Department of Computer Science and Technology

Security Group

Security Seminar

2024-03-19

2024-03-12 – Mysticeti: Low-Latency DAG Consensus with Fast Commit Path

Alberto Sonnino, Mysten Labs

2024-03-05 – How to Catch an AI Liar: Lie Detection in Black-Box LLMs by Asking Unrelated Questions

Lorenzo Pacchiardi, University of Cambridge

2024-02-29 – Characterizing Machine Unlearning through Definitions and Implementations

Nicolas Papernot, University of Toronto and Vector Institute

2024-02-20 – Owl - an augmented password-authenticated key exchange protocol

Feng Hao, University of Warwick

2024-02-06 – Dead Code Removal at Meta: Automatically Deleting Millions of Lines of Code and Petabytes of Deprecated Data

Will Shackleton, Meta

2024-01-23 – A Comprehensive Study of the Extremist Narratives and the Role of Alternative Social Networks that Facilitate Radical Discourse

Antonis Papasavva, University College London

2023-12-18 – Differential Privacy: Theory to Practice for the 2020 US Census

Simson Garfinkel

2023-12-05 – Securing Supply Chains with Compilers

Nicholas Boucher, University of Cambridge

2023-11-28 – Human-producible Adversarial Examples

David Khachaturov, University of Cambridge

2023-11-24 – Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks

Pranav Dahiya, University of Cambridge

2023-10-31 – Data, Identity and Governance: Evolution and Trajectory of Digital Public Infrastructure in India

Aakansha Natani, IIIT Hyderabad, India

2023-10-18 – CIA to AIC: Why Cyber Must Enable the Business

Keith A Price, Chief Security Officer, National Highways

2023-10-10 – A Tale of Two Internet (In)Security Problems

Michael Schapira, Hebrew University of Jerusalem

2023-09-19 – On the Insecurity of PLC Systems

Eli Biham, Technion

2023-07-21 – EviHunter: Identifying Digital Forensic Artifacts from Android Apps/Devices via Static & Dynamic Analysis + Android™ App Forensic Artifacts Database

Yong Guan, Iowa State University

2023-06-27 – A View of the Dark Web through the Lens of NLP and Language Modeling

Youngjin Jin, Korea Advanced Institute of Science & Technology (KAIST)

2023-06-20 – The Unlearning Problem(s)

Anvith Thudi, University of Toronto

2023-06-06 – The Nym mixnet: Design and Evaluation

Harry Halpin & Ania Piotrowska, Nym Technologies

2023-05-16 – The INCEL Movement: A New Form of Technology-Facilitated Abuse

Melissa Hamilton, University of Surrey

2023-05-09 – Testing the Effectiveness of Targeted Financial Sanctions on Russia: Law or War?

Jason Sharman, University of Cambridge

2023-03-07 – Algorithms and the criminal justice system: promises and challenges in deployment and research

Miri Zilka, University of Cambridge

2023-02-28 – On the motivations and challenges of affiliates involved in cybercrime

Masarah Paquet-Clouston, Université de Montréal

2023-01-31 – Influence Policing: Mapping the Rise of Strategic Communications and Digital Behaviour Change within UK Law Enforcement and Security Services

Ben Collier, University Of Edinburgh

2022-12-13 – A Sociotechnical Audit: Assessing Police use of Facial Recognition

Evani Radiya-Dixit, Minderoo Centre for Tech & Democracy

2022-11-29 – The Security of Post-Quantum Telco Networks, or changing 10 billion door-locks in 197 countries

Zygmunt A Lozinski, IBM

2022-11-22 – Bad men, good men, and loving women: Gender Constructions in the UK’s Online Action Counters Terrorism (ACT) Campaign

Harmonie Toros, University of Kent

2022-11-15 – Towards Meaningful Stochastic Defences in Machine Learning

Ilia Shumailov, University of Oxford

2022-10-25 – Secure and efficient networks

Oleh Stupak, University of Cambridge

2022-10-18 – Technology-Facilitated Abuse: The Role of Tech in the Context of Intimate Partner Violence

Leonie Tanczer, University College London

2022-10-11 – Generative Language Model, Deepfake, and Fake News 2.0: Scenarios and Implications

Dongwon Lee, Penn State University

2022-07-15 – Mapping the Geography of Cybercrime - findings from an expert survey

Miranda Bruce, University of Oxford

2022-06-14 – No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis

Arwa Al Alsadi, Delft University of Technology

2022-06-07 – Reward Sharing for Mixnets

Claudia Diaz, KU Leuven

2022-05-24 – Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps

Kassem Fawaz, University of Wisconsin-Madison

2022-05-17 – VerLoc: Verifiable Localization in Decentralized Systems

Katharina Kohls, Radboud University

2022-05-10 – “You’re never left alone:” the use of digital technologies in domestic abuse

