Seminars and Lectures
About ITI Seminars
The ITI Seminar Series is held regularly during the academic year. The series presents speakers from both within and outside the University covering all aspects of information trust and the application areas that ITI makes trustworthy. During the academic year, it is typically held on Tuesdays (this may vary); check the calendar or individual seminar announcements for information on each seminar.
Distinguished Lecture Series
The ITI Distinguished Lecture Series features speakers who are international leaders in the field of information trust.
ITI Special Seminars
ITI occasionally brings in external speakers from industry, government, and academia for the ITI Special Seminar series. This series features topics that fall outside those usually discussed in the ITI Seminar and ITI Distinguished Lecture Series.
For requests for speakers and information, or if you have questions or problems regarding any of the below video recordings, write to iti-info@illinois.edu.
Sign up for Seminar Announcements!
To join the iti-announce mailing list, send an email to iti-info@illinois.edu and in the body of the message request to be added to iti-announce mailing list with your email address.
Upcoming and Past Seminars/Lectures
10/24/23 | Mark Scott Director of Product Engineering at Forcepoint |
"Day in the Life" ITI Monthly Discussion Series |
4/25/23 | Joe Barnes University of Illinois System |
"Day in the Life of a Security Professional" ITI Monthly Discussion Series |
3/28/23 | Justin Harris Department of Justice |
"Day in the Life of a Security Professional" ITI Monthly Discussion Series |
2/28/23 | Eric Schwarz State Farm |
"Day in the Life of a Security Professional" ITI Monthly Discussion Series |
1/24/23 | Matthew Luallen University of Illinois Urbana-Champaign |
"Day in the Life of a Security Professional" ITI Monthly Discussion Series |
Due to the COVID19 pandemic we took a break on the seminar series. Please check out our past seminars and look for our upcoming seminars in 2022-2023. |
4/29/21 | Iris Tien Georgia Institute of Technology |
"Assessing Risks of 5G –Comparisons Across End-to-End Elements and Interdependent System Risks"
Joint ITI | CIRI Seminar A video of the talk is available
|
3/24/21 | Bistra Dilkina University of Southern California |
"Leveraging AI for Disaster-Resilient Infrastructure Mitigation Planning"
Joint ITI | CIRI Seminar A video of the talk is available
|
3/23/21 | Luis Garcia University of Southern California |
A video of the talk is available
|
1/27/21 | Moderator: Joseph Raetano Panelists: Walt Magnessen, Karthik Balasubramanian, Glen Salo, Junaid Farooq, Quanyan Zhu |
"Panel on Protecting Connected Cities Present and Future "
Joint ITI | CIRI Seminar |
11/12/20 | Iris Tien Georgia Institute of Technology |
"Introducing PRIISM: Probabilistic Resilient Interdependent Infrastructure System Modeling"
Joint ITI | CIRI Seminar A video of the talk is available
|
10/21/20 | Jason Jaskolka Carleton University |
"Implicit Interactions Analysis: A Wastewater Treatment System Case Study"
Joint ITI | CIRI Seminar A video of the talk is available
|
10/13/20 |
Glen Salo |
Joint ITI | CIRI Seminar
|
9/24/20 |
Noah Dormandy Adam Rose |
Joint ITI | CIRI Seminar
|
8/4/20 | Shangli Yuan and Tooba Hashmi University of Houston Downtown |
