User Tools

Site Tools


talks

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
talks [2013/03/25 11:27]
olga.gadyatskaya@unitn.it [2011] added pdf
talks [2021/01/29 10:58] (current)
Line 1: Line 1:
-===== Talks of the Security Group in Trento ​======+===== Research ​Talks of the Security Group ======
  
 This page list in chronological order the main public talks of the [[start|Security Group]] in Trento. You can also find them in the individual [[research_activities|research topics]]. ​ This page list in chronological order the main public talks of the [[start|Security Group]] in Trento. You can also find them in the individual [[research_activities|research topics]]. ​
 ==== 2013 ==== ==== 2013 ====
- +  *   ​Muhammad Rizwan Asghar, //Smart Grid Systems: Privacy and Security Issues//, The Smart Energy Summer School held at Siemens Technical Academy (STA) Berlin, Germany and University of Paris-Sud, France, August 2013. {{Smart-Grid-Systems.pdf|Poster}} {{madness.pdf|Slide}} 
-  * Luca Allodi (Rome Tor Vergata)+  * Luca Allodi ​//​Internet-scale vulnerability risk assessment ​(Extended Abstract).//​ Presentation at Usenix Security LEET 2013. Washington D.C., USA, Aug 2013. {{:​presentation-leet-13-pdf.pdf|Slides}} 
-  * Vadim Kotov (ESSOS).+  * Luca Allodi //​MalwareLab:​ Experimentation with Cybercrime Attack Tools. // Presentation at Usenix Security CSET 2013.  Washington D.C., USA, Aug 2013.  {{:​presentation-cset-13-pdf.pdf|Slides}} 
 +  * Luca Allodi, Fabio Massacci //How CVSS is DOSsing your patching policy (and wasting your money).// Presentation at BlackHat USA 2013. Las Vegas, Nevada, Jul 2013. {{:​allodi-massacci-bhusa13-handout.pdf|Slides}} 
 +  * Luca Allodi //Analysis of exploits in the wild. Or: do Cybersecurity Standards Make Sense?// Poster session presentation at IEEE Symposium on Security & Privacy 2013. San Francisco, CA, May 2013. {{:​s_p-2013-poster.pdf|abstract}} and {{:​ieee-sp-2013-poster-stampa.pdf|poster}} (PDFs). 
 +  * Luca Allodi //Risk metrics for vulnerabilities exploited in the wild// Lecture at University of Milan, April 2013. {{abstract.pdf|Abstract}} {{seminar-unimi-apr-13.pdf|Slides}} 
 +  * Luca Allodi //​Exploitation in the wild: what do attackers do, and what should(n’t) we care about.// UniRoma ​Tor Vergata. ​February 2013. {{seminar-uniroma-feb-12.pdf|Slides}} 
 +  * Vadim Kotov //Anatomy of Exploit Kits. // ESSoS'​13,​ Paris, France. March 2013. {{:​kotov_massacci_anatomy_of_exploit_kits_slides.pdf|Slides}}
 ==== 2012 ==== ==== 2012 ====
 +  * Muhammad Rizwan Asghar, //ESPOON: Enforcing Security Policies in Outsourced Environments//,​ SRI International,​ Menlo Park, California, USA, August 2012. {{espoon-recent.ppt|Slides}} 
 +  * Luca Allodi. //Crime Pays If You Are Just an Average Hacker.// Presentation at the 2012 CyberSecurity Conference in Alexandria, Virginia (U.S.), 16 December 2012. {{cybersec-12.pdf|Slides}} 
 +  * Luca Allodi. //A Preliminary Analysis of Vulnerability Scores for Attacks in Wild.// Presentation at 2012 CCS BADGERS Workshop, Raleigh North Carolina (U.S), 15 Oct 2012 {{badgers-12.pdf|Slides}} 
 +  * Luca Allodi. //Economics of cybercrime.//​ Joint meeting with Ufa State Aviation University, Russia. Trento, Italy. 14 May 2012. {{ufa.pdf|Slides}} 
 +  * Luca Allodi. //Some preliminary analysis of the economics of malware kits and traffic brokers.// Workshop on “Collaborative Security and Privacy Technologies”. Berlin. 25 April 2012. {{euforum2012.pdf|Slides}}
   * Fabio Massacci. //My software has a vulnerability,​ should I worry?// Siemens Research Center, Munich. 18th December 2012. {{mass-2012-siemens-4pages.pdf|slides}}. See also [[security_economics|Security Economics]] and [[vulnerability_discovery_models|Vulnerability Discover Models]]   * Fabio Massacci. //My software has a vulnerability,​ should I worry?// Siemens Research Center, Munich. 18th December 2012. {{mass-2012-siemens-4pages.pdf|slides}}. See also [[security_economics|Security Economics]] and [[vulnerability_discovery_models|Vulnerability Discover Models]]
-  * Federica Paci. //How do you know that a security requirements method actually work?// ITT Trust and Security Seminar (TSS), University of Illinois, Urbana-Champaign,​ IL, USA, September 26 2012. Work funded by the project [[NESSOS]].+  * Federica Paci. //How do you know that a security requirements method actually work?// ITT Trust and Security Seminar (TSS), University of Illinois, Urbana-Champaign,​ IL, USA, September 26 2012.{{paci-erise-seminar.pdf|Slides}}.Work funded by the project [[NESSOS]].
   * Olga Gadyatskaya //The Embeddable Security-by-Contract Verifier for Java Card//. BYTECODE-2012 Workshop, March 2012. {{:​research_activities:​gady-mass-lost-bytecode-2012.pdf|Slides}}. See also [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]] Work funded by projects [[SECURECHANGE]] and [[NESSOS]]   * Olga Gadyatskaya //The Embeddable Security-by-Contract Verifier for Java Card//. BYTECODE-2012 Workshop, March 2012. {{:​research_activities:​gady-mass-lost-bytecode-2012.pdf|Slides}}. See also [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]] Work funded by projects [[SECURECHANGE]] and [[NESSOS]]
   * Olga Gadyatskaya,​ Fabio Massacci // Load-Time Security Certification for Real Smart-Cards.//​ FMCO-HATS Summer School Tutorial. September 2012. {{:​research_activities:​gady-mass-2012-fmco-hats-bertinoro.pdf|Slides}} See also [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]] Work funded by projects [[SECURECHANGE]] and [[NESSOS]]   * Olga Gadyatskaya,​ Fabio Massacci // Load-Time Security Certification for Real Smart-Cards.//​ FMCO-HATS Summer School Tutorial. September 2012. {{:​research_activities:​gady-mass-2012-fmco-hats-bertinoro.pdf|Slides}} See also [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]] Work funded by projects [[SECURECHANGE]] and [[NESSOS]]
 +  * Muhammad Rizwan Asghar, //Enforcing Security Policies in Outsourced Environments//,​ The 3rd Workshop on Cryptography (BunnyTN3), Trento, Italy, March 2012.
 +  * Muhammad Rizwan Asghar, //ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems//, The 13th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Chapel Hill, North Carolina, USA, July 2012.
 ==== 2011 ==== ==== 2011 ====
  
