This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
talks [2013/03/24 18:39] fabio.massacci@unitn.it [2012] |
talks [2013/09/11 16:27] m.r.asghar@unitn.it [2013] |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ===== Talks of the Security Group in Trento ====== | + | ===== Research Talks of the Security Group ====== |
This page list in chronological order the main public talks of the [[start|Security Group]] in Trento. You can also find them in the individual [[research_activities|research topics]]. | This page list in chronological order the main public talks of the [[start|Security Group]] in Trento. You can also find them in the individual [[research_activities|research topics]]. | ||
==== 2013 ==== | ==== 2013 ==== | ||
- | + | * Muhammad Rizwan Asghar, **Smart Grid Systems: Privacy and Security Issues**, The Smart Energy Summer School held at Siemens Technical Academy (STA) Berlin, Germany and University of Paris-Sud, France, August 2013. {{Smart-Grid-Systems.pdf|Poster}} {{madness.pdf|Slide}} | |
- | * Luca Allodi (Rome Tor Vergata). | + | * Luca Allodi //Internet-scale vulnerability risk assessment (Extended Abstract).// Presentation at Usenix Security LEET 2013. Washington D.C., USA, Aug 2013. {{:presentation-leet-13-pdf.pdf|Slides}} |
- | * Vadim Kotov (ESSOS). | + | * Luca Allodi //MalwareLab: Experimentation with Cybercrime Attack Tools. // Presentation at Usenix Security CSET 2013. Washington D.C., USA, Aug 2013. {{:presentation-cset-13-pdf.pdf|Slides}} |
+ | * Luca Allodi, Fabio Massacci //How CVSS is DOSsing your patching policy (and wasting your money).// Presentation at BlackHat USA 2013. Las Vegas, Nevada, Jul 2013. {{:allodi-massacci-bhusa13-handout.pdf|Slides}} | ||
+ | * Luca Allodi //Analysis of exploits in the wild. Or: do Cybersecurity Standards Make Sense?// Poster session presentation at IEEE Symposium on Security & Privacy 2013. San Francisco, CA, May 2013. {{:s_p-2013-poster.pdf|abstract}} and {{:ieee-sp-2013-poster-stampa.pdf|poster}} (PDFs). | ||
+ | * Luca Allodi //Risk metrics for vulnerabilities exploited in the wild// Lecture at University of Milan, April 2013. {{abstract.pdf|Abstract}} {{seminar-unimi-apr-13.pdf|Slides}} | ||
+ | * Luca Allodi //Exploitation in the wild: what do attackers do, and what should(n’t) we care about.// UniRoma Tor Vergata. February 2013. {{seminar-uniroma-feb-12.pdf|Slides}} | ||
+ | * Vadim Kotov //Anatomy of Exploit Kits. // ESSoS'13, Paris, France. March 2013. {{:kotov_massacci_anatomy_of_exploit_kits_slides.pdf|Slides}} | ||
==== 2012 ==== | ==== 2012 ==== | ||
+ | * Muhammad Rizwan Asghar, //ESPOON: Enforcing Security Policies in Outsourced Environments//, SRI International, Menlo Park, California, USA, August 2012. {{espoon-recent.ppt|Slides}} | ||
+ | * Luca Allodi. //Crime Pays If You Are Just an Average Hacker.// Presentation at the 2012 CyberSecurity Conference in Alexandria, Virginia (U.S.), 16 December 2012. {{cybersec-12.pdf|Slides}} | ||
+ | * Luca Allodi. //A Preliminary Analysis of Vulnerability Scores for Attacks in Wild.// Presentation at 2012 CCS BADGERS Workshop, Raleigh North Carolina (U.S), 15 Oct 2012 {{badgers-12.pdf|Slides}} | ||
+ | * Luca Allodi. //Economics of cybercrime.// Joint meeting with Ufa State Aviation University, Russia. Trento, Italy. 14 May 2012. {{ufa.pdf|Slides}} | ||
+ | * Luca Allodi. //Some preliminary analysis of the economics of malware kits and traffic brokers.// Workshop on “Collaborative Security and Privacy Technologies”. Berlin. 25 April 2012. {{euforum2012.pdf|Slides}} | ||
* Fabio Massacci. //My software has a vulnerability, should I worry?// Siemens Research Center, Munich. 18th December 2012. {{mass-2012-siemens-4pages.pdf|slides}}. See also [[security_economics|Security Economics]] and [[vulnerability_discovery_models|Vulnerability Discover Models]] | * Fabio Massacci. //My software has a vulnerability, should I worry?// Siemens Research Center, Munich. 18th December 2012. {{mass-2012-siemens-4pages.pdf|slides}}. See also [[security_economics|Security Economics]] and [[vulnerability_discovery_models|Vulnerability Discover Models]] | ||
