Research Talks of the Security Group
This page list in chronological order the main public talks of the Security Group in Trento. You can also find them in the individual research topics.
2013
Muhammad Rizwan Asghar,
Smart Grid Systems: Privacy and Security Issues, The Smart Energy Summer School held at Siemens Technical Academy (STA) Berlin, Germany and University of Paris-Sud, France, August 2013.
Poster Slide
Luca Allodi
Internet-scale vulnerability risk assessment (Extended Abstract). Presentation at Usenix Security LEET 2013. Washington D.C., USA, Aug 2013.
Slides
Luca Allodi
MalwareLab: Experimentation with Cybercrime Attack Tools. Presentation at Usenix Security CSET 2013. Washington D.C., USA, Aug 2013.
Slides
Luca Allodi, Fabio Massacci
How CVSS is DOSsing your patching policy (and wasting your money). Presentation at BlackHat USA 2013. Las Vegas, Nevada, Jul 2013.
Slides
Luca Allodi
Analysis of exploits in the wild. Or: do Cybersecurity Standards Make Sense? Poster session presentation at IEEE Symposium on Security & Privacy 2013. San Francisco, CA, May 2013.
abstract and
poster (PDFs).
Luca Allodi
Risk metrics for vulnerabilities exploited in the wild Lecture at University of Milan, April 2013.
Abstract Slides
Luca Allodi
Exploitation in the wild: what do attackers do, and what should(n’t) we care about. UniRoma Tor Vergata. February 2013.
Slides
Vadim Kotov
Anatomy of Exploit Kits. ESSoS'13, Paris, France. March 2013.
Slides
2012
Muhammad Rizwan Asghar,
ESPOON: Enforcing Security Policies in Outsourced Environments, SRI International, Menlo Park, California, USA, August 2012.
Slides
Luca Allodi.
Crime Pays If You Are Just an Average Hacker. Presentation at the 2012 CyberSecurity Conference in Alexandria, Virginia (U.S.), 16 December 2012.
Slides
Luca Allodi.
A Preliminary Analysis of Vulnerability Scores for Attacks in Wild. Presentation at 2012 CCS BADGERS Workshop, Raleigh North Carolina (U.S), 15 Oct 2012
Slides
Luca Allodi.
Economics of cybercrime. Joint meeting with Ufa State Aviation University, Russia. Trento, Italy. 14 May 2012.
Slides
Luca Allodi.
Some preliminary analysis of the economics of malware kits and traffic brokers. Workshop on “Collaborative Security and Privacy Technologies”. Berlin. 25 April 2012.
Slides
-
Federica Paci.
How do you know that a security requirements method actually work? ITT Trust and Security Seminar (TSS), University of Illinois, Urbana-Champaign, IL, USA, September 26 2012.
Slides.Work funded by the project
NESSOS.
-
-
Muhammad Rizwan Asghar, Enforcing Security Policies in Outsourced Environments, The 3rd Workshop on Cryptography (BunnyTN3), Trento, Italy, March 2012.
Muhammad Rizwan Asghar, ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems, The 13th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Chapel Hill, North Carolina, USA, July 2012.
2011
Muhammad Rizwan Asghar, ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments, The 6th IEEE International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, August 2011.
Muhammad Rizwan Asghar, Securing Data Provenance in the Cloud, IFIP WG 11.4 - Open Problems in Network Security (iNetSec), Lucerne, Switzerland, June 2011.
Muhammad Rizwan Asghar, Flexible and Dynamic Consent-Capturing, IFIP WG 11.4 - Open Problems in Network Security (iNetSec), Lucerne, Switzerland, June 2011.
Muhammad Rizwan Asghar, Enforcing Multi-user Access Policies to Encrypted Cloud Databases, The 12th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Pisa, Italy, June 2011.
-
-
-