Information Trust Institute block of abstract images
Information Trust Institute block of abstract images

ITI Trust and Security Seminar (TSS)

About TSS

The Trust & Security Seminar series is held regularly during the academic year. The series presents speakers from both within and outside the University covering all aspects of information trust and the application areas that ITI makes trustworthy. During the academic year, it is typically held in the Coordinated Science Lab Auditorium  (Room B02) on Tuesdays at 4:00 p.m. (this may vary; check the calendar or individual seminar announcements for information on each seminar). Dixie Heath organizes the Trust & Security Seminar series; contact her with requests for speakers or information. If you have questions or problems regarding any of the below video recordings, write to iti-infoatillinois [dot] edu.

Sign up for Seminar Announcements!

To join the iti-announce mailing list, send an email to iti-infoatillinois [dot] edu and in the body of the message request to be added to iti-announce with your email address. This will allow you to receive announcements of upcoming TSS seminars, as well as upcoming lectures in the ITI Distinguished Lecture Series (DLS) and other ITI-related events.

Upcoming and Past TSS Seminars

Upcoming and past TSS seminars are listed below. Please refer to the ITI Calendar for a complete list of upcoming ITI events, including other ITI seminar and lecture series.

 

2016-2017 Series

10/4/16

Tony Sager
Center for Internet Security
"Making Best Practice Common Practice"

2015-2016 Series

5/3/16

Phuong Cao
University of Illinois at Urbana-Champaign

 

"Preemptive Intrusion Detection--Practical Experience and Detection Framework"
Joint TSS/SoS Seminar

4/26/16

Zhenqi Huang and Yu Wang
University of Illinois at Urbana-Champaign

 

"Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems" (Sayan/Geir)
Joint TSS/SoS Seminar

4/12/16

Patrick Traynor
University of Florida

"Who Do I Think You Are? Challenges and Opportunities in Telephony Authentication"
Joint TSS/SoS Speaker Series

4/5/16

Atul Bohara and Uttam Thakore

University of Illinois at Urbana-Champaign

"Intrusion Detection in Enterprise Systems by Combining and Clustering Diverse Monitor Data"

Joint TSS/ACC Seminar

3/15/16

Kevin Jin
Illinois Institute of Technology

"Hypothesis Testing Framework for Network Security"
Joint TSS/SoS Seminar

3/1/16

Wing Lam
University of Illinois at Urbana-Champaign

"Towards Preserving Mobile Users' Privacy in the Context of Utility Apps"
Joint TSS/SoS Seminar

2/23/16

Venugopal Veeravalli
University of Illinois at Urbana-Champaign

"Quickest Detection and Isolation of Line Outages in Power Systems"

2/9/16

J. Alex Halderman
University of Michigan

"Logjam: Diffie-Hellman, Discrete Logs, the NSA, and You"

Joint TSS/SoS Speaker Series

A video of the talk is available

1/26/16

Tao Xie
University of Illinois at Urbana-Champaign

"User Expectations in Mobile App Security"
Joint TSS/SoS Seminar

A video of the talk is available

11/3/15 Zhenqi Huang and Yu Wang
University of Illinois at Urbana-Champaign

"SMT-Based Controller Synthesis for Linear Dynamical Systems with Adversary" 
Joint TSS/SoS Seminar

A video of the talk is available

10/20/15 Mohammad Noureddine
University of Illinois at Urbana-Champaign

"Accounting for User Behavior in Predictive Cyber Security Models"
Joint TSS/SoS Seminar

A video of the talk is available

10/6/15 Eric Badger
University of Illinois at Urbana-Champaign

"Scalable Data Analytics Pipeline for Real-Time Attack Detection; Design, Validation, and Deployment in a Honeypot Environment"
Joint TSS/SoS Seminar

A video of the talk is available

9/30/15 Reza Shokri
University of Texas at Austin

"Privacy-Preserving Deep Learning"

A video of the talk is available

9/21/15 Shuo Chen
Microsoft Research
"Enabling real-world online-service developers to verify their protocol implementations"
9/15/15 P. Brighten Godfrey
University of Illinois at Urbana-Champaign