- | * Federica Paci. //How do you know that a security requirements method actually work?// ITT Trust and Security Seminar (TSS), University of Illinois, Urbana-Champaign, IL, USA, September 26 2012. Work funded by the project [[NESSOS]]. | + | * Federica Paci. //How do you know that a security requirements method actually work?// ITT Trust and Security Seminar (TSS), University of Illinois, Urbana-Champaign, IL, USA, September 26 2012.{{paci-erise-seminar.pdf|Slides}}.Work funded by the project [[NESSOS]]. |
+ | * Olga Gadyatskaya //The Embeddable Security-by-Contract Verifier for Java Card//. BYTECODE-2012 Workshop, March 2012. {{:research_activities:gady-mass-lost-bytecode-2012.pdf|Slides}}. See also [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]] Work funded by projects [[SECURECHANGE]] and [[NESSOS]] | ||
+ | * Olga Gadyatskaya, Fabio Massacci // Load-Time Security Certification for Real Smart-Cards.// FMCO-HATS Summer School Tutorial. September 2012. {{:research_activities:gady-mass-2012-fmco-hats-bertinoro.pdf|Slides}} See also [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]] Work funded by projects [[SECURECHANGE]] and [[NESSOS]] | ||
+ | * Muhammad Rizwan Asghar, //Enforcing Security Policies in Outsourced Environments//, The 3rd Workshop on Cryptography (BunnyTN3), Trento, Italy, March 2012. | ||
+ | * Muhammad Rizwan Asghar, //ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems//, The 13th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Chapel Hill, North Carolina, USA, July 2012. | ||
==== 2011 ==== | ==== 2011 ==== | ||
+ | * Muhammad Rizwan Asghar, //ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments//, The 6th IEEE International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, August 2011. | ||
+ | * Muhammad Rizwan Asghar, //Securing Data Provenance in the Cloud//, IFIP WG 11.4 - Open Problems in Network Security (iNetSec), Lucerne, Switzerland, June 2011. | ||
+ | * Muhammad Rizwan Asghar, //Flexible and Dynamic Consent-Capturing//, IFIP WG 11.4 - Open Problems in Network Security (iNetSec), Lucerne, Switzerland, June 2011. | ||
+ | * Muhammad Rizwan Asghar, //Enforcing Multi-user Access Policies to Encrypted Cloud Databases//, The 12th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Pisa, Italy, June 2011. | ||
* Fabio Massacci. //Managing Security in Services - a Goal & Process Approach//. Tutorial at the IEEE International Conference on Intelligence and Security Informatics. 2011 {{research_activities:security_requirements_engineering:tutorial-isi-2011.pdf|Tutorial Material}} (Appeared in Lecture Notes of FOSAD' 2011. LNCS Springer Verlag.). --> [[security_requirements_engineering|Security Requirements Engineering]]. Work funded by the project [[ANIKETOS]] and [[SECURECHANGE]]. | * Fabio Massacci. //Managing Security in Services - a Goal & Process Approach//. Tutorial at the IEEE International Conference on Intelligence and Security Informatics. 2011 {{research_activities:security_requirements_engineering:tutorial-isi-2011.pdf|Tutorial Material}} (Appeared in Lecture Notes of FOSAD' 2011. LNCS Springer Verlag.). --> [[security_requirements_engineering|Security Requirements Engineering]]. Work funded by the project [[ANIKETOS]] and [[SECURECHANGE]]. | ||
- | * Fabio Massacci. //Load‐Time Security Certification for Real Smart‐Cards//. Hasso-Plattner Institute Berlin. February 2011. See [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]]. Work funded by the project [[SECURECHANGE]] and [[NESSOS]]. | + | * Fabio Massacci. //Load‐Time Security Certification for Real Smart‐Cards//. Hasso-Plattner Institute Berlin. February 2011. {{:research_activities:gady-mass-2011-tub.pdf|Slides}} See [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]]. Work funded by the project [[SECURECHANGE]] and [[NESSOS]]. |
- | * Olga Gadyaskaya, Fabio Massacci. //Load‐Time Security Certification for Real Smart‐Cards//. Nokia Research Center, January 2011. See [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]]. Work funded by the project [[SECURECHANGE]]. {{research_activities:security-by-contract_for_mobile_and_smart_card:gady-mass-2011-hpi-nokia-4pages.pdf|Slides}} | + | * Olga Gadyaskaya, Fabio Massacci. //Load‐Time Security Certification for Real Smart‐Cards//. Nokia Research Center, January 2011. {{research_activities:security-by-contract_for_mobile_and_smart_card:gady-mass-2011-hpi-nokia-4pages.pdf|Slides}} See [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]]. Work funded by the project [[SECURECHANGE]]. |
- | + | ||
- | + |