"Investigation of Security Weakness and Vulnerability in IoT Routing Protocol and Solution"​ Joint ITI | CIRI Seminar |
2/25/20 | Doug Houseman Burns and McDonnell |
"Don't Expect! 50 years back and forward" Joint ITI | CREDC Seminar |
12/17/19 | Rodolfo Pellizzoni University of Waterloo |
"A Predicable Execution Model for Real-Time Embedded Systems" |
12/10/19 | Stanley Bak Safe Sky Analytics |
"Predictable Autonomy for Cyber-Physical Systems" Joint ITI | SoS Seminar A video of the talk is available |
11/19/19 | Yasser Shoukry University of California, Irvine |
"Formal Verification of End-to-End Deep Reinforcement Learning" Joint ITI | SoS Seminar |
10/22/19 | Jana Diesner University of Illinois at Urbana-Champaign |
"Supporting practitioners and analysts in making decisions about data analytics to study humanitarian assistance and disaster relief operations" Joint ITI | CIRI Webinar |
10/15/19 | Thomas Ristenpart Cornell University |
"Computer Security for Victims of Abuse" ITI Distinguished Lecture |
10/3/19 | Chris Nissen The Mitre Corporation |
"Supply Chain Security in an Asymmetric Era" Joint ITI | CIRI Webinar |
10/1/19 | Roger Schell Aesec Corporation |
"Dramatic Cyber-Physical Attack Surface Reduction Leveraging Integrity MAC Security Kernel" Joint ITI | CREDC Webinar |
9/17/19 | Geoffrey M. Voelker University of California at San Diego |
"Further Adventures in Evidence-Based Security" ITI Distinguished Lecture |
4/30/19 | Jiaqi Yan Illinois Institute of Technology |
"Classifying Malware Represented as Control Flow Graphs using Deep Graph Convolutional Neural Network" Joint ITI | SoS Seminar |
4/23/19 | Dominic Saebeler Illinois Commerce Commission |
"Business, People & Regulatory Considerations in Cybersecurity and Risk Management: Predicting Viability of Innovative" Joint ITI | CREDC Seminar |
4/2/19 | Hoang Hai Nguyen University of Illinois at Urbana-Champaign |
"Extensions of Network Reliability Analysis " Joint ITI | SoS Seminar |
3/26/19 | Alfonso Valdes University of Illinois at Urbana-Champaign |
"Power Grid Outages in FEMA Region X: Causes, Impacts, and Mitigation" A video of the talk is available |
3/12/19 | Salam Bani-Ahmed University of Illinois at Urbana-Champaign |
"Intrusion Detection and Prevention Systems: An IT/OT Perspective" Joint ITI | CREDC Seminar |
3/11/19 | Taylor T. Johnson Vanderbilt University |
"Safety and Security Assurance in Autonomous Cyber-Physical Systems" A video of the talk is available |
3/4/19 | Aaron Clark-Ginsberg RAND Corporation |
"Regulating Complex Critical Infrastructure Risks: Evidence From the Electric Grid Cybersecurity Standards" Joint ITI | CIRI Webinar |
2/26/19 | Dennis Gammel Schweitzer Engineering Laboratories |
"Challenges and Opportunities for Cryptography in Energy Delivery Systems" |
2/19/19 | Galen Rasche Electric Power Research Institute (EPRI) |
"Cyber Security Roadmap and Research Challenge" Joint ITI | CREDC Seminar |
2/5/19 | Tara Mina and Sriramya Bhamidipati​ University of Illinois at Urbana-Champaign |
"Multi-Receiver GPS Spoofing Detection for PMU Timing Verification using a Hybrid Communications Network" Joint ITI | CIRI | CREDC Seminar |
12/13/18 | Sachin Shetty Old Dominion University |
"Cyber Risk Scoring and Mitigation for Resilient Cyber Infrastructure" Joint ITI | CIRI Webinar |
