Events
Engineering Cyber-Deceptive Software
Event Date:March 11, 2016 – 10:00 AM to March 12, 2016 – 10:59 AM Location:woodward 335
Pipelined Symbolic Taint Analysis on Multi-core Architectures
Event Date:March 9, 2016 – 11:00 AM to March 10, 2016 – 11:59 AM Location:woodward 335
Garbled computation in Cloud: a practical approach
Event Date:March 3, 2016 – 12:30 PM to March 4, 2016 – 1:59 PM Location:woodward 135
Use of Animation and Eye-Tracking to Enforce User Attention on Permission Dialogs
Event Date:February 18, 2016 – 12:30 PM to February 19, 2016 – 1:59 PM
Machine Learning Techniques for Preventing the Global Malware Dissemination
Event Date:February 4, 2016 – 12:30 PM to February 5, 2016 – 1:59 PM Location:woodward 335
Resilient Command and Control Infrastructures for Cyber Operation
Event Date:January 16, 2016 – 12:30 PM to January 17, 2016 – 1:59 PM Location:woodward 135
Language Based Approaches to Cyber-Security: Two Case Studies
Event Date:December 3, 2015 – 12:30 PM to December 4, 2015 – 1:59 PM Location:woodward 135
Mitigating Access Control Vulnerabilities through Interactive Static Analysis
Event Date:November 19, 2015 – 12:30 PM to November 20, 2015 – 1:59 PM Location:woodward 135
Real Time Detection and Mitigation of Stealthy Application-level DDoS Attacks
Event Date:November 5, 2015 – 12:30 PM to November 6, 2015 – 1:59 PM Location:woodward 135
Adversary aware IP address randomization for proactive agility against sophisticated attackers
Event Date:October 22, 2015 – 12:30 PM to October 23, 2015 – 1:59 PM Location:woodward 135