Seminar Series
About ITI Seminars
The ITI Seminar Series is held regularly during the academic year. The series presents speakers from both within and outside the University covering all aspects of information trust and the application areas that ITI makes trustworthy. During the academic year, it is typically held on Tuesdays (this may vary; check the calendar or individual seminar announcements for information on each seminar). For requests for speakers and information, or if you have questions or problems regarding any of the below video recordings, write to iti-info@illinois.edu.
Sign up for Seminar Announcements!
To join the iti-announce mailing list, send an email to iti-info@illinois.edu and in the body of the message request to be added to iti-announce with your email address.
Upcoming and Past Seminars
4/25/23 | Joe Barnes University of Illinois System |
"Day in the Life of a Security Professional" ITI Monthly Discussion Series |
3/28/23 | Justin Harris Department of Justice |
"Day in the Life of a Security Professional" ITI Monthly Discussion Series |
2/28/23 | Eric Schwarz State Farm |
"Day in the Life of a Security Professional" ITI Monthly Discussion Series |
1/24/23 | Matthew Luallen University of Illinois Urbana-Champaign |
"Day in the Life of a Security Professional" ITI Monthly Discussion Series |
Due to the COVID19 pandemic we took a break on the seminar series. Please check out our past seminars and look for our upcoming seminars in 2022-2023. |
4/29/21 | Iris Tien Georgia Institute of Technology |
"Assessing Risks of 5G –Comparisons Across End-to-End Elements and Interdependent System Risks"
Joint ITI | CIRI Seminar A video of the talk is available
|
3/24/21 | Bistra Dilkina University of Southern California |
"Leveraging AI for Disaster-Resilient Infrastructure Mitigation Planning"
Joint ITI | CIRI Seminar A video of the talk is available
|
3/23/21 | Luis Garcia University of Southern California |
A video of the talk is available
|
1/27/21 | Moderator: Joseph Raetano Panelists: Walt Magnessen, Karthik Balasubramanian, Glen Salo, Junaid Farooq, Quanyan Zhu |
"Panel on Protecting Connected Cities Present and Future "
Joint ITI | CIRI Seminar |
11/12/20 | Iris Tien Georgia Institute of Technology |
"Introducing PRIISM: Probabilistic Resilient Interdependent Infrastructure System Modeling"
Joint ITI | CIRI Seminar A video of the talk is available
|
10/21/20 | Jason Jaskolka Carleton University |
"Implicit Interactions Analysis: A Wastewater Treatment System Case Study"
Joint ITI | CIRI Seminar A video of the talk is available
|
10/13/20 |
Glen Salo Randy Sandone |
Joint ITI | CIRI Seminar
|
9/24/20 |
Noah Dormandy Adam Rose |
Joint ITI | CIRI Seminar
|
8/4/20 | Shangli Yuan and Tooba Hashmi University of Houston Downtown |
"Investigation of Security Weakness and Vulnerability in IoT Routing Protocol and Solution"​ Joint ITI | CIRI Seminar |
2/25/20 | Doug Houseman Burns and McDonnell |
"Don't Expect! 50 years back and forward" Joint ITI | CREDC Seminar |
12/17/19 | Rodolfo Pellizzoni University of Waterloo |
"A Predicable Execution Model for Real-Time Embedded Systems" |
12/10/19 | Stanley Bak Safe Sky Analytics |
"Predictable Autonomy for Cyber-Physical Systems" Joint ITI | SoS Seminar A video of the talk is available |
11/19/19 | Yasser Shoukry University of California, Irvine |
"Formal Verification of End-to-End Deep Reinforcement Learning" Joint ITI | SoS Seminar |
10/22/19 | Jana Diesner University of Illinois at Urbana-Champaign |