12/11/18 | Juan Torres Energy Systems Integration |
"Modernizing the Electric Grid: Enhancing Resiliency and Cybersecurity" Joint ITI | CREDC Seminar |
11/16/18 | Kat Fitzgerald Zebra Technologies |
"Security Practitioner Series" Special Seminar |
11/15/18 | Iris Tien Georgia Institute of Technology |
"Mapping Infrastructure Interdependencies: Why It Matters and What It Can be Used For" Joint ITI | CIRI Webinar |
11/13/18 | Matthew Wright Rochester Institute of Technology |
"Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning" |
11/6/18 | Glen R. Salo & Chantelle Hougland Heartland Science & Technology |
"The Cyber Secure Dashboard - Institutionalizing Cyber Security Using the NIST Framework" Joint ITI | CREDC Seminar |
10/29/18 |
Kate Kuehn |
"Computer Security Practitioner Series" Special Seminar |
10/25/18 |
Adam Rose |
"Measuring the Cost Effectiveness of Static Economic Resilience" Joint ITI | CIRI Webinar |
10/23/18 | Jovana Helms Lawrence Livermore National Laboratory |
"LLNL’S Cyber and Infrastructure Resilience Program" Joint ITI | CREDC Seminar |
9/20/18 | Quanyan Zhu and Rae Zimmerman New York University |
"Dynamic Resiliency Modeling and Planning for Interdependent Critical Infrastructures" Joint ITI | CIRI Webinar |
9/14/18 | Yevgeniy Vorobeychik Washington University in Saint Louis |
"Adversarial AI for Social Good" |
8/8/18 | Gedare Bloom Howard University |
"Resilience in Automotive Intrusion Detection Systems" Joint ITI | CIRI Seminar |
7/31/18 | Vivek Tandon University of Texas at El Paso (UTEP) |
"Impact Assessment of Hydro-Meteorological Events on Texas Pavements and Development of Resiliency Strategy" Joint ITI | CIRI Seminar |
4/11/17 |
Hussein Sibai |
"Optimal Data Rate for State Estimation of Switched Nonlinear Systems" A video of the talk is available |
3/14/17 |
Aniket Kate |
"I Owe You Credit Networks: Not all permission-less payment solutions require a blockchain" |
3/9/16 |
George Cybenko |
"Behavior Analysis in Security" A video of the talk is available |
2/21/17 |
Giulia Fanti |
"Anonymity in Bitcoin Peer-to-Peer Network" |
1/31/17 |
Mengjia Yan |
A video of the talk is available |
1/17/17 |
Nathaniel Gleicher |
"What The Secret Service Can Teach Us About Cybersecurity" A video of the talk is available |
12/6/16 |
Ahmed Fawaz |
"Behavioral Analysis for Cyber Resilience" A video of the talk is available |
11/29/16 |
Dengfeng Li |
"Toward Privacy-Preserving Mobile Utility Apps: A Balance Act" A video of the talk is available |
11/8/16 |
Manowar Hasan |
"Exploring opportunistic execution for integrating security into legacy hard real-time systems" A video of the talk is available |
11/1/16 |
Phuong Cao |
"Automated Generation of Factor Graphs for Security Attacks Detection" A video of the talk is available |
10/18/16 |
Franziska Roesner |
"Computer Security, Privacy, and User Expectations: Case Studies in Web Tracking and Application Permissions" A video of the talk is available |
10/11/16 |
Santhosh Prabhu |
“Oreo: Transparent Optimization to Enable Flexible Policy Enforcement in Software Defined Networks” A video of the talk is available |
10/4/16 |
Tony Sager |
"Making Best Practice Common Practice" A video of the talk is available |
9/20/16 |
Charles Kamhoua |
"Application of Game Theory to High Assurance Cloud Computing" A video of the talk is available |
