Seminars

Upcoming events

  • 17 June 2021, 16:00
    Andrew Lewis-Pye, LSE
    Consensus in the Permissionless Setting
    [Zoom Registration] [Live Stream]
    Abstract: In the distributed computing literature, consensus protocols have traditionally been studied in a setting where all participants are known to each other from the start of the protocol execution. In the parlance of the ‘blockchain’ literature, this is referred to as the permissioned setting. What differentiates the most prominent blockchain protocol Bitcoin from these previously studied protocols is that it operates in a permissionless setting, i.e. it is a protocol for establishing consensus over an unknown network of participants that anybody can join, with as many identities as they like in any role. I’ll talk about recent work with Tim Roughgarden in which we describe a formal framework for the analysis of both permissioned and permissionless systems.

    Bio: Andrew Lewis-Pye is a Professor in the Department of Mathematics at the London School of Economics. Prior to coming to LSE, he was a Royal Society University Research Fellow at the University of Leeds, and a Marie-Curie Fellow at the University of Siena. The bulk of his research has been in Computability Theory and Algorithmic Randomness, but he has also worked in fields as diverse as Network Science, Statistical Mechanics and Population Genetics. His most recent research interests are in cryptocurrencies.

  • 15 July 2021, 16:00
    Steffen Becker and Carina Wiesen, Ruhr-Universität Bochum
    Towards Cognitive Obfuscation - Understanding Cognitive Processes of Hardware Reverse Engineers
    [Zoom Registration] [Live Stream]

FAQs

  • In what time zone are the seminars?
    All seminars are on London time (typically at 16:00).
  • Can people not affiliated with UCL attend the seminars?
    Yes, seminars are open to everyone! At the moment, we’re virtual, so you just need to request the Zoom details or join the YouTube livestream. When we’ll restart in-person, we’ll post more details.
  • What’s the difference between ACE and InfoSec Seminars?
    ACE Seminars were part of our distinguished seminar series, organized with the support of, and funding from, the Academic Center of Excellence in Cyber Security Research (ACE-CSR). InfoSec Seminars were informal-in-nature talks given by members of UCL’s InfoSec group on very recent/work-in-progress research, but open to everyone nonetheless (unless explicitly noted). As all seminars are virtual at the moment, there is no difference.
  • How do I subscribe to seminar announcements?
    You can subscribe to our mailing list by sending an email with subject “subscribe” to infosec-seminars-join (at) ucl.ac.uk. You can also subscribe to our Google Calendar: [ICS] [HTML].
  • How can I learn more about InfoSec research and teaching activities at UCL?
    Check out the UCL’s InfoSec research group page. We also run an MSc in Information Security Degree and a Centre for Doctoral Training in Cybersecurity, and maintain a blog called Bentham’s Gaze.
  • Any other questions?
    Please email us!

Past Events

2021

  • 10 June 2021, 16:00
    Nicolas Christin, Carnegie Mellon University
    Cryptocurrency trading at 10: From “Monopoly money” to billion-dollar derivatives markets
    [Zoom Registration] [Live Stream]
    Abstract: In a little more than a decade, modern cryptocurrencies have gone from a marginal product used mostly by hobbyists, to a viable alternative currency for fringe markets, to supporting an entire class of financial assets. In this talk, I will start by looking at the early days of spot markets (fiat for cryptocurrency), outlining some of the inherent risks in that ecosystem. I will then discuss how, since 2018, the cryptocurrency trading landscape has evolved to a hybrid ecosystem featuring complex and popular derivatives products. I will present results based on our study of BitMEX, one of the first derivatives platforms for leveraged cryptocurrency trading. BitMEX trades on average over 3 billion dollars worth of volume per day, and allows users to go long or short Bitcoin with up to 100x leverage. I will discuss how BitMEX products have become the standard across other cryptocurrency derivatives platforms, such as Binance, FTX, or others, which now feature daily trading volumes that, in aggregate, rival those of the New York Stock Exchange. Through an analysis on-chain forensics, public liquidation events, and a site-wide chat room, I will describe the diverse ensemble of amateur and professional traders that forms this community, and how derivative trading has impacted cryptocurrency asset prices, notably how it has led to dramatic price movements in the underlying spot markets.

