Distinguished Lecture Series
About the Distinguished Lecture Series
The ITI Distinguished Lecture Series features speakers who are international leaders in the field of information trust. For more information on the series, or if you have questions or problems regarding any of the below video recordings, write to iti-info@illinois.edu.
Sign up for Announcements
To join the iti-announce mailing list, send an email to iti-info@illinois.edu and in the body of the message request to be added to iti-announce with your email address.
Past Events
2019-2020 Series
10/15/19 | Thomas Ristenpart Cornell University |
"Computer Security for Victims of Abuse" |
9/17/19 | Geoffrey M. Voelker University of California at San Diego |
"Further Adventures in Evidence-Based Security" |
2018-2019 Series
No seminars scheduled
2017-2018 Series
11/16/17 | Dongyan Xu Purdue University |
"A Window to the Past": Uncovering Temporal-Spatial Forensics Information from a Memory Snapshot A video of the talk is available |
2015-2016 Series
3/9/16 | George Cybenko Dartmouth College |
"Behavior Analysis in Security" A video of the talk is available |
10/5/15 | ****CANCELLED**** Ahmad-Reza Sadeghi Technische Universität Darmstadt, Germany |
"Everything You Code Can and Will Be Re-Used Against You" |
2014-2015 Series
4/8/15 | Amit Sahai University of California, Los Angeles |
A video of the talk is available |
10/14/14 | Daniel J. Solove George Washington University |
"Privacy, the Consent Dilemma, and the Problem of Defining Harm" A video of the talk is available |
2013-2014 Series
10/3/13 | Steven M. Bellovin Columbia University |
"Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet" A video of the talk is available |
11/20/13 |
Fred B. Schneider |
|
4/9/14 |
Lorrie Faith Cranor Carnegie Mellon University |
"The continuing quest for secure and usable passwords" |
4/30/14 | Eugene H. Spafford Purdue University |
Why Aren't Our Systems Secure? |
2012-2013 Series
1/30/13 | Charles R. Kalmanek AT&T Labs Inc. |
"Managing Complex Systems: Mobile Networks and Cloud Computing". |
2011-2012 Series
10/4/11 | Elisa Bertino Purdue University |
"Protecting Information Systems from Insider Threats: Concepts and Issues" |
12/8/11 | Robert Bonneau Air Force Office of Scientific Research |
"Complex Information Systems" |
1/18/12 | Stefan Savage University of California, San Diego |
"Looking Before You Leap: The Argument for Data-Driven Security" |
3/27/12 | Jeannette M. Wing Carnegie Mellon University |
"Towards a Theory of Trust in Networks of Humans and Computers" |
2010-2011
4/27/11 | Marc Dacier Symantec Research Labs |
"An Invitation for WINE Testing" Recordings of the talk are available in multiple formats: Rich Media, Vodcast, Enhanced Podcast, and Podcast (MP3). |
2009-2010 Series
11/5/09 | Moti Yung Google, Inc., and Columbia University |
"Kleptography: On the Difficulty of Institutionalizing Trust" A video of the lecture is available (WMV format, 385 MB) |
3/15/10 | Helen Nissenbaum New York University |
"Values in Design: Adnostic and TrackMeNot" |
3/31/10 | Herb Lin Computer Science and Telecommunications Board, National Research Council of the National Academies |
"Understanding U.S. Cyberattack Policy" An MV4-format video of the talk is available (780 MB). |
4/19/10 | Latanya Sweeney Carnegie Mellon University |
"Trustworthy Designs for the Nationwide Health Information Network" A recording of the talk is available. |
2008-2009 Series
12/1/08 | Kevin W. Bowyer University of Notre Dame |
"Next-Generation Iris Biometrics" An MPG video of the talk is available (600 MB) |
1/29/09 | James Larus Microsoft Research |
"The Real Value of Testing" |
3/17/09 | Ari Juels RSA, The Security Division of EMC |
"RFID Tags: Making Silicon Stretch" |
4/2/09 | Raja Parasuraman George Mason University |
"Trust and Complacency in Human Interaction with Automated and Networked Systems" |
4/28/09 | Jean-Pierre Hubaux Ecole Polytechnique Fédérale de Lausanne |
"Security and Non-Cooperative Behavior in Wireless Networks" A video of the lecture is available. |
2007-2008 Series
10/18/07 | Anil K. Jain Michigan State University |
"Biometric Recognition: A New Paradigm for Security." A PDF file of the slides from this talk is now available. |
11/13/07 | Charles C. Palmer I3P & IBM |
"Cyber Security's Missing Link" |
1/22/08 | Edward W. Felten Princeton University |
"Electronic Voting: Danger and Opportunity" |
2/6/08 | Deborah G. Johnson University of Virginia |
"Sociotechnical Trust in Information" A PDF file of slides from this talk is now available. |
2/20/08 | Jonathan M. Smith University of Pennsylvania |
"Continuous Security" |
3/13/08 | Cynthia Dwork Microsoft |
"An Ad Omnia Approach to Defining and Achieving Private Data Analysis" |
4/23/08 | Paul C. Van Oorschot Carleton University |
"Authentication and Usability" |
2006-2007 Series
10/24/06 | George Cybenko Dartmouth College |
"Process Detection for Cyber Security: Theory and Applications" |
11/29/06 | Ton Kalker Hewlett-Packard Laboratories & Technical University of Eindhoven, The Netherlands |
"The Rise and Fall of Digital Rights Management" A PDF of the talk slides is available. |
1/24/07 | Farnam Jahanian University of Michigan |
"The Evolution of Internet Threats: A Perspective-Aware Approach to Network Security in the Botnet Era" |
2/28/07 | Bill Worley Secure64 Software Corporation |
"Genuinely Secure Systems" A related white paper (PDF format) entitled "Eliminating Malware and Rootkits: Six Essential Characteristics of a Genuinely Secure OS" is now available. You can also download PDFs of his slides and a handout version of the slides. |
3/13/07 | Vern Paxson International Computer Science Institute, Berkeley and Lawrence Berkeley National Laboratory |
"Experiences With Countering Internet Attacks" |
4/10/07 | Thomas S. Mathews IBM Systems and Technology Group |
"Emerging System Software Requirements for Internet Based Computing Trends" |