8/30/16 |
Giulia Fanti |
"Spy vs Spy: Anonymous Messaging over Networks" A video of the talk is available |
5/3/16 |
Phuong Cao
|
"Preemptive Intrusion Detection--Practical Experience and Detection Framework" A video of the talk is available |
4/26/16 |
Zhenqi Huang and Yu Wang
|
"Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems" (Sayan/Geir) A video of the talk is available |
4/12/16 |
Patrick Traynor |
"Who Do I Think You Are? Challenges and Opportunities in Telephony Authentication" |
4/5/16 |
Atul Bohara and Uttam Thakore |
"Intrusion Detection in Enterprise Systems by Combining and Clustering Diverse Monitor Data" A video of the talk is available |
3/15/16 |
Kevin Jin |
"Hypothesis Testing Framework for Network Security" A video of the talk is available |
3/1/16 |
Wing Lam |
"Towards Preserving Mobile Users' Privacy in the Context of Utility Apps" A video of the talk is available |
2/23/16 |
Venugopal Veeravalli |
"Quickest Detection and Isolation of Line Outages in Power Systems" A video of the talk is available |
2/9/16 |
J. Alex Halderman |
"Logjam: Diffie-Hellman, Discrete Logs, the NSA, and You" A video of the talk is available |
1/26/16 |
Tao Xie |
"User Expectations in Mobile App Security" A video of the talk is available |
11/3/15 |
Zhenqi Huang and Yu Wang |
"SMT-Based Controller Synthesis for Linear Dynamical Systems with Adversary" A video of the talk is available |
10/20/15 |
Mohammad Noureddine |
"Accounting for User Behavior in Predictive Cyber Security Models" A video of the talk is available |
10/6/15 |
Eric Badger |
"Scalable Data Analytics Pipeline for Real-Time Attack Detection; Design, Validation, and Deployment in a Honeypot Environment" A video of the talk is available |
9/30/15 |
Reza Shokri |
"Privacy-Preserving Deep Learning" A video of the talk is available |
9/21/15 |
Shuo Chen |
"Enabling real-world online-service developers to verify their protocol implementations" |
9/15/15 |
P. Brighten Godfrey |
"A Hypothesis Testing Framework for Network Security " A video of the talk is available |
9/1/15 |
Charles Kamhoua |
"Security-aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach" |
7/8/15 |
Griffin Boyce |
4/29/15 |
Hamed Okhravi |
"Evaluating Cyber Moving Target Techniques" A video of the talk is available |
4/14/15 |
Zak Estrada |
"Dynamic Virtual Machine Monitoring with Hypervisor Probes" A video of the talk is available |
4/8/15 |
Amit Sahai |
"Hiding Secrets in Software" A video of the talk is available |
3/17/15 |
Sibin Mohan |
“Integrating Security in Cyber-Physical Systems with Real-Time Constraints” |
3/3/15 |
Nathan Dautenhahn |
"Nested Kernel: An Operating System Architecture for Intra-Kernel Memory Privilege Separation" |
2/24/15 |
Sayan Mitra |
"From Models and Data to Proofs for Improving Cyber-physical Systems" |
2/17/15 |
Alan M. Carroll and Susan Hinrichs |
"From Security Perimeters to Edge Control" A video of the talk is available |
2/10/15 |
David M. Nicol |
"Efficient Network Connectivity Analysis" A video of the talk is available |
1/27/15 |
Jiawei Han |
A video of the talk is available |
12/2/14 |
Marco Carvalho |
"An Agent-based Command and Control Framework for Cyber Operations” |
10/28/14 |
Cuong Pham |
"Continuous Monitoring for Achieving Reliable & Secure Virtual Machines" A video of the talk is available: |