    Bio: Nicolas Christin is an Associate Professor (with tenure) at Carnegie Mellon University, jointly appointed in the School of Computer Science and the Department of Engineering and Public Policy. He holds a Ph.D. in Computer Science from the University of Virginia, and was a post-doc at UC Berkeley prior to joining Carnegie Mellon in 2005. His research interests are in computer and information systems security. Most of his work is at the boundary of measurements, systems and policy research. He has most recently focused on security analytics, online crime modeling, and economic and human aspects of computer security. His group’s research won several awards (best paper awards at conferences such as ACM CHI or USENIX Security, IEEE Cybersecurity Award, Allen Newell Award for Research Excellence, …).

  • 20 May 2021, 16:00 Tim Roughgarden, Columbia University
    Transaction Fee Mechanism Design for the Ethereum Blockchain:
    An Economic Analysis of EIP-1559
    [Zoom Registration] [Live Stream]
    Abstract: EIP-1559 is a proposal to make several tightly coupled changes to the Ethereum blockchain’s transaction fee mechanism, including the introduction of variable-size blocks and a burned base fee that rises and falls with demand. This proposal is slated for deployment in the London fork (scheduled for late summer 2021), and will be the biggest economic change made to a major blockchain to date. In this talk we formalize the problem of designing a transaction fee mechanism, taking into account the many idiosyncrasies of the blockchain setting (ranging from off-chain collusion between miners and users to the ease of money-burning). We then situate the specific mechanism proposed in EIP-1559 in this framework and rigorously interrogate its game-theoretic properties. We also touch on two alternative designs that offer different sets of incentive trade-offs.

    Bio: Tim Roughgarden is a Professor of Computer Science at Columbia University. Prior to joining Columbia, he spent 15 years on the computer science faculty at Stanford, following a PhD at Cornell and a postdoc at UC Berkeley. His research interests include the many connections between computer science and economics, as well as the design, analysis, applications, and limitations of algorithms. For his research, he has been awarded the ACM Grace Murray Hopper Award, the Presidential Early Career Award for Scientists and Engineers (PECASE), the Kalai Prize in Computer Science and Game Theory, the Social Choice and Welfare Prize, the Mathematical Programming Society’s Tucker Prize, and the EATCS-SIGACT Gödel Prize. He was an invited speaker at the 2006 International Congress of Mathematicians, the Shapley Lecturer at the 2008 World Congress of the Game Theory Society, and a Guggenheim Fellow in 2017. He has written or edited ten books and monographs, including Twenty Lectures on Algorithmic Game Theory (2016), Beyond the Worst-Case Analysis of Algorithms (2020), and the Algorithms Illuminated book series (2017-2020).

    Homepage: https://timroughgarden.org
  • 29 April 2021
    Emiliano De Cristofaro, UCL
    Studying Jerks on the Web: A Socio-Technical Perspective
    [Recording]
    Abstract: Over the past two decades, the world has seen an explosion of data. While in the past controlled experiments, surveys, or compilation of high-level statistics allowed us to gain insights into the problems we explored, the Web has brought about a host of new challenges for researchers hoping to gain an understanding of modern socio-technical behavior. First, even discovering appropriate data sources is not a straight forward task. Next, although the Web enables us to collect highly detailed digital information, there are issues of availability and ephemerality: simply put, researchers have no control over what data a 3rd party platform collects and exposes, and more specifically, no control over how long that data will remain available. Third, the massive scale and multiple formats data are available in requires creative execution of analysis. Finally, modern socio-technical problems, while related to typical social problems, are fundamentally different, and in addition to posing a research challenge, can also cause disruption in researchers’ personal lives. In this talk, I will discuss how our work has overcome the above challenges. Using concrete examples from our research, I will delve into some of the unique datasets and analyses we have performed, focusing on emerging issues like hate speech, coordinate harassment campaigns, and deplatforming as well as modeling the influence that Web communities have on the spread of disinformation, weaponized memes, etc. Finally, I will discuss how we can design proactive systems to anticipate and predict online abuse and, if time permits, how the “fringe” information ecosystem exposes researchers to attacks by the very actors they study.

    Bio: Emiliano De Cristofaro is a Professor at UCL (UCL), where he heads the Information Security Research Group, a Faculty Fellow at the Alan Turing Institute, and a co-founder of the iDramaLab. Before moving to London, he was a research scientist at Xerox PARC. He received a PhD in Networked Systems from the University of California, Irvine in 2011. Overall, Emiliano does research in the broad security, safety, and privacy areas. These days he mostly works on tackling problems at the intersection of machine learning and security/privacy/safety, as well as understanding and countering information weaponization via data-driven analysis. In 2013 and 2014, he co-chaired the Privacy Enhancing Technologies Symposium, in 2018, the security and privacy track at WWW and the privacy track at CCS, and in 2020 the Truth and Trust Online (TTO) Conference. He has also received best paper awards from NDSS, ACM IMC, and the Cybersafety workshop.