"Supporting practitioners and analysts in making decisions about data analytics to study humanitarian assistance and disaster relief operations" Joint ITI | CIRI Webinar |
10/15/19 | Thomas Ristenpart Cornell University |
"Computer Security for Victims of Abuse" ITI Distinguished Lecture (DLS) |
10/3/19 | Chris Nissen The Mitre Corporation |
"Supply Chain Security in an Asymmetric Era" Joint ITI | CIRI Webinar |
10/1/19 | Roger Schell Aesec Corporation |
"Dramatic Cyber-Physical Attack Surface Reduction Leveraging Integrity MAC Security Kernel" Joint ITI | CREDC Weminar |
9/17/19 | Geoffrey M. Voelker University of California at San Diego |
"Further Adventures in Evidence-Based Security" ITI Distinguished Lecture (DLS) |
4/30/19 | Jiaqi Yan Illinois Institute of Technology |
"Classifying Malware Represented as Control Flow Graphs using Deep Graph Convolutional Neural Network" Joint ITI | SoS Seminar |
4/23/19 | Dominic Saebeler Illinois Commerce Commission |
"Business, People & Regulatory Considerations in Cybersecurity and Risk Management: Predicting Viability of Innovative" Joint ITI | CREDC Seminar |
4/2/19 | Hoang Hai Nguyen University of Illinois at Urbana-Champaign |
"Extensions of Network Reliability Analysis " Joint ITI | SoS Seminar |
3/26/19 | Alfonso Valdes University of Illinois at Urbana-Champaign |
"Power Grid Outages in FEMA Region X: Causes, Impacts, and Mitigation" A video of the talk is available |
3/12/19 | Salam Bani-Ahmed University of Illinois at Urbana-Champaign |
"Intrusion Detection and Prevention Systems: An IT/OT Perspective" Joint ITI | CREDC Seminar |
3/11/19 | Taylor T. Johnson Vanderbilt University |
"Safety and Security Assurance in Autonomous Cyber-Physical Systems" A video of the talk is available |
3/4/19 | Aaron Clark-Ginsberg RAND Corporation |
"Regulating Complex Critical Infrastructure Risks: Evidence From the Electric Grid Cybersecurity Standards" Joint ITI | CIRI Webinar |
2/26/19 | Dennis Gammel Schweitzer Engineering Laboratories |
"Challenges and Opportunities for Cryptography in Energy Delivery Systems" |
2/19/19 | Galen Rasche Electric Power Research Institute (EPRI) |
"Cyber Security Roadmap and Research Challenge" Joint ITI | CREDC Seminar |
2/5/19 | Tara Mina and Sriramya Bhamidipati​ University of Illinois at Urbana-Champaign |
"Multi-Receiver GPS Spoofing Detection for PMU Timing Verification using a Hybrid Communications Network" Joint ITI | CIRI | CREDC Seminar |
12/13/18 | Sachin Shetty Old Dominion University |
"Cyber Risk Scoring and Mitigation for Resilient Cyber Infrastructure" Joint ITI | CIRI Webinar |
12/11/18 | Juan Torres Energy Systems Integration |
"Modernizing the Electric Grid: Enhancing Resiliency and Cybersecurity" Joint ITI | CREDC Seminar |
11/15/18 | Iris Tien Georgia Institute of Technology |
"Mapping Infrastructure Interdependencies: Why It Matters and What It Can be Used For" Joint ITI | CIRI Webinar |
11/13/18 | Matthew Wright Rochester Institute of Technology |
"Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning" |
11/6/18 | Glen R. Salo & Chantelle Hougland Heartland Science & Technology |
"The Cyber Secure Dashboard - Institutionalizing Cyber Security Using the NIST Framework" Joint ITI | CREDC Seminar |
10/25/18 |
Adam Rose |
"Measuring the Cost Effectiveness of Static Economic Resilience" Joint ITI | CIRI Webinar |
10/23/18 | Jovana Helms Lawrence Livermore National Laboratory |
"LLNL’S Cyber and Infrastructure Resilience Program" Joint ITI | CREDC Seminar |