"A Hypothesis Testing Framework for Network Security "
Joint TSS/SoS Seminar

A video of the talk is available

9/1/15

Charles Kamhoua
AFRL

"Security-aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach"
Joint TSS/ACC Seminar

7/8/15 Griffin Boyce
Harvard University 

"When Usability Kills"

2014-2015 Series

4/29/15 Hamed Okhravi
MIT Lincoln Laboratory 

"Evaluating Cyber Moving Target Techniques"

A video of the talk is available

4/14/15

Zak Estrada
University of Illinois at Urbana-Champaign 

"Dynamic Virtual Machine Monitoring with Hypervisor Probes"

A video of the talk is available

3/17/15

Sibin Mohan
University of Illinois at Urbana-Champaign 

“Integrating Security in Cyber-Physical Systems with Real-Time Constraints”

3/3/15

Nathan Dautenhahn
University of Illinois at Urbana-Champaign 

"Nested Kernel: An Operating System Architecture for Intra-Kernel Memory Privilege Separation"

2/24/15

Sayan Mitra
University of Illinois at Urbana-Champaign 

"From Models and Data to Proofs for Improving Cyber-physical Systems"

2/17/15

Alan M. Carroll and Susan Hinrichs
Yahoo!

"From Security Perimeters to Edge Control"

A video of the talk is available

2/10/15

David M. Nicol
University of Illinois at Urbana-Champaign 

"Efficient Network Connectivity Analysis"

A video of the talk is available

1/27/15

Jiawei Han
University of Illinois at Urbana-Champaign 

“Mining Anomalies in Heterogeneous Networks: Query-Based Mining and Static and Dynamic Network Outliers”

A video of the talk is available

12/2/14

Marco Carvalho
Florida Institute of Technology
and
Florida Institute for Human and Machine Cognition

"An Agent-based Command and Control Framework for Cyber Operations”

10/28/14

Cuong Pham
University of Illinois at Urbana-Champaign 

"Continuous Monitoring for Achieving Reliable & Secure Virtual Machines"

A video of the talk is available:
Rich Media Playback
Vodcast Playback

10/21/14

Ravi Iyer
University of Illinois at Urbana-Champaign 

"Design and Evaluation of Reliable Software Systems"

A video of the talk is available:
Rich Media Playback
Vodcast Playback

9/29/14

Yuri Gurevich
Microsoft Research

"Inverse Privacy"

9/23/14

Haiming Jin
University of Illinois at Urbana-Champaign 

“Secure Data Collection in Constrained Tree-Based Smart Grid Environments”

A video of the talk is available:
Rich Media Playback
Vodcast Playback

9/16/14

Hongyang Li
University of Illinois at Urbana-Champaign

“Portunes: Privacy-Preserving Fast Authentication for Dynamic Electric Vehicle Charging”

A video of the talk is available:
Rich Media Playback
Vodcast Playback

9/9/14

Michael Twidale
University of Illinois at Urbana-Champaign

"The Usability of Security"

A video of the talk is available:
Rich Media Playback
Vodcast Playback

2013-2014 Series 

5/16/14 Taylor T. Johnson
University of Texas at Arlington
"Automated Formal Verification of Distributed Cyber-Physical Systems"
4/16/14

Robin Sommer
ICSI/LBNL

"Network Security Today: Finding Complex Attacks at 100 Gbit/s"
3/19/14 Muhammed Naveed
University of Illinois at Urbana-Champaign 
"Towards secure cloud storage: Blind Storage and Dynamic Searchable Encryption"
11/13/13 Shashank Agrawal
University of Illinois at Urbana-Champaign 

"Function Private Functional Encryption and Property Preserving Encryption: New definitions and Positive Results"

A video of the talk is available

10/30/13 Incheol Shin 
National Security Research Institute
"Security Issues and DDoS Protection Techniques for Smart Grid AMI (Advanced Metering Infrastructure) Networks"
9/30/13 Amit Sahai
University of California, Los Angeles
"How to Encrypt Software"

2012-2013 Series

5/1/13 King-Shan Lui
University of Hong Kong
"Zero Configuration Key Management and Secure Communication for Smart Grids"
4/10/13

Jerry Goodwin
ViaSat Inc.

