User Tools

Site Tools


talks

Research Talks of the Security Group

This page list in chronological order the main public talks of the Security Group in Trento. You can also find them in the individual research topics.

2013

  • Muhammad Rizwan Asghar, Smart Grid Systems: Privacy and Security Issues, The Smart Energy Summer School held at Siemens Technical Academy (STA) Berlin, Germany and University of Paris-Sud, France, August 2013. Poster Slide
  • Luca Allodi Internet-scale vulnerability risk assessment (Extended Abstract). Presentation at Usenix Security LEET 2013. Washington D.C., USA, Aug 2013. Slides
  • Luca Allodi MalwareLab: Experimentation with Cybercrime Attack Tools. Presentation at Usenix Security CSET 2013. Washington D.C., USA, Aug 2013. Slides
  • Luca Allodi, Fabio Massacci How CVSS is DOSsing your patching policy (and wasting your money). Presentation at BlackHat USA 2013. Las Vegas, Nevada, Jul 2013. Slides
  • Luca Allodi Analysis of exploits in the wild. Or: do Cybersecurity Standards Make Sense? Poster session presentation at IEEE Symposium on Security & Privacy 2013. San Francisco, CA, May 2013. abstract and poster (PDFs).
  • Luca Allodi Risk metrics for vulnerabilities exploited in the wild Lecture at University of Milan, April 2013. Abstract Slides
  • Luca Allodi Exploitation in the wild: what do attackers do, and what should(n’t) we care about. UniRoma Tor Vergata. February 2013. Slides
  • Vadim Kotov Anatomy of Exploit Kits. ESSoS'13, Paris, France. March 2013. Slides

2012

  • Muhammad Rizwan Asghar, ESPOON: Enforcing Security Policies in Outsourced Environments, SRI International, Menlo Park, California, USA, August 2012. Slides
  • Luca Allodi. Crime Pays If You Are Just an Average Hacker. Presentation at the 2012 CyberSecurity Conference in Alexandria, Virginia (U.S.), 16 December 2012. Slides
  • Luca Allodi. A Preliminary Analysis of Vulnerability Scores for Attacks in Wild. Presentation at 2012 CCS BADGERS Workshop, Raleigh North Carolina (U.S), 15 Oct 2012 Slides
  • Luca Allodi. Economics of cybercrime. Joint meeting with Ufa State Aviation University, Russia. Trento, Italy. 14 May 2012. Slides
  • Luca Allodi. Some preliminary analysis of the economics of malware kits and traffic brokers. Workshop on “Collaborative Security and Privacy Technologies”. Berlin. 25 April 2012. Slides
  • Fabio Massacci. My software has a vulnerability, should I worry? Siemens Research Center, Munich. 18th December 2012. slides. See also Security Economics and Vulnerability Discover Models
  • Federica Paci. How do you know that a security requirements method actually work? ITT Trust and Security Seminar (TSS), University of Illinois, Urbana-Champaign, IL, USA, September 26 2012.Slides.Work funded by the project NESSOS.
  • Olga Gadyatskaya The Embeddable Security-by-Contract Verifier for Java Card. BYTECODE-2012 Workshop, March 2012. Slides. See also Security-by-Contract for Mobiles and Smart Cards Work funded by projects SECURECHANGE and NESSOS
  • Olga Gadyatskaya, Fabio Massacci Load-Time Security Certification for Real Smart-Cards. FMCO-HATS Summer School Tutorial. September 2012. Slides See also Security-by-Contract for Mobiles and Smart Cards Work funded by projects SECURECHANGE and NESSOS
  • Muhammad Rizwan Asghar, Enforcing Security Policies in Outsourced Environments, The 3rd Workshop on Cryptography (BunnyTN3), Trento, Italy, March 2012.
  • Muhammad Rizwan Asghar, ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems, The 13th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Chapel Hill, North Carolina, USA, July 2012.

2011

  • Muhammad Rizwan Asghar, ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments, The 6th IEEE International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, August 2011.
  • Muhammad Rizwan Asghar, Securing Data Provenance in the Cloud, IFIP WG 11.4 - Open Problems in Network Security (iNetSec), Lucerne, Switzerland, June 2011.
  • Muhammad Rizwan Asghar, Flexible and Dynamic Consent-Capturing, IFIP WG 11.4 - Open Problems in Network Security (iNetSec), Lucerne, Switzerland, June 2011.
  • Muhammad Rizwan Asghar, Enforcing Multi-user Access Policies to Encrypted Cloud Databases, The 12th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Pisa, Italy, June 2011.
  • Fabio Massacci. Managing Security in Services - a Goal & Process Approach. Tutorial at the IEEE International Conference on Intelligence and Security Informatics. 2011 Tutorial Material (Appeared in Lecture Notes of FOSAD' 2011. LNCS Springer Verlag.). –> Security Requirements Engineering. Work funded by the project ANIKETOS and SECURECHANGE.
  • Fabio Massacci. Load‐Time Security Certification for Real Smart‐Cards. Hasso-Plattner Institute Berlin. February 2011. Slides See Security-by-Contract for Mobiles and Smart Cards. Work funded by the project SECURECHANGE and NESSOS.
  • Olga Gadyaskaya, Fabio Massacci. Load‐Time Security Certification for Real Smart‐Cards. Nokia Research Center, January 2011. Slides See Security-by-Contract for Mobiles and Smart Cards. Work funded by the project SECURECHANGE.
talks.txt · Last modified: 2013/09/11 16:27 by m.r.asghar@unitn.it