilia Shumailov, University of Cambridge

2022-02-08 – Trojan Source: Invisible Vulnerabilities

Nicholas Boucher, University of Cambridge

2022-01-25 – Incident Response as a Lawyers' Service

Daniel Woods, University of Innsbruck, Austria

2022-01-18 – Transcending Transcend: Revisiting Malware Classification with Conformal Evaluation

Federico Barbero, University of Cambridge

2022-01-14 – Hansa Market, Cyberbunker, and Encrochat: The Security Practices of Organized Crime

Erik van de Sandt, Dutch National Police and University of Bristol

2021-11-23 – Teardown of encrypted USB Flash drives

Sergei Skorobogatov, University of Cambridge

2021-11-16 – Cybersecurity for Democracy: Providing Independent Auditing Frameworks for Platform Accountability

Damon McCoy, New York University

2021-11-09 – Blind Backdoors in Deep Learning

Eugene Bagdasaryan, Cornell Tech

2021-11-01 – Computational Methods to Measure and Mitigate Weaponized Online Information

Gianluca Stringhini, Boston University

2021-10-26 – Resilient Machine Learning: A Systems-Security Perspective

Roei Schuster, Cornell Tech

2021-10-12 – Super-Posters in Extremist Forums

Stephane Baele, University of Exeter

2021-07-20 – It's not only the dark web: Distributed surface web marketplaces

Constantinos Patsakis, University of Piraeus

2021-05-18 – Apple, App Tracking Transparency, and the Hidden Costs of More Privacy

Sam Gilbert, University of Cambridge

2021-05-04 – FastPay: High-Performance Byzantine Fault Tolerant Settlement

Alberto Sonnino, UCL

2021-03-23 – Dark web marketplaces and COVID-19: Flexible and resilient

Andrea Baronchelli, City University of London and The Alan Turing Institute

2021-03-16 – Understanding Modern Phishing

Brad Wardman and Adam Oest, PayPal

2021-03-02 – Crowdsourcing Security Research: A case study of AdObserver

Laura Edelson and Damon McCoy, New York University

2021-02-23 – Dmitry goes to Hollywood: Criminal Excellence in (Cyber) La La Land

Luca Allodi, Eindhoven University of Technology

2021-02-16 – A Liar and a Copycat: Nonverbal Coordination Increases with Lie Difficulty

Sophie van der Zee, Erasmus University Rotterdam

2021-02-09 – Cybersecurity Risk to Hospitals from Building Services

Sheryn Gillin, University of Cambridge

2020-11-24 – Alternative sanctions for juvenile criminal hackers: The evaluation of the Dutch “Hack_Right” intervention

Rutger Leukfeldt, NSCR

2020-11-17 – Cultural Convergence in the time of COVID

Alicia Bargar and Erin McAweeney, Graphika

2020-11-10 – Hardware and Software Fingerprinting of Mobile Devices

Jiexin (Stan) Zhang, University of Cambridge

2020-11-05 – SHB Seminar

Multiple Speakers

2020-11-03 – Eavesdropping at Scale: Shifting the Threat Model in Satellite Broadband

James Pavur, University of Oxford

2020-10-27 – Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble

Kit Murdock, University of Birmingham

2020-10-20 – Sponge Examples: Energy-Latency Attacks on Neural Networks

Ilia Shumailov, University of Cambridge

2020-06-02 – TRRespass: Exploiting the Many Sides of Target Row Refresh

Kaveh Razavi, ETH Zurich

2020-05-26 – Collaborative Deanonymization

Rainer Böhme, University of Innsbruck

2020-05-19 – Understanding Privacy-Related Questions on Stack Overflow

Kami Vaniea, University of Edinburgh

2020-05-12 – The politics of data-driven governance

Lina Dencik, Data Justice Lab, Cardiff University

2020-05-05 – Tech Abuse in the Intimate Partner Violence Setting: Issues, Challenges, and Mitigations

Damon McCoy, New York University

2020-04-28 – SEAL: sealed-bid auction without auctioneers

Feng Hao, Department of Computer Science, University of Warwick

2017-10-04 – Conditional Linear Cryptanalysis

Eli Biham, Computer Science Department, Technion - Israel Institute of Technology

Total duration: 51:42:17