"ViaSat: Securing Real-Time Control Systems for Critical Infrastructure"

A video of the talk is available:
Rich Media Playback
Vodcast Playback
Podcast Playback

4/3/13 Sibin Mohan
University of Illinois,Urbana-Champaign

"Behavior-based Intrusion Detection for Cyber-Physical Systems"

A video of the talk is available:
Rich Media Playback
Vodcast Playback
Podcast Playback

3/27/13 Tim Yardley
University of Illinois,Urbana-Champaign

"ITI Testbeds: Enabling Advanced Research For Critical Infrastructure"

A video of the talk is available:
Rich Media Playback
Vodcast Playback
Podcast Playback

3/13/13 Jiawei Han
University of Illinois,Urbana-Champaign

"Finding Truth from Multiple Conflicting Sources: A Probabilistic Network-Based Approach"

A video of the talk is available:
Rich Media Playback
Vodcast Playback
Podcast Playback

2/20/13 Jay P. Kesan
University of Illinois,Urbana-Champaign

"Information Privacy and Data Control in Cloud Computing: Consumers, Privacy Preferences, and Market Efficiency"
A video of the talk is available.

2/13/13 Carl Gunter
University of Illinois,Urbana-Champaign
"Strategic Health IT Advanced Research Projects on Security (SHARPS)"
1/31/13 Tariq Ehsan Elahi
University of Waterloo
"Censorship Resistance on the Internet: Strategies and techniques for free and open communication"
12/12/12

Adel Ahmadyan
University of Illinois,Urbana-Champaign

"Efficient Randomized Testing Using Rapidly-Exploring Random Trees for Analog Circuits"
11/14/12 Ali Sunyaev
University of Cologne, Germany
"Secure Provision of Patient-Centered Health IT in Public Networks"
10/26/12 Prasad Naldurg
Microsoft Research India
"Foundations of Dynamic Access Control"
10/17/12 Susan Hinrichs
Network Geographics and UIUC
"Reflections of a Visiting Security Lecturer"
A video of the talk is available. (The talk becomes audible 2 minutes 30 seconds in.)
10/9/12 Jon Peterson
Neustar
"Governing an Internet"
9/26/12 Federica Paci
University of Trento
"How Do You Know that a Security Requirements Method Actually Works?"
9/12/12 Brighten Godfrey
Dept. of Computer Science, UIUC
"Verifying Network-Wide Invariants in the Data Plane"
8/7/12 Rodrigo Rubira Branco
Qualys
"Truly Random Notes on Computer Security"

2011-2012 Series

5/8/12 Anupam Datta
Carnegie Mellon University
"Privacy, Audit and Accountability"
A video of the talk is available.
5/2/12 Rob Johnson
Stony Brook University
"Website Fingerprinting Attacks and Defenses"
4/30/12 Carl Elks
University of Virginia
"Cyber and Dependability Assessment Challenges for the Nuclear Power Plant Digital Instrumentation and Control Systems"
4/25/12 Darko Kirovski
Microsoft
"Optical DNA v2.0: Making Optical Media Impossible to Counterfeit"
4/17/12 Kevin Fu
University of Massachusetts
"Security & Privacy Considerations of Implanted Medical Devices"
A video of the talk is available.
4/16/12 Jim Porell
IBM
"Lessons Learned from Large-Scale Data Thefts"
4/11/12 Maureen Stillman
Mission Critical Wireless, LLC
"LTE Security (4G Security)"
A video of the talk is available.
4/4/12 Marcus Rogers
Purdue University
"The Role of Behavioral Sciences in Information Security and Assurance"
A video of the talk is available.
3/14/12 Apu Kapadia
Indiana University
"(Ab)using Smartphone Sensors: Attacking and Reining in Privacy"
3/7/12 Shari Lawrence Pfleeger
I3P
"Cyber Security from 30,000 Feet: The Benefits of Multidisciplinary Research"
A video of the talk is available.
2/22/12 Michael Davis
Savid Tech.
"Confirmation Bias: How to Stop Doing the Things in Security That Don't Work"
A video of the talk is available.
2/15/12 Quanyan Zhu
University of Illinois at Urbana-Champaign
"Game-Theoretic Gestaltism on Resilient Cyber-Physical Systems"
A video of the talk is available.
2/8/12 Paul McNabb
General Dynamics C4 Systems
"The State and Future of Operating System (OS) Security in Defense and Commercial Markets"
A video of the talk is available.
2/1/12 Nick Feamster
Georgia Tech
"The Battle for Control of Online Communications"
A video of the talk is available.
1/25/12 Ari Gesher
Palantir Technologies
"Using Human-Computer Symbiosis as a Fraud-Detection Architecture"
A video of the talk is available.
11/30/11 Nathan Edwards
University of Illinois at Urbana-Champaign
"Hardware Intrusion Detection: Today's Challenge for Critical Infrastructure"
11/9/11 Pierre Moulin
University of Illinois at Urbana-Champaign
"Robust Fingerprinting and its Applications to Content Identification"
11/2/11 David P. Fidler
Indiana University Maurer School of Law
"Was Stuxnet an Act of War?"
A video of the talk is available.
10/19/11 James Barlow
NCSA, University of Illinois
"Tracking a Hacker: The Long Tail of Incident Response"
10/11/11 Graeme Neilson
Aura Software Security
"Welcome to Rootkit Country"
A video of the talk is available.
9/22/11 Vijay Atluri
Rutgers University
"The Role Mining Problem: A Formal Perspective"
A video of the talk is available.