Lisa Sugiura, Jason R.C. Nurse, Jacki Tapley and Chloe Hawkins

2022-05-03 – The gap between research and practice in authentication

Arvind Narayanan, Princeton University

2022-04-26 – Attacking and Fixing the Bitcoin Network

Muoi Tran, National University of Singapore

2022-03-22 – Risk and Resilience: Promoting Adolescent Online Safety and Privacy through Human-Centered Computing

Pamela Wisniewski, University of Central Florida

2022-03-18 – Design rules and Maxims for insecurity engineering for lock designs

Marc Weber Tobias, School of Engineering, University of Pittsburgh

2022-03-08 – Sex, money, and the mating market: How big data helps us understand sexual politics

Khandis Blake, University of Melbourne

2022-02-08 – Trojan Source: Invisible Vulnerabilities

Nicholas Boucher, University of Cambridge

2022-01-25 – Incident Response as a Lawyers' Service

Daniel Woods, University of Innsbruck, Austria

2022-01-18 – Transcending Transcend: Revisiting Malware Classification with Conformal Evaluation

Federico Barbero, University of Cambridge

2022-01-14 – Hansa Market, Cyberbunker, and Encrochat: The Security Practices of Organized Crime

Erik van de Sandt, Dutch National Police and University of Bristol

2021-11-23 – Teardown of encrypted USB Flash drives

Sergei Skorobogatov, University of Cambridge

2021-11-16 – Cybersecurity for Democracy: Providing Independent Auditing Frameworks for Platform Accountability

Damon McCoy, New York University

2021-11-09 – Blind Backdoors in Deep Learning

Eugene Bagdasaryan, Cornell Tech

2021-11-01 – Computational Methods to Measure and Mitigate Weaponized Online Information

Gianluca Stringhini, Boston University

2021-10-26 – Resilient Machine Learning: A Systems-Security Perspective

Roei Schuster, Cornell Tech

2021-10-12 – Super-Posters in Extremist Forums

Stephane Baele, University of Exeter

2021-07-20 – It's not only the dark web: Distributed surface web marketplaces

Constantinos Patsakis, University of Piraeus

2021-05-18 – Apple, App Tracking Transparency, and the Hidden Costs of More Privacy

Sam Gilbert, University of Cambridge

2021-05-04 – FastPay: High-Performance Byzantine Fault Tolerant Settlement

Alberto Sonnino, UCL

2021-03-23 – Dark web marketplaces and COVID-19: Flexible and resilient

Andrea Baronchelli, City University of London and The Alan Turing Institute

2021-03-16 – Understanding Modern Phishing

Brad Wardman and Adam Oest, PayPal

2021-03-02 – Crowdsourcing Security Research: A case study of AdObserver

Laura Edelson and Damon McCoy, New York University

2021-02-23 – Dmitry goes to Hollywood: Criminal Excellence in (Cyber) La La Land

Luca Allodi, Eindhoven University of Technology

2021-02-16 – A Liar and a Copycat: Nonverbal Coordination Increases with Lie Difficulty

Sophie van der Zee, Erasmus University Rotterdam

2021-02-09 – Cybersecurity Risk to Hospitals from Building Services

Sheryn Gillin, University of Cambridge

2020-11-24 – Alternative sanctions for juvenile criminal hackers: The evaluation of the Dutch “Hack_Right” intervention

Rutger Leukfeldt, NSCR

2020-11-17 – Cultural Convergence in the time of COVID

Alicia Bargar and Erin McAweeney, Graphika

2020-11-10 – Hardware and Software Fingerprinting of Mobile Devices

Jiexin (Stan) Zhang, University of Cambridge

2020-11-05 – SHB Seminar

Multiple Speakers

2020-11-03 – Eavesdropping at Scale: Shifting the Threat Model in Satellite Broadband

James Pavur, University of Oxford

2020-10-27 – Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble

Kit Murdock, University of Birmingham

2020-10-20 – Sponge Examples: Energy-Latency Attacks on Neural Networks

Ilia Shumailov, University of Cambridge

2020-06-02 – TRRespass: Exploiting the Many Sides of Target Row Refresh

Kaveh Razavi, ETH Zurich

2020-05-26 – Collaborative Deanonymization

Rainer Böhme, University of Innsbruck

2020-05-19 – Understanding Privacy-Related Questions on Stack Overflow

Kami Vaniea, University of Edinburgh

2020-05-12 – The politics of data-driven governance

Lina Dencik, Data Justice Lab, Cardiff University

2020-05-05 – Tech Abuse in the Intimate Partner Violence Setting: Issues, Challenges, and Mitigations

Damon McCoy, New York University

2020-04-28 – SEAL: sealed-bid auction without auctioneers

Feng Hao, Department of Computer Science, University of Warwick

2017-10-04 – Conditional Linear Cryptanalysis

Eli Biham, Computer Science Department, Technion - Israel Institute of Technology

Total duration: 69:11:12