9/20/18 | Quanyan Zhu and Rae Zimmerman New York University |
"Dynamic Resiliency Modeling and Planning for Interdependent Critical Infrastructures" Joint ITI | CIRI Webinar |
9/14/18 | Yevgeniy Vorobeychik Washington University in Saint Louis |
"Adversarial AI for Social Good" |
8/8/18 | Gedare Bloom Howard University |
"Resilience in Automotive Intrusion Detection Systems" Joint ITI | CIRI Seminar |
7/31/18 | Vivek Tandon University of Texas at El Paso (UTEP) |
"Impact Assessment of Hydro-Meteorological Events on Texas Pavements and Development of Resiliency Strategy" Joint ITI | CIRI Seminar |
6/29/18 | Margit Scholl Technical University of Applied Sciences (TUAS) |
"Information Security Awareness" |
6/26/18 | Brian Barnes RS21 |
"Visualizing Complexity: Data is Useless, Wisdom is Priceless" Joint ITI | CIRI Webinar |
4/30/18 | Guanhua Yan Binghamton University |
"LEFT: A Testbed for Assessing Resiliency of LTE Mobile Communication Systems" Joint ITI | CIRI Webinar |
4/24/18 | Robert M. Lee Dragos, Inc. |
"Industrial Cyber Threats and Future Planning: Where We're Going We Don't Need Roads" Joint ITI | CREDC Seminar |
4/3/18 | Jianhui Wang Argonne National Lab |
"A Resilient Self-Healing Cyber Security Framework for Power Grid" Joint ITI | CREDC Seminar |
3/27/18 |
Gabe Weaver |
"Assessment and Measurement of Port Disruptions" Joint ITI | CIRI Seminar |
3/13/18 | Mark Guth Nicor Gas |
"IT and OT, Information Security Architectural and Operational Divides in the Energy Sector" Joint ITI | CREDC Seminar |
2/27/18 |
Major General Richard J. Hayes, Jr. |
"Cyber Warfare and Critical Infrastructure: Activities of the DoD and National Guard" A video of the talk is available |
2/20/18 | Jay Kesan University of Illinois at Urbana-Champaign |
"Cyber Risk Assessment to Empower Cyber Insurance Markets" |
2/6/18 | Al Rivero ANG Consulting, LLC |
"Oil and Gas Pipeline Transmission Infrastructure Cybersecurity and Resiliency" Joint ITI | CREDC Seminar |
1/23/18 | Girish Chowdhary University of Illinois at Urbana-Champaign |
"The Robots are Coming - for your Food!" |
11/28/17 |
Arvind Narayanan |
|
11/9/17 |
Tim Yardley |
"Cyber-Physical Experimentation Environment for RADICS (CEER): A Look into the Future of Cyber-Physical Experimentation" A video of the talk is available |
11/7/17 |
Ryan Henry |
"Efficient, Expressive, and Private Information Retrieval via Indexes of Queries" |
10/24/17 |
Paul Pearce |
|
10/10/17 |
Fred Cohn |
"Securing Critical Infrastructure From Sensor to Reactor" A video of the talk is available |
9/26/17 |
Jay Kesan |
"Analyzing Cyberincidents from a Risk Assessment Perspective" A video of the talk is available |
4/11/17 |
Hussein Sibai |
"Optimal Data Rate for State Estimation of Switched Nonlinear Systems" A video of the talk is available |
3/14/17 |
Aniket Kate |
"IOwe You Credit Networks: Not all permissionless payment solutions require a blockchain" |
2/21/17 |
Giulia Fanti |
"Anonymity in Bitcoin Peer-to-Peer Network" |
1/31/17 |
Mengjia Yan |
A video of the talk is available |
1/17/17 |
Nathaniel Gleicher |
"What The Secret Service Can Teach Us About Cybersecurity" A video of the talk is available |
12/6/16 |
Ahmed Fawaz |
"Behavioral Analysis for Cyber Resilience" A video of the talk is available |
11/29/16 |
Dengfeng Li |
"Toward Privacy-Preserving Mobile Utility Apps: A Balance Act" A video of the talk is available |
11/8/16 |
Manowar Hasan |