2010-2011 Series

5/19/11 Reza Shokri
EPFL, Switzerland
"Quantifying Location Privacy"
A recording of the talk is available in multiple formats, including rich media, vodcast, enhanced podcast, and podcast.
4/14/11 Michael Bailey
University of Michigan
"Malware, Botnets, and Beyond"
12/1/10 Angelos Stavrou
George Mason University
"HyperCheck: A Hardware-Assisted Integrity Monitor"
A video of the talk is available. (Note that there is a period of silence during the first 10.5 minutes of the recording, but audio is present for the rest of the talk.)
11/1/10 Geoffrey M. Voelker,
University of California at San Diego
"Exploring the Technical and Economic Factors Underlying Internet Scams"
10/13/10 Hemanta K. Maji
University of Illinois
"On the Computational Complexity of Coin Flipping"
9/29/10 Shuo Tang
University of Illinois
"Trust and Protection in the Illinois Browser Operating System"
9/1/10 Zhiyun Qian
University of Michigan
"Investigation of Triangular Spamming: a Stealthy and Efficient Spamming Technique"

2009-2010 Series

4/20/10 Carrie M. Price
Sandia National Laboratories
"Advanced Malware Trends and Analysis"
4/14/10 Matthew Hicks
University of Illinois at Urbana-Champaign
"Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically"
A video of the talk is available.
2/16/10 Rakesh Bobba
University of Illinois at Urbana-Champaign
"Enabling Secure, Policy-Based, Multi-Recipient Data Sharing"
A video of the talk is available.
11/13/09 Ben Livshits
Microsoft Research
"Ripley: Automatically Securing Web 2.0 Applications Through Replicated Execution"
A video of the talk is available.
11/9/09 Tal Moran
Harvard University
"The Phish-Market Protocol: Securely Sharing Attack Data Between Competitors"
An audio file of the seminar and a PDF of the slides are available
11/3/09 Carmela Troncoso
K.U. Leuven, Belgium
"Pay-as-You-Drive Applications: Privacy Implications and Possible Solutions"
An MV4-format video of the talk is available (525 MB)
9/25/09 Nick Hopper
University of Minnesota
"Scalable Anonymous Overlay Networks"
9/23/09 Todd Millstein
University of California, Los Angeles
"Fine-Grained Access Control with Object-Sensitive Roles"
A video of the seminar is available
9/16/09 Rakesh Bobba
University of Illinois at Urbana-Champaign
"Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption"
9/15/09 Michael LeMay
University of Illinois at Urbana-Champaign
"Cumulative Attestation Kernels for Embedded Systems"
An MV4-format video of the talk is available (348 MB)
9/8/09 Ian Goldberg
University of Waterloo
"Sphinx: A Compact and Provably Secure Mix Format"
A video of the seminar is available.
8/26/09 Robin Berthier
University of Maryland
"Advanced Honeypot Architecture for Network Threats Quantification"