    Homepage: https://emilianodc.com
  • 25 March 2021
    Joseph Tanega, Vrije Universiteit Brussels
    NFT Art, Digital Asset-Backed Securities, and Universal Constructions in The Mathematical Philosophy of Law and Finance
    ACE Seminar, Virtual
  • 11 March 2021
    Giovanni Cherubin, The Alan Turing Institute
    Black-box leakage estimation, and some thoughts on its applicability to membership inference and synthetic data
    ACE Seminar, Virtual
  • 4 March 2021
    Arthur Gervais, Imperial College London
    Flash Loans for Fun and Profit
    ACE Seminar, Virtual

  • 18 February 2021
    Benjamin Alexander Steer, Queen Mary University
    Moving with the Times: Investigating the Alt-Right Network Gab with Temporal Interaction Graphs
    ACE Seminar, Virtual
  • 11 February 2021
    Craig Costello, Microsoft
    Finding twin smooth integers for isogeny-based cryptography
    ACE Seminar, Virtual

2020

  • 17 December 2020
    Michael Veale, UCL Law
    The use and (potential) abuse of privacy-preserving infrastructures
    InfoSec Seminar, Virtual
  • 10 December 2020
    Chelsea Komlo, University of Waterloo
    Introducing FROST: Flexible Round-Optimized Schnorr Threshold Signatures
    ACE Seminar, Virtual
  • 3 December 2020
    Ryan Castelucci, White Ops
    BitCry
    ACE Seminar, Virtual
  • 26 November 2020
    Arianna Trozze, UCL
    Explaining Prosecution Outcomes for Cryptocurrency-based Financial Crimes
    InfoSec Seminar, Virtual
  • 19 November 2020
    Henry Skeoch, UCL
    Cyber-insurance: what is the right price?
    InfoSec Seminar, Virtual
  • 12 November 2020
    Antonis Papasavva, UCL
    “Go back to Reddit!”: Detecting Hate and Analyzing Narratives of Online Fringe Communities
    InfoSec Seminar, Virtual
  • 5 November 2020
    Alin Tomescu, VMware
    Authenticated Data Structures for Stateless Validation and Transparency Logs
    ACE Seminar, Virtual
  • 28 May 2020
    Henry Corrigan-Gibbs, EPFL
    Private Information Retrieval with Sublinear Online Time
    ACE Seminar, Virtual
  • 7 May 2020
    Fabio Pierazzi, King’s College London
    Intriguing Properties of Adversarial ML Attacks in the Problem Space
    ACE Seminar, Virtual
  • 11 March 2020
    Yang Zhang, CISPA Helmholtz Center for Information Security
    Towards Understanding Privacy Risks of Machine Learning Models
    ACE Seminar, Malet Place Engineering Building 6.12A
  • 5 March 2020
    Gene Tsudik, UC Irvine
    Reconciling security and real-time constraints for simple IoT devices
    ACE Seminar, Main Quad Pop Up 101

