talks
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
talks [2013/03/25 21:16] – [2012] federica.paci@unitn.it | talks [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ===== Talks of the Security Group in Trento | + | ===== Research |
This page list in chronological order the main public talks of the [[start|Security Group]] in Trento. You can also find them in the individual [[research_activities|research topics]]. | This page list in chronological order the main public talks of the [[start|Security Group]] in Trento. You can also find them in the individual [[research_activities|research topics]]. | ||
==== 2013 ==== | ==== 2013 ==== | ||
- | + | * | |
- | * Luca Allodi (Rome Tor Vergata). | + | * Luca Allodi |
- | * Vadim Kotov (ESSOS). | + | * Luca Allodi // |
+ | * Luca Allodi, Fabio Massacci //How CVSS is DOSsing your patching policy (and wasting your money).// Presentation at BlackHat USA 2013. Las Vegas, Nevada, Jul 2013. {{: | ||
+ | * Luca Allodi //Analysis of exploits in the wild. Or: do Cybersecurity Standards Make Sense?// Poster session presentation at IEEE Symposium on Security & Privacy 2013. San Francisco, CA, May 2013. {{: | ||
+ | * Luca Allodi //Risk metrics for vulnerabilities exploited in the wild// Lecture at University of Milan, April 2013. {{abstract.pdf|Abstract}} {{seminar-unimi-apr-13.pdf|Slides}} | ||
+ | * Luca Allodi // | ||
+ | * Vadim Kotov //Anatomy of Exploit Kits. // ESSoS' | ||
==== 2012 ==== | ==== 2012 ==== | ||
+ | * Muhammad Rizwan Asghar, //ESPOON: Enforcing Security Policies in Outsourced Environments//, | ||
+ | * Luca Allodi. //Crime Pays If You Are Just an Average Hacker.// Presentation at the 2012 CyberSecurity Conference in Alexandria, Virginia (U.S.), 16 December 2012. {{cybersec-12.pdf|Slides}} | ||
+ | * Luca Allodi. //A Preliminary Analysis of Vulnerability Scores for Attacks in Wild.// Presentation at 2012 CCS BADGERS Workshop, Raleigh North Carolina (U.S), 15 Oct 2012 {{badgers-12.pdf|Slides}} | ||
+ | * Luca Allodi. //Economics of cybercrime.// | ||
+ | * Luca Allodi. //Some preliminary analysis of the economics of malware kits and traffic brokers.// Workshop on “Collaborative Security and Privacy Technologies”. Berlin. 25 April 2012. {{euforum2012.pdf|Slides}} | ||
* Fabio Massacci. //My software has a vulnerability, | * Fabio Massacci. //My software has a vulnerability, | ||
* Federica Paci. //How do you know that a security requirements method actually work?// ITT Trust and Security Seminar (TSS), University of Illinois, Urbana-Champaign, | * Federica Paci. //How do you know that a security requirements method actually work?// ITT Trust and Security Seminar (TSS), University of Illinois, Urbana-Champaign, | ||
* Olga Gadyatskaya //The Embeddable Security-by-Contract Verifier for Java Card//. BYTECODE-2012 Workshop, March 2012. {{: | * Olga Gadyatskaya //The Embeddable Security-by-Contract Verifier for Java Card//. BYTECODE-2012 Workshop, March 2012. {{: | ||
* Olga Gadyatskaya, | * Olga Gadyatskaya, | ||
+ | * Muhammad Rizwan Asghar, //Enforcing Security Policies in Outsourced Environments//, | ||
* Muhammad Rizwan Asghar, //ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems//, The 13th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Chapel Hill, North Carolina, USA, July 2012. | * Muhammad Rizwan Asghar, //ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems//, The 13th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Chapel Hill, North Carolina, USA, July 2012. | ||
- | * Muhammad Rizwan Asghar, //ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments//, | ||
==== 2011 ==== | ==== 2011 ==== | ||
talks.1364242576.txt.gz · Last modified: (external edit)