2008-2009 Series

6/24/09 Peter Ryan
University of Luxembourg
"Trust in Voting Technologies"
6/18/09 Peter Kemper
College of William and Mary
"Analyzing Simulation Traces of Stochastic Discrete Event System Models"
5/12/09 David Xiao
Princeton University
"Secure Internet Path Quality Monitoring: Tradeoffs in Security and Efficiency"
A video of the seminar is available.
4/29/09 Klara Nahrstedt
University of Illinois at Urbana-Champaign
"Integrity and Privacy Issues in Advanced Wireless Metering Infrastructure"
4/15/09 Bolin Ding
University of Illinois at Urbana-Champaign
"The State of the Art in Anonymized Data Publishing: Algorithms, Complexity, and Deficiency"
A video of the seminar is available.
4/9/09 Darrin Miller
Cisco Systems
"How Deployment Realities Affect Design: A Network Admission Control Case Study"
4/8/09 Guofei Gu
Texas A&M University
"Botnet: The Rising Internet Threat and New Detection Techniques"
4/3/09 Shishir Nagaraja
Information Trust Institute
"The Snooping Dragon: Social-Malware Surveillance of the Tibetan Movement"
An MV4-format video of the talk is available (344 MB)
4/1/09 Qiyan Wang
University of Illinois at Urbana-Champaign
"Time Valid One-Time Signature for Time-Critical Multicast Data Authentication"
A video of the seminar is available.
3/18/09 Jingwei Huang
Information Trust Institute
"Trust: Concepts, Formal Semantics, Quantification, and Application"
Slides from this talk are available.
3/11/09 Matthew Caesar
University of Illinois at Urbana-Champaign
"Towards a Trustworthy Internet Architecture"
A video of the seminar is available.
2/11/09 Ragib Hasan
University of Illinois at Urbana-Champaign
"The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance"
A video of the seminar is available.
2/4/09 Shishir Nagaraja
Information Trust Institute
"Designing Anonymous Communication Networks with Unstructured Graphs"
A video of the seminar is available.
12/3/08 Anthony Cozzie
University of Illinois at Urbana-Champaign
"Digging for Data Structures"
video of the seminar is available.
11/17/08 Mike Rosulek 
University of Illinois at Urbana-Champaign
"Reconciling Non-malleability with Homomorphic Encryption"
A video of the seminar is available.
10/22/08 Tim Hinrichs
University of Chicago
"Design and Implementation of a Flow-level Network Security System"

2007-2008 Series

7/23/08 Lin Tan
University of Illinois
"AutoISES: Automatically Inferring Security Specifications and Detecting Violations"
5/16/08 Chris Grier
University of Illinois
"Secure Web Browsing with the OP Web Browser"
5/7/08 Peter Popov
City University, London, UK
"Diversity with Off-the-Shelf Relational Database Management Systems (SQL Servers): Empirical Studies on Dependability and Performance"
4/28/08 Yuri Gurevich
Microsoft Research
"New Developments in Access Control: DKAL, Distributed Knowledge Authorization Language"
4/21/08 William F. Walker
Cisco Systems, Inc.
"Use of an XML Gateway in Enterprise Security Architectures"
4/16/08 Jody Westby
Global Cyber Risk LLC
"How Legal Issues Impact Using Commercial Data for Cyber Security R&D"
4/2/08 Chris Clifton
Purdue University
"Measuring Privacy: A Risk-Based Approach"
2/13/08 Adam J. Lee
University of Illinois
"Towards Practical and Secure Decentralized Attribute-Based Authorization Systems"
2/7/08 Dean Haacker
Motorola
"IT Governance at Motorola"
12/5/07 Reza Curtmola
Purdue University
"Do You Have My Data? Prove It! (Provable Data Possession at Untrusted Stores)"
12/4/07 Yan Chen
Northwestern University
"Measurement and Analysis of Misconfigured Peer-to-Peer Traffic"
11/29/07 Benjamin Zorn
Microsoft Research
"Tolerating and Correcting Memory Errors in C and C++"
11/9/07 Yair Amir
Johns Hopkins University
"Scaling Intrusion-Tolerant Replication to Wide-Area Networks"
10/24/07 Radu Sion
Stony Brook University
"Towards Regulatory Compliance in Data Management"
10/3/07 Soumyadeb Mitra
University of Illinois
"Trustworthy Management of Compliant Records"
9/19/07 Peng Ning
NC State University
"Providing DoS-Resistance for Authenticated Broadcast in Wireless Sensor Networks"
9/12/07 Sean Smith
Dartmouth College
"Magic Boxes: Hardware-Based Cybersecurity"