 +  * Muhammad Rizwan Asghar, //ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments//,​ The 6th IEEE International Conference on Availability,​ Reliability and Security (ARES), Vienna, Austria, August 2011.
 +  * Muhammad Rizwan Asghar, //Securing Data Provenance in the Cloud//, IFIP WG 11.4 - Open Problems in Network Security (iNetSec), Lucerne, Switzerland,​ June 2011.
 +  * Muhammad Rizwan Asghar, //Flexible and Dynamic Consent-Capturing//,​ IFIP WG 11.4 - Open Problems in Network Security (iNetSec), Lucerne, Switzerland,​ June 2011.
 +  * Muhammad Rizwan Asghar, //Enforcing Multi-user Access Policies to Encrypted Cloud Databases//,​ The 12th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Pisa, Italy, June 2011.
   * Fabio Massacci. //Managing Security in Services - a Goal & Process Approach//. Tutorial at the IEEE International Conference on Intelligence and Security Informatics. 2011 {{research_activities:​security_requirements_engineering:​tutorial-isi-2011.pdf|Tutorial Material}} (Appeared in Lecture Notes of FOSAD' 2011. LNCS Springer Verlag.). --> [[security_requirements_engineering|Security Requirements Engineering]]. Work funded by the project [[ANIKETOS]] and [[SECURECHANGE]].   * Fabio Massacci. //Managing Security in Services - a Goal & Process Approach//. Tutorial at the IEEE International Conference on Intelligence and Security Informatics. 2011 {{research_activities:​security_requirements_engineering:​tutorial-isi-2011.pdf|Tutorial Material}} (Appeared in Lecture Notes of FOSAD' 2011. LNCS Springer Verlag.). --> [[security_requirements_engineering|Security Requirements Engineering]]. Work funded by the project [[ANIKETOS]] and [[SECURECHANGE]].
   * Fabio Massacci. //​Load‐Time Security Certification for Real Smart‐Cards//​. Hasso-Plattner Institute Berlin. February 2011. {{:​research_activities:​gady-mass-2011-tub.pdf|Slides}} See [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]]. Work funded by the project [[SECURECHANGE]] and [[NESSOS]].   * Fabio Massacci. //​Load‐Time Security Certification for Real Smart‐Cards//​. Hasso-Plattner Institute Berlin. February 2011. {{:​research_activities:​gady-mass-2011-tub.pdf|Slides}} See [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]]. Work funded by the project [[SECURECHANGE]] and [[NESSOS]].
   * Olga Gadyaskaya, Fabio Massacci. //​Load‐Time Security Certification for Real Smart‐Cards//​. Nokia Research Center, January 2011. {{research_activities:​security-by-contract_for_mobile_and_smart_card:​gady-mass-2011-hpi-nokia-4pages.pdf|Slides}} See [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]]. Work funded by the project [[SECURECHANGE]]. ​   * Olga Gadyaskaya, Fabio Massacci. //​Load‐Time Security Certification for Real Smart‐Cards//​. Nokia Research Center, January 2011. {{research_activities:​security-by-contract_for_mobile_and_smart_card:​gady-mass-2011-hpi-nokia-4pages.pdf|Slides}} See [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]]. Work funded by the project [[SECURECHANGE]]. ​
- 
- 
- 
talks.1364207220.txt.gz · Last modified: 2021/01/29 10:58 (external edit)