"Exploring opportunistic execution for integrating security into legacy hard real-time systems" A video of the talk is available |
11/1/16 |
Phuong Cao |
"Automated Generation of Factor Graphs for Security Attacks Detection" A video of the talk is available |
10/18/16 |
Franziska Roesner |
"Computer Security, Privacy, and User Expectations: Case Studies in Web Tracking and Application Permissions" A video of the talk is available |
10/11/16 |
Santhosh Prabhu |
“Oreo: Transparent Optimization to Enable Flexible Policy Enforcement in Software Defined Networks” A video of the talk is available |
10/4/16 |
Tony Sager |
"Making Best Practice Common Practice" A video of the talk is available |
9/20/16 |
Charles Kamhoua |
"Application of Game Theory to High Assurance Cloud Computing" A video of the talk is available |
8/30/16 |
Giulia Fanti |
"Spy vs Spy: Anonymous Messaging over Networks" A video of the talk is available |
5/3/16 |
Phuong Cao
|
"Preemptive Intrusion Detection--Practical Experience and Detection Framework" A video of the talk is available |
4/26/16 |
Zhenqi Huang and Yu Wang
|
"Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems" (Sayan/Geir) A video of the talk is available |
4/12/16 |
Patrick Traynor |
"Who Do I Think You Are? Challenges and Opportunities in Telephony Authentication" |
4/5/16 |
Atul Bohara and Uttam Thakore |
"Intrusion Detection in Enterprise Systems by Combining and Clustering Diverse Monitor Data" A video of the talk is available |
3/15/16 |
Kevin Jin |
"Hypothesis Testing Framework for Network Security" A video of the talk is available |
3/1/16 |
Wing Lam |
"Towards Preserving Mobile Users' Privacy in the Context of Utility Apps" A video of the talk is available |
2/23/16 |
Venugopal Veeravalli |
"Quickest Detection and Isolation of Line Outages in Power Systems" A video of the talk is available |
2/9/16 |
J. Alex Halderman |
"Logjam: Diffie-Hellman, Discrete Logs, the NSA, and You" Joint TSS | SoS Speaker Series A video of the talk is available |
1/26/16 |
Tao Xie |
"User Expectations in Mobile App Security" A video of the talk is available |
11/3/15 |
Zhenqi Huang and Yu Wang |
"SMT-Based Controller Synthesis for Linear Dynamical Systems with Adversary" A video of the talk is available |
10/20/15 |
Mohammad Noureddine |
"Accounting for User Behavior in Predictive Cyber Security Models" A video of the talk is available |
10/6/15 |
Eric Badger |
"Scalable Data Analytics Pipeline for Real-Time Attack Detection; Design, Validation, and Deployment in a Honeypot Environment" A video of the talk is available |
9/30/15 |
Reza Shokri |
"Privacy-Preserving Deep Learning" A video of the talk is available |
9/21/15 |
Shuo Chen |
"Enabling real-world online-service developers to verify their protocol implementations" |
9/15/15 |
P. Brighten Godfrey |
"A Hypothesis Testing Framework for Network Security " A video of the talk is available |
9/1/15 |
Charles Kamhoua |
"Security-aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach" |
7/8/15 |
Griffin Boyce |
4/29/15 |
Hamed Okhravi |
"Evaluating Cyber Moving Target Techniques" A video of the talk is available |
4/14/15 |
Zak Estrada |
"Dynamic Virtual Machine Monitoring with Hypervisor Probes" A video of the talk is available |
3/17/15 |
Sibin Mohan |
“Integrating Security in Cyber-Physical Systems with Real-Time Constraints” |
3/3/15 |
Nathan Dautenhahn |
"Nested Kernel: An Operating System Architecture for Intra-Kernel Memory Privilege Separation" |
2/24/15 |
Sayan Mitra |
"From Models and Data to Proofs for Improving Cyber-physical Systems" |