10/21/14 |
Ravi Iyer |
"Design and Evaluation of Reliable Software Systems" A video of the talk is available: |
10/14/14 |
Daniel J. Solove |
"Privacy, the Consent Dilemma, and the Problem of Defining Harm" A video of the talk is available |
9/29/14 |
Yuri Gurevich |
|
9/23/14 |
Haiming Jin |
“Secure Data Collection in Constrained Tree-Based Smart Grid Environments” A video of the talk is available: |
9/16/14 |
Hongyang Li |
“Portunes: Privacy-Preserving Fast Authentication for Dynamic Electric Vehicle Charging” A video of the talk is available: |
9/9/14 |
Michael Twidale |
A video of the talk is available: |
5/16/14 |
Taylor T. Johnson |
"Automated Formal Verification of Distributed Cyber-Physical Systems" |
4/30/14 |
Eugene H. Spafford |
"Why Aren't Our Systems Secure?" |
4/16/14 |
Robin Sommer |
"Network Security Today: Finding Complex Attacks at 100 Gbit/s" |
4/9/14 |
Lorrie Faith Cranor |
"The continuing quest for secure and usable passwords" |
3/19/14 |
Muhammed Naveed |
"Towards secure cloud storage: Blind Storage and Dynamic Searchable Encryption" |
11/20/13 |
Fred B. Schneider |
"Blueprint for a Science of Cyber-security" |
11/13/13 |
Shashank Agrawal |
A video of the talk is available |
10/30/13 |
Incheol Shin |
|
10/3/13 |
Steven M. Bellovin |
"Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet" A video of the talk is available |
9/30/13 |
Amit Sahai |
5/8/12 |
Anupam Datta |
"Privacy, Audit and Accountability" |
5/2/12 |
Rob Johnson |
|
4/30/12 |
Carl Elks |
|
4/25/12 |
Darko Kirovski |
"Optical DNA v2.0: Making Optical Media Impossible to Counterfeit" |
4/17/12 |
Kevin Fu |
"Security & Privacy Considerations of Implanted Medical Devices" |
4/16/12 |
Jim Porell |
|
4/11/12 |
Maureen Stillman |
"LTE Security (4G Security)" |
4/4/12 |
Marcus Rogers |
"The Role of Behavioral Sciences in Information Security and Assurance" |
3/27/12 |
Jeannette M. Wing |
"Towards a Theory of Trust in Networks of Humans and Computers" |
3/14/12 |
Apu Kapadia |
"(Ab)using Smartphone Sensors: Attacking and Reining in Privacy" |
3/7/12 |
Shari Lawrence Pfleeger |
"Cyber Security from 30,000 Feet: The Benefits of Multidisciplinary Research" |
2/22/12 |
Michael Davis |
"Confirmation Bias: How to Stop Doing the Things in Security That Don't Work" |
2/15/12 |
Quanyan Zhu |
"Game-Theoretic Gestaltism on Resilient Cyber-Physical Systems" |
2/8/12 |
Paul McNabb |
"The State and Future of Operating System (OS) Security in Defense and Commercial Markets" |
2/1/12 |
Nick Feamster |
"The Battle for Control of Online Communications" |
1/25/12 |
Ari Gesher |
"Using Human-Computer Symbiosis as a Fraud-Detection Architecture" |
1/18/12 |
Stefan Savage |
"Looking Before You Leap: The Argument for Data-Driven Security" |
12/8/11 |
Robert Bonneau |
"Complex Information Systems" |
11/30/11 |
Nathan Edwards |
"Hardware Intrusion Detection: Today's Challenge for Critical Infrastructure" |
11/9/11 |
Pierre Moulin |
"Robust Fingerprinting and its Applications to Content Identification" |
11/2/11 |
David P. Fidler |
"Was Stuxnet an Act of War?" |
10/19/11 |
James Barlow |
|
10/11/11 |
Graeme Neilson |
"Welcome to Rootkit Country" |
10/4/11 |
Elisa Bertino |
"Protecting Information Systems from Insider Threats: Concepts and Issues" |
9/22/11 |
Vijay Atluri |