2019

  • 12 December 2019
    Mathieu Baudet, Facebook Calibra
    LibraBFTv2: Optimistically-linear BFT Consensus with Concrete Latency Bounds
    ACE Seminar, Roberts 421
  • 21 November 2019
    Ilias Leontiadis, Samsung AI
    Learnings from industrial research on privacy and machine learning on wireless networks
    ACE Seminar, Roberts 421
  • 8 November 2019
    Ian Goldberg, University of Waterloo
    Walking Onions: Scaling Anonymity Networks while Protecting Users
    ACE Seminar, Malet Place Engineering Building 1.03
  • 7 November 2019
    Enrico Mariconti, UCL
    “You Know What to Do”: Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks
    InfoSec Seminar, Drayton House B03 Ricardo LT
  • 31 October 2019
    Bristena Oprisanu, UCL
    How Much Does GenoGuard Really “Guard”? An Empirical Analysis of Long-Term Security for Genomic Data
    InfoSec Seminar, Drayton House B03 Ricardo LT
  • 17 October 2019
    Kirill Nikitin, EPFL
    Reducing Metadata Leakage from Encrypted Files and Communication with PURBs
    InfoSec Seminar, Drayton House B03 Ricardo LT
  • 10 October 2019
    Grace Cassey, CyLon
    First Steps Towards Building a Cybersecurity Spinout
    ACE Seminar, Drayton House B03 Ricardo LT
  • 3 October 2019
    Nicolas Kourtellis, Telefonica Research
    Online user tracking and personal data leakage in the big data era
    ACE Seminar, Roberts Building G06
  • 5 September 2019
    Simon Parkin and Albesa Demjaha, UCL
    “You’ve left me no choices”: Security economics to inform behaviour intervention support in organizations
    ACE Seminar, Roberts 309
  • 15 August 2019
    Guillermo Suarez de Tangil Rotaeche, King’s College London
    A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted Wealth
    ACE Seminar, Roberts 309
  • 8 August 2019
    Savvas Zannettou, Cyprus University of Technology
    Towards Understanding the Behavior of State-Sponsored Trolls and their Influence on the Web
    ACE Seminar, Roberts 309
  • 8 August 2019
    Haaroon Yousaf, UCL
    Tracing Transactions Across Cryptocurrency Ledgers
    InfoSec Seminar, Roberts 309
  • 1 August 2019
    Simon Parkin, UCL
    Of Two Minds about Two-Factor: Understanding Everyday FIDO U2F Usability through Device Comparison and Experience Sampling
    InfoSec Seminar, Roberts 309
  • 25 July 2019
    Matthew Wixey, UCL
    Sound Effects: Exploring Acoustic Cyber-Weapons
    InfoSec Seminar, Roberts 309
  • 18 July 2019
    Prof. Dr. Christian Hammer, Uni Potsdam
    Security and Privacy Issues due to Android Intents
    ACE Seminar, Roberts 309
  • 4 July 2019
    Alexandros Mittos, UCL
    Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective
    InfoSec Seminar, Roberts 309
  • 28 June 2019
    Battista Biggio, University of Cagliari
    Wild Patterns: Ten Years after the Rise of Adversarial Machine Learning
    ACE Seminar, Alan Turing Institute, Jack Good Meeting Room
  • 27 June 2019
    Colin Ife, UCL
    Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web
    InfoSec Seminar, Roberts 309
  • 10 June 2019
    Matthew Wright, Rochester Institute of Technology
    Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning
    ACE Seminar, Roberts 309
  • 12 June 2019
    Houman Homayoun, George Mason University
    Towards Hardware Cybersecurity
    ACE Seminar, Roberts 309
  • 30 May 2019
    Nissy Sombatruang, UCL
    The Continued Risks of Public Wi-Fi and Why Users Keep Using It
    InfoSec Seminar, Roberts 309
  • 16 May 2019
    Andrei Sabelfeld, Chalmers University of Technology
    Securing IoT Apps
    ACE Seminar, Roberts 309
  • 9 May 2019
    Ilia Shumailov, University of Cambridge
    Towards Adversarial Sample Detection in Constraint Devices, Key Embedding and Neural Cryptography
    ACE Seminar, Roberts 309
  • 2 May 2019
    Shi Zhou, UCL
    Twitter Botnets Detection – Star Wars and Failure of Supervised Learning
    ACE Seminar, Roberts 309
  • 25 April 2019
    Adria Gascon, Alan Turing Institute
    Privacy-Preserving Data Analysis: Proofs, Algorithms, and Systems
    ACE Seminar, Roberts 309
  • 28 March 2019
    Enrico Mariconti, UCL
    One Does Not Simply Walk Into Mordor A PhD Journey in Malicious Behavior Detection
    ACE Seminar, Roberts 309
  • 28 February 2019
    Jonathan Lusthaus, Oxford University
    Industry of Anonymity: Inside the Business of Cybercrime
    ACE Seminar, Roberts 309
  • 14 February 2019
    Simon Parkin, UCL
    Device Purchase as an Opportune Moment for Security Behavior Change / Perceptions and Reality of Windows 10 Home Edition Update Features
    InfoSec Seminar, Roberts 309
  • 7 February 2019
    Mustafa Al-Bassam, UCL
    Fraud Proofs: Maximising Light Client Security and Scaling Blockchains with Dishonest Majorities
    InfoSec Seminar, Roberts 309
  • 29 January 2019
    Alvaro Garcia-Perez, IMDEA Software Institute
    Federated Byzantine Quorum Systems
    ACE Seminar, Roberts 309
  • 31 January 2019
    Vid Simoniti, University of Liverpool
    Deception and Politics Online: A Philosophical Approach
    ACE Seminar, Roberts 309
  • 17 January 2019
    Soteris Demetriou, Imperial College London
    Security and Privacy Challenges in User-Facing, Complex, Interconnected Environments
    ACE Seminar, Roberts 309

