Seminar Series
Risk and Resilience: Promoting Adolescent Online Safety and Privacy through Human-Centered Computing
April 3. 2024 3:00-4:00 pm. WWH 335. Dr. Wisniewski’s research expertise is situated at the juxtaposition of Human-Computer Interaction (HCI), Social Computing, Privacy, and Online Safety. She views privacy as a social mechanism that helps people regulate their interpersonal boundaries with others in a way that facilitates more meaningful connections and safer online interactions with […]
IoTility: A Programming Model for the Internet of Things
March 27 10:30-11:30 WWH 335. While we all share the excitements of great IoT visions and impressive IoT scenarios and possibilities, we do not yet have a clear pathway to realizing this vision systematically and on a broad and large scale. In fact, it can be argued that the focus on vision and abstracting away […]
A Step Toward Trustworthy Binary Verification
Nov 30, 2023, 11:30-12:30 WWH 335 Many production software systems are available only in binary form. This is due to severalreasons including intellectual property and proprietary issues, outdated and decaying buildprocesses and environments, and third-party libraries and tools that are no longer available orbackwards compatible. Security vulnerability analysis of such software is still a necessary […]
The Front Lines of DFIR
Nov 9th 11:30-12:30 WWH 335 Global politics shift, and cyber attackers evolve, pushing the DFIR industry to its limits. We’ll examine the impact of geopolitical changes on cyber threats and the urgent need for the continued evolution of DFIR tools and investigative techniques. This talk will present the influence of global dynamics on attack strategies, […]
What we learned about ‘Who Falls for SMiSh?” U.S. Demographic Vulnerabilities to SMiShing
Oct 26th 11:30-12:30 WWH 335 As adoption of mobile phones has skyrocketed, so have scams involving them. The text method is called “SMiShing,” (aka “SMShing”, or “smishing”) in which a fraudster sends a phishing link via Short Message Service (SMS) text to a phone. However, no data exists onwho is most vulnerable to SMiShing. Prior […]
Extracting Actionable Cyber Threat Intelligence with Large Language Models
Oct 5th 11:30-12:30 WWH 335 Actionable cyber threat intelligence is vital for effective defense. In practice, indicators of compromises (IP addresses or domains) are used to alert potential malicious activities. However, such alerts lack important context for defenders to take effective actions. For example, given an alert concerning an IP address, a defender wants to […]
A Realistic Testbed for Replicating Large-scale Botnet DDoS Attacks
Thursday Sep 21 11:30-12:30 WWH 335 DDoSim, a simulation testbed for mimicking real-world, large-scale botnet DDoS attacks, is presented. DDoSim offers various capabilities, including running user-specified software, testing botnet recruitment exploits, and measuring the severity of resulting DDoS attacks. DDoSim leverages the integration of Docker and NS-3 to load Docker containers with actual binaries and […]
Securing Critical Cyber Infrastructures and Functionalities via ML Empowered Designs
Event Date:April 11, 2023 – 11:00 AM to 12:00 PM Location:Woodward Hall 335
Intelligent Methods for Active Cyber Defense in Critical Application Infrastructures
Event Date:March 28, 2023 – 11:00 AM to 12:00 PM Location:Woodward Hall 335
Quantum-Proof Security for Information Systems: Fundamental limits and coding schemes
Event Date:March 17, 2023 – 11:00 AM to 12:00 PM Location:Woodward Hall 335