User Tools

Site Tools


talks

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
talks [2013/04/11 18:40]
luca.allodi@unitn.it [2013]
talks [2021/01/29 10:58] (current)
Line 1: Line 1:
-===== Talks of the Security Group in Trento ​======+===== Research ​Talks of the Security Group ======
  
 This page list in chronological order the main public talks of the [[start|Security Group]] in Trento. You can also find them in the individual [[research_activities|research topics]]. ​ This page list in chronological order the main public talks of the [[start|Security Group]] in Trento. You can also find them in the individual [[research_activities|research topics]]. ​
 ==== 2013 ==== ==== 2013 ====
-  * Luca Allodi //Risk metrics for vulnerabilities exploited in the wild// Lecture at University of Milan, April 2013. {{abstract.pdf|Abstract}}{{seminar-unimi-apr-13.pdf|Slides}}+  ​*   ​Muhammad Rizwan Asghar, //Smart Grid Systems: Privacy and Security Issues//, The Smart Energy Summer School held at Siemens Technical Academy (STA) Berlin, Germany and University of Paris-Sud, France, August 2013. {{Smart-Grid-Systems.pdf|Poster}} {{madness.pdf|Slide}} 
 +  * Luca Allodi //​Internet-scale vulnerability risk assessment (Extended Abstract).//​ Presentation at Usenix Security LEET 2013. Washington D.C., USA, Aug 2013. {{:​presentation-leet-13-pdf.pdf|Slides}} 
 +  * Luca Allodi //​MalwareLab:​ Experimentation with Cybercrime Attack Tools. // Presentation at Usenix Security CSET 2013.  Washington D.C., USA, Aug 2013.  {{:​presentation-cset-13-pdf.pdf|Slides}} 
 +  * Luca Allodi, Fabio Massacci //How CVSS is DOSsing your patching policy (and wasting your money).// Presentation at BlackHat USA 2013. Las Vegas, Nevada, Jul 2013. {{:​allodi-massacci-bhusa13-handout.pdf|Slides}} 
 +  * Luca Allodi //Analysis of exploits in the wild. Or: do Cybersecurity Standards Make Sense?// Poster session presentation at IEEE Symposium on Security & Privacy 2013. San Francisco, CA, May 2013. {{:​s_p-2013-poster.pdf|abstract}} and {{:​ieee-sp-2013-poster-stampa.pdf|poster}} (PDFs). 
 +  ​* Luca Allodi //Risk metrics for vulnerabilities exploited in the wild// Lecture at University of Milan, April 2013. {{abstract.pdf|Abstract}} {{seminar-unimi-apr-13.pdf|Slides}}
   * Luca Allodi //​Exploitation in the wild: what do attackers do, and what should(n’t) we care about.// UniRoma Tor Vergata. February 2013. {{seminar-uniroma-feb-12.pdf|Slides}}   * Luca Allodi //​Exploitation in the wild: what do attackers do, and what should(n’t) we care about.// UniRoma Tor Vergata. February 2013. {{seminar-uniroma-feb-12.pdf|Slides}}
   * Vadim Kotov //Anatomy of Exploit Kits. // ESSoS'​13,​ Paris, France. March 2013. {{:​kotov_massacci_anatomy_of_exploit_kits_slides.pdf|Slides}}   * Vadim Kotov //Anatomy of Exploit Kits. // ESSoS'​13,​ Paris, France. March 2013. {{:​kotov_massacci_anatomy_of_exploit_kits_slides.pdf|Slides}}
 ==== 2012 ==== ==== 2012 ====
 +  * Muhammad Rizwan Asghar, //ESPOON: Enforcing Security Policies in Outsourced Environments//,​ SRI International,​ Menlo Park, California, USA, August 2012. {{espoon-recent.ppt|Slides}}
   * Luca Allodi. //Crime Pays If You Are Just an Average Hacker.// Presentation at the 2012 CyberSecurity Conference in Alexandria, Virginia (U.S.), 16 December 2012. {{cybersec-12.pdf|Slides}}   * Luca Allodi. //Crime Pays If You Are Just an Average Hacker.// Presentation at the 2012 CyberSecurity Conference in Alexandria, Virginia (U.S.), 16 December 2012. {{cybersec-12.pdf|Slides}}
   * Luca Allodi. //A Preliminary Analysis of Vulnerability Scores for Attacks in Wild.// Presentation at 2012 CCS BADGERS Workshop, Raleigh North Carolina (U.S), 15 Oct 2012 {{badgers-12.pdf|Slides}}   * Luca Allodi. //A Preliminary Analysis of Vulnerability Scores for Attacks in Wild.// Presentation at 2012 CCS BADGERS Workshop, Raleigh North Carolina (U.S), 15 Oct 2012 {{badgers-12.pdf|Slides}}
Line 15: Line 21:
   * Olga Gadyatskaya //The Embeddable Security-by-Contract Verifier for Java Card//. BYTECODE-2012 Workshop, March 2012. {{:​research_activities:​gady-mass-lost-bytecode-2012.pdf|Slides}}. See also [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]] Work funded by projects [[SECURECHANGE]] and [[NESSOS]]   * Olga Gadyatskaya //The Embeddable Security-by-Contract Verifier for Java Card//. BYTECODE-2012 Workshop, March 2012. {{:​research_activities:​gady-mass-lost-bytecode-2012.pdf|Slides}}. See also [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]] Work funded by projects [[SECURECHANGE]] and [[NESSOS]]
   * Olga Gadyatskaya,​ Fabio Massacci // Load-Time Security Certification for Real Smart-Cards.//​ FMCO-HATS Summer School Tutorial. September 2012. {{:​research_activities:​gady-mass-2012-fmco-hats-bertinoro.pdf|Slides}} See also [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]] Work funded by projects [[SECURECHANGE]] and [[NESSOS]]   * Olga Gadyatskaya,​ Fabio Massacci // Load-Time Security Certification for Real Smart-Cards.//​ FMCO-HATS Summer School Tutorial. September 2012. {{:​research_activities:​gady-mass-2012-fmco-hats-bertinoro.pdf|Slides}} See also [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]] Work funded by projects [[SECURECHANGE]] and [[NESSOS]]
 +  * Muhammad Rizwan Asghar, //Enforcing Security Policies in Outsourced Environments//,​ The 3rd Workshop on Cryptography (BunnyTN3), Trento, Italy, March 2012.
   * Muhammad Rizwan Asghar, //ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems//, The 13th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Chapel Hill, North Carolina, USA, July 2012.   * Muhammad Rizwan Asghar, //ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems//, The 13th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Chapel Hill, North Carolina, USA, July 2012.
-  * Muhammad Rizwan Asghar, //ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments//,​ The 6th IEEE International Conference on Availability,​ Reliability and Security (ARES), Vienna, Austria, August 2011. 
 ==== 2011 ==== ==== 2011 ====
  
talks.1365698450.txt.gz · Last modified: 2021/01/29 10:58 (external edit)