2/17/15 |
Alan M. Carroll and Susan Hinrichs |
"From Security Perimeters to Edge Control" A video of the talk is available |
2/10/15 |
David M. Nicol |
"Efficient Network Connectivity Analysis" A video of the talk is available |
1/27/15 |
Jiawei Han |
A video of the talk is available |
12/2/14 |
Marco Carvalho |
"An Agent-based Command and Control Framework for Cyber Operations” |
10/28/14 |
Cuong Pham |
"Continuous Monitoring for Achieving Reliable & Secure Virtual Machines" A video of the talk is available: |
10/21/14 |
Ravi Iyer |
"Design and Evaluation of Reliable Software Systems" A video of the talk is available: |
9/29/14 |
Yuri Gurevich |
|
9/23/14 |
Haiming Jin |
“Secure Data Collection in Constrained Tree-Based Smart Grid Environments” A video of the talk is available: |
9/16/14 |
Hongyang Li |
“Portunes: Privacy-Preserving Fast Authentication for Dynamic Electric Vehicle Charging” A video of the talk is available: |
9/9/14 |
Michael Twidale |
A video of the talk is available: |
5/16/14 |
Taylor T. Johnson |
"Automated Formal Verification of Distributed Cyber-Physical Systems" |
4/16/14 |
Robin Sommer |
"Network Security Today: Finding Complex Attacks at 100 Gbit/s" |
3/19/14 |
Muhammed Naveed |
"Towards secure cloud storage: Blind Storage and Dynamic Searchable Encryption" |
11/13/13 |
Shashank Agrawal |
A video of the talk is available |
10/30/13 |
Incheol Shin |
|
9/30/13 |
Amit Sahai |
5/19/11 |
Reza Shokri |
"Quantifying Location Privacy" |
4/14/11 |
Michael Bailey |
|
12/1/10 |
Angelos Stavrou |
"HyperCheck: A Hardware-Assisted Integrity Monitor" |
11/1/10 |
Geoffrey M. Voelker, |
"Exploring the Technical and Economic Factors Underlying Internet Scams" |
10/13/10 |
Hemanta K. Maji |
|
9/29/10 |
Shuo Tang |
"Trust and Protection in the Illinois Browser Operating System" |
9/1/10 |
Zhiyun Qian |
"Investigation of Triangular Spamming: a Stealthy and Efficient Spamming Technique" |
7/23/08 |
Lin Tan |
"AutoISES: Automatically Inferring Security Specifications and Detecting Violations" |
5/16/08 |
Chris Grier |
|
5/7/08 |
Peter Popov |
|
4/28/08 |
Yuri Gurevich |
"New Developments in Access Control: DKAL, Distributed Knowledge Authorization Language" |
4/21/08 |
William F. Walker |
"Use of an XML Gateway in Enterprise Security Architectures" |
4/16/08 |
Jody Westby |
"How Legal Issues Impact Using Commercial Data for Cyber Security R&D" |
4/2/08 |
Chris Clifton |
|
2/13/08 |
Adam J. Lee |
"Towards Practical and Secure Decentralized Attribute-Based Authorization Systems" |
2/7/08 |
Dean Haacker |
|
12/5/07 |
Reza Curtmola |
"Do You Have My Data? Prove It! (Provable Data Possession at Untrusted Stores)" |
12/4/07 |
Yan Chen |
"Measurement and Analysis of Misconfigured Peer-to-Peer Traffic" |
11/29/07 |
Benjamin Zorn |
|
11/9/07 |
Yair Amir |
"Scaling Intrusion-Tolerant Replication to Wide-Area Networks" |
10/24/07 |
Radu Sion |
|
10/3/07 |
Soumyadeb Mitra |
|
9/19/07 |
Peng Ning |
"Providing DoS-Resistance for Authenticated Broadcast in Wireless Sensor Networks" |
9/12/07 |
Sean Smith |
5/9/07 |
Scott Lintelman |
|
4/18/07 |
Jürgen Scheffran |
"From Cells to Networks: Energy Security Through Renewables" |
4/11/07 |
K. Subramanian |
|
4/4/07 |
Matthias Hollick |
|
3/28/07 |
Nick Multari |
"LANs in Aircraft, Including Safety and Security Issues and Initial Acceptance Criteria" |
3/27/07 |
Jon A. Solworth |
|
1/29/07 |
Vikram Adve |
|
1/17/06 |
Marina Blanton |
|
12/15/06 |
Anupam Datta |
|
12/6/06 |
Somesh Jha |