"The Role Mining Problem: A Formal Perspective" |
5/19/11 |
Reza Shokri |
"Quantifying Location Privacy" |
4/27/11 |
Marc Dacier |
"An Invitation for WINE Testing" |
4/14/11 |
Michael Bailey |
|
12/1/10 |
Angelos Stavrou |
"HyperCheck: A Hardware-Assisted Integrity Monitor" |
11/1/10 |
Geoffrey M. Voelker, |
"Exploring the Technical and Economic Factors Underlying Internet Scams" |
10/13/10 |
Hemanta K. Maji |
|
9/29/10 |
Shuo Tang |
"Trust and Protection in the Illinois Browser Operating System" |
9/1/10 |
Zhiyun Qian |
"Investigation of Triangular Spamming: a Stealthy and Efficient Spamming Technique" |
4/20/10 |
Carrie M. Price |
|
4/19/10 |
Latanya Sweeney |
"Trustworthy Designs for the Nationwide Health Information Network" |
4/14/10 |
Matthew Hicks |
"Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically" |
3/31/10 |
Herb Lin |
"Understanding U.S. Cyberattack Policy" |
3/15/10 |
Helen Nissenbaum |
"Values in Design: Adnostic and TrackMeNot" |
2/16/10 |
Rakesh Bobba |
"Enabling Secure, Policy-Based, Multi-Recipient Data Sharing" |
11/13/09 |
Ben Livshits |
"Ripley: Automatically Securing Web 2.0 Applications Through Replicated Execution" |
11/9/09 |
Tal Moran |
"The Phish-Market Protocol: Securely Sharing Attack Data Between Competitors" |
11/5/09 |
Moti Yung |
"Kleptography: On the Difficulty of Institutionalizing Trust" |
11/3/09 |
Carmela Troncoso |
"Pay-as-You-Drive Applications: Privacy Implications and Possible Solutions" |
9/25/09 |
Nick Hopper |
|
9/23/09 |
Todd Millstein |
"Fine-Grained Access Control with Object-Sensitive Roles" |
9/16/09 |
Rakesh Bobba |
"Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption" |
9/15/09 |
Michael LeMay |
"Cumulative Attestation Kernels for Embedded Systems" |
9/8/09 |
Ian Goldberg |
"Sphinx: A Compact and Provably Secure Mix Format" |
8/26/09 |
Robin Berthier |
"Advanced Honeypot Architecture for Network Threats Quantification" |
7/23/08 |
Lin Tan |
"AutoISES: Automatically Inferring Security Specifications and Detecting Violations" |
5/16/08 |
Chris Grier |
|
5/7/08 |
Peter Popov |
|
4/28/08 |
Yuri Gurevich |
"New Developments in Access Control: DKAL, Distributed Knowledge Authorization Language" |
4/23/08 |
Paul C. Van Oorschot |
"Authentication and Usability" |
4/21/08 |
William F. Walker |
"Use of an XML Gateway in Enterprise Security Architectures" |
4/16/08 |
Jody Westby |
"How Legal Issues Impact Using Commercial Data for Cyber Security R&D" |
4/2/08 |
Chris Clifton |
|
3/13/08 |
Cynthia Dwork |
"An Ad Omnia Approach to Defining and Achieving Private Data Analysis" |
2/20/08 |
Jonathan M. Smith |
"Continuous Security" |
2/13/08 |
Adam J. Lee |
"Towards Practical and Secure Decentralized Attribute-Based Authorization Systems" |
2/7/08 |
Dean Haacker |
|
2/6/08 |
Deborah G. Johnson |
"Sociotechnical Trust in Information" |
1/22/08 |
Edward W. Felten |
"Electronic Voting: Danger and Opportunity" |
12/5/07 |
Reza Curtmola |
"Do You Have My Data? Prove It! (Provable Data Possession at Untrusted Stores)" |
12/4/07 |
Yan Chen |
"Measurement and Analysis of Misconfigured Peer-to-Peer Traffic" |
11/29/07 |
Benjamin Zorn |
|
11/13/07 |
Charles C. Palmer |
"Cyber Security's Missing Link" |
11/9/07 |
Yair Amir |
"Scaling Intrusion-Tolerant Replication to Wide-Area Networks" |
10/24/07 |
Radu Sion |
|
10/18/07 |
Anil K. Jain |