2018

  • 13 December 2018
    Mark Goodwin, Mozilla
    Fixing Revocation: How We Failed and How We’ll Succeed
    ACE Seminar, Roberts 309
  • 17 December 2018
    Nick Spooner, UC Berkeley
    Aurora: Transparent zkSNARKs for R1CS
    ACE Seminar, Robert 309
  • 6 December 2018
    Konstantinos Chalkias, R3
    Hash-Based Post-Quantum Signatures Tailored to Blockchains
    ACE Seminar, Roberts 309
  • 15 November 2018
    Lucky Onwuzurike, UCL
    Measuring and Mitigating Security and Privacy Issues on Android Applications
    InfoSec Seminar, Roberts 309
  • 8 November 2018
    Emiliano De Cristofaro, UCL
    On the Origins of Memes by Means of Fringe Web Communities
    InfoSec Seminar, Roberts 309
  • 1 November 2018
    Didem Özkul, UCL
    Location (un)intelligence: Politics and limitations of location-based profiling
    ACE Seminar, Roberts 309
  • 11 October 2018
    Ranjan Pal, University of Cambridge
    Privacy Trading in the Apps and IoT Age: Markets and Computation
    ACE Seminar, Roberts 309
  • 4 October 2018
    Jonathan Spring, UCL
    Towards Scientific Incident Response
    InfoSec Seminar, Roberts 309
  • 30 August 2018
    Apoorvaa Deshpande, Brown University
    Fully Homomorphic NIZK Proofs
    ACE Seminar, Roberts 421
  • 23 August 2018
    Lucky Onwuzurike, UCL
    A Family of Droids–Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis
    InfoSec Seminar, Roberts 421
  • 23 August 2018
    Neema Kotonya, UCL
    Of Wines and Reviews: Measuring and Modeling the Vivino Wine Social Network
    InfoSec Seminar, Roberts 421
  • 9 August 2018
    Luca Melis, UCL
    Public PhD Talk: Building and Evaluating Privacy-Preserving Data Processing Systems
    InfoSec Seminar, Roberts 421
  • 2 August 2018
    Lina Dencik, Cardiff University
    Understanding data in relation to social justice
    ACE Seminar, Roberts 421
  • 19 July 2018
    Sarah Meiklejohn and Mathilde McBride, UCL
    When technology and policy conflict: Distributed Ledgers and the GDPR right to be forgotten
    InfoSec Seminar, Roberts 421
  • 9 July 2018
    Lujo Bauer, Carnegie Mellon University
    Back to the Future: From IFTTT to XSS, it’s all about the information-flow lattice
    ACE Seminar, Malet 1.03
  • 11 July 2018
    Farinaz Koushanfar, UC San Diego
    Deep Learning on Private Data
    ACE Seminar, MPEB 1.03
  • 5 July 2018
    Kat J. Cecil, UCL
    Talking whiteness: Black women’s narratives of working in UK Higher Education
    InfoSec Seminar, Roberts 421
  • 14 June 2018
    Leonie Tanczer, UCL
    Gender and IoT: Discussing security principles for victims of Internet of Things (IoT)-supported tech abuse
    InfoSec Seminar, Roberts 421
  • 7 June 2018
    Gareth Tyson, Queen Mary University of London
    Facebook (A)Live? Are live social broadcasts really broadcasts?
    ACE Seminar, Roberts 421
  • 31 May 2018
    Ralph Holtz, University of Sydney
    Are we there yet? HTTPS security 7 years after DigiNotar
    ACE Seminar, Roberts 421
  • 17 May 2018
    Andelka Phillips, Trinity College Dublin
    Of Contracts and DNA - Reading the fine print when buying your genetic self online
    ACE Seminar, Roberts 421
  • 10 May 2018
    Jonathan Spring, UCL
    Meta-Issues in Information Security: Let’s talk about publication bias
    InfoSec Seminar, Roberts 421
  • 3 May 2018
    Luca Viganò, Kings College
    A Formal Approach to Cyber-Physical Attacks
    ACE Seminar, Roberts 421
  • 30