|
11/10/06 |
R. Sekar |
"Automated Software Vulnerability Remediation and Immunization" |
11/8/06 |
Steven Borbash |
|
11/6/06 |
Jeff Hughes |
|
10/18/06 |
Vitaly Shmatikov |
|
10/12/06 |
Anna Lisa Ferrara |
|
10/11/06 |
Nicholas Weaver |
|
9/27/06 |
Adam Lee |
"Safety and Consistency in Policy-Based Authorization Systems" |
8/24/06 |
Kristen LeFevre |
4/12/06 |
Jodie Boyer |
"Privacy Sensitive Location Information Systems in Smart Buildings" |
4/5/06 |
Annie I. Antón |
"Aligning Privacy Values, Policies, Law and Software Requirements" |
1/31/06 |
Markus Jakobsson |
|
12/9/05 |
Jelena Mirkovic |
"Clouseau: A Practical IP Spoofing Defense Through Route-Based Filtering" |
12/7/05 |
Jiangtao Li |
"Automated Trust Negotiation Using Cryptographic Credentials" |
11/29/05 |
Mike Hicks |
|
11/11/05 |
Michel Cukier |
"An Experimental Analysis of Scans and Their Impact on Attacks" |
10/19/05 |
Yi-Min Wang |
|
10/10/05 |
Andrew Myers |
4/12/06 |
Jodie Boyer |
"Privacy Sensitive Location Information Systems in Smart Buildings" |
4/5/06 |
Annie I. Antón |
"Aligning Privacy Values, Policies, Law and Software Requirements" |
1/31/06 |
Markus Jakobsson |
|
12/9/05 |
Jelena Mirkovic |
"Clouseau: A Practical IP Spoofing Defense Through Route-Based Filtering" |
12/7/05 |
Jiangtao Li |
"Automated Trust Negotiation Using Cryptographic Credentials" |
11/29/05 |
Mike Hicks |
|
11/11/05 |
Michel Cukier |
"An Experimental Analysis of Scans and Their Impact on Attacks" |
10/19/05 |
Yi-Min Wang |
|
10/10/05 |
Andrew Myers |
4/12/06 |
Jodie Boyer |
"Privacy Sensitive Location Information Systems in Smart Buildings" |
4/5/06 |
Annie I. Antón |
"Aligning Privacy Values, Policies, Law and Software Requirements" |
1/31/06 |
Markus Jakobsson |
|
12/9/05 |
Jelena Mirkovic |
"Clouseau: A Practical IP Spoofing Defense Through Route-Based Filtering" |
12/7/05 |
Jiangtao Li |
"Automated Trust Negotiation Using Cryptographic Credentials" |
11/29/05 |
Mike Hicks |
|
11/11/05 |
Michel Cukier |
"An Experimental Analysis of Scans and Their Impact on Attacks" |
10/19/05 |
Yi-Min Wang |
|
10/10/05 |
Andrew Myers |
4/12/06 |
Jodie Boyer |
"Privacy Sensitive Location Information Systems in Smart Buildings" |
4/5/06 |
Annie I. Antón |
"Aligning Privacy Values, Policies, Law and Software Requirements" |
1/31/06 |
Markus Jakobsson |
|
12/9/05 |
Jelena Mirkovic |
"Clouseau: A Practical IP Spoofing Defense Through Route-Based Filtering" |
12/7/05 |
Jiangtao Li |
"Automated Trust Negotiation Using Cryptographic Credentials" |
11/29/05 |
Mike Hicks |
|
11/11/05 |
Michel Cukier |
"An Experimental Analysis of Scans and Their Impact on Attacks" |
10/19/05 |
Yi-Min Wang |
|
10/10/05 |
Andrew Myers |
4/12/06 |
Jodie Boyer |
"Privacy Sensitive Location Information Systems in Smart Buildings" |
4/5/06 |
Annie I. Antón |
"Aligning Privacy Values, Policies, Law and Software Requirements" |
1/31/06 |
Markus Jakobsson |
|
12/9/05 |
Jelena Mirkovic |
"Clouseau: A Practical IP Spoofing Defense Through Route-Based Filtering" |
12/7/05 |
Jiangtao Li |
"Automated Trust Negotiation Using Cryptographic Credentials" |
11/29/05 |
Mike Hicks |
|
11/11/05 |
Michel Cukier |
"An Experimental Analysis of Scans and Their Impact on Attacks" |
10/19/05 |
Yi-Min Wang |
|
10/10/05 |
Andrew Myers |
Spring 2005 Security Seminar Series
Prior to the creation of the ITI Trust and Security Seminar series in 2005, the Security Seminar series offered talks in this topic area. We currently do not have links to seminars before 2005.