"Biometric Recognition: A New Paradigm for Security." |
10/3/07 |
Soumyadeb Mitra |
|
9/19/07 |
Peng Ning |
"Providing DoS-Resistance for Authenticated Broadcast in Wireless Sensor Networks" |
9/12/07 |
Sean Smith |
5/9/07 |
Scott Lintelman |
|
4/18/07 |
Jürgen Scheffran |
"From Cells to Networks: Energy Security Through Renewables" |
4/11/07 |
K. Subramanian |
|
4/10/07 |
Thomas S. Mathews |
"Emerging System Software Requirements for Internet Based Computing Trends" |
4/4/07 |
Matthias Hollick |
|
3/28/07 |
Nick Multari |
"LANs in Aircraft, Including Safety and Security Issues and Initial Acceptance Criteria" |
3/27/07 |
Jon A. Solworth |
|
3/13/07 |
Vern Paxson |
"Experiences With Countering Internet Attacks" |
2/28/07 |
Bill Worley |
"Genuinely Secure Systems" |
1/29/07 |
Vikram Adve |
|
1/24/07 |
Farnam Jahanian |
"The Evolution of Internet Threats: A Perspective-Aware Approach to Network Security in the Botnet Era" |
1/17/06 |
Marina Blanton |
|
12/15/06 |
Anupam Datta |
|
12/6/06 |
Somesh Jha |
|
11/29/06 |
Ton Kalker |
"The Rise and Fall of Digital Rights Management" |
11/10/06 |
R. Sekar |
"Automated Software Vulnerability Remediation and Immunization" |
11/8/06 |
Steven Borbash |
|
11/6/06 |
Jeff Hughes |
|
10/24/06 |
George Cybenko |
"Process Detection for Cyber Security: Theory and Applications" |
10/18/06 |
Vitaly Shmatikov |
|
10/12/06 |
Anna Lisa Ferrara |
|
10/11/06 |
Nicholas Weaver |
|
9/27/06 |
Adam Lee |
"Safety and Consistency in Policy-Based Authorization Systems" |
8/24/06 |
Kristen LeFevre |
5/3/06 |
Virgil D. Gligor |
"On the Evolution of Adversary Models in Security Protocols - from the Beginning to Sensor Networks" |
4/12/06 |
Jodie Boyer |
"Privacy Sensitive Location Information Systems in Smart Buildings" |
4/5/06 |
John Rushby |
"What Might a Science of Certification Look Like?" |
4/5/06 |
Annie I. Antón |
"Aligning Privacy Values, Policies, Law and Software Requirements" |
3/15/06 |
John Baras |
"Cooperative Games, Statistical Physics and Trust in Ad-Hoc Networks" (some electronic files related to this talk, and two other talks presented at UIUC by Prof. Baras, are available online; additionally, a Windows Media video of the entire talk is available online) |
2/22/06 |
John C. Knight |
"Faulty Human Communications: Its Impact on Dependability and What To Do About It"; a PDF handout of the slides from this talk is now available. |
1/31/06 |
Markus Jakobsson |
|
1/19/06 |
Michael Reiter |
"Computer Security Meets Pervasive Computing - Security by, and for, Converged Mobile Devices" |
12/9/05 |
Jelena Mirkovic |
"Clouseau: A Practical IP Spoofing Defense Through Route-Based Filtering" |
12/7/05 |
Jiangtao Li |
"Automated Trust Negotiation Using Cryptographic Credentials" |
11/29/05 |
Mike Hicks |
|
11/11/05 |
Michel Cukier |
"An Experimental Analysis of Scans and Their Impact on Attacks" |
11/2/05 |
Brian Randell |
"Dependable Pervasive Systems" |
10/24/05 |
Matt Bishop |
"Vulnerabilities Analysis" |
10/19/05 |
Yi-Min Wang |
|
10/10/05 |
Andrew Myers |
|
10/5/05 |
Jacob Abraham |
"Verification Challenges in Embedded System Design" |
Spring 2005 Security Seminar SeriesPrior to the creation of the ITI Trust and Security Seminar series in 2005, the Security Seminar series offered talks in this topic area. We currently do not have links to seminars before 2005. |