2006-2007 Series

5/9/07 Scott Lintelman
Boeing
"Electronic Distribution of Airplane Software and Data"
4/18/07 Jürgen Scheffran
University of Illinois
"From Cells to Networks: Energy Security Through Renewables"
4/11/07 K. Subramanian
Ministry of Communications & Information Technology, India and Comptroller & Auditor General of India
"eSecurity to eAssurance: A New Paradigm Shift"
4/4/07 Matthias Hollick
Technische Universität Darmstadt
"Vaccinating Ad Hoc Networks Against Misbehaving Nodes"
3/28/07 Nick Multari
Boeing
"LANs in Aircraft, Including Safety and Security Issues and Initial Acceptance Criteria"
3/27/07 Jon A. Solworth
University of Illinois at Chicago
"Rethinking the Operating Systems Protections: Towards a New Security Architecture for Authorization"
1/29/07 Vikram Adve
CS Department, UIUC
"The Compiler's Role in Software Security"
1/17/06 Marina Blanton
Purdue University
"Secret Handshakes with Dynamic and Fuzzy Matching"
12/15/06 Anupam Datta
Stanford University
"Reasoning about Security and Privacy"
12/6/06 Somesh Jha
University of Wisconsin-Madison
"Towards Behavior-based Malware Detection"
11/10/06 R. Sekar
Stony Brook University
"Automated Software Vulnerability Remediation and Immunization"
11/8/06 Steven Borbash
National Security Agency
"Two New Solutions to Computer Security Problems"
11/6/06 Jeff Hughes
Air Force Research Laboratory
"The Software Protection Initiative"
10/18/06 Vitaly Shmatikov
University of Texas at Austin
"Cracking Passwords for Fun and Profit"
10/12/06 Anna Lisa Ferrara
University of Salerno
"Provably-Secure Hierarchical Key Assignment Schemes"
10/11/06 Nicholas Weaver
International Computer Science Institute, Berkeley
"Towards HardLANs: Scaling IDS to 1 Gbps and Beyond"
9/27/06 Adam Lee
University of Illinois
"Safety and Consistency in Policy-Based Authorization Systems"
8/24/06 Kristen LeFevre
UW-Madison
"Anonymity in Data Publishing and Distribution"

2005-2006 Series

4/12/06 Jodie Boyer
University of Illinois
"Privacy Sensitive Location Information Systems in Smart Buildings"
4/5/06 Annie I. Antón
North Carolina State University
"Aligning Privacy Values, Policies, Law and Software Requirements"
1/31/06 Markus Jakobsson
Indiana University
"The Future of Phishing"
12/9/05 Jelena Mirkovic
University of Delaware
"Clouseau: A Practical IP Spoofing Defense Through Route-Based Filtering"
12/7/05 Jiangtao Li
Purdue University
"Automated Trust Negotiation Using Cryptographic Credentials"
11/29/05 Mike Hicks "Cyclone"
11/11/05 Michel Cukier
University of Maryland
"An Experimental Analysis of Scans and Their Impact on Attacks"
10/19/05 Yi-Min Wang
Microsoft Research, Redmond
"Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities"
10/10/05 Andrew Myers
Cornell University
"Programming with Explicit Security Policies"

Spring 2005 Security Seminar Series

Prior to the creation of the ITI Trust and Security Seminar series in 2005, the Security Seminar series offered talks in this topic area. For information on Spring 2005 Security Seminars, see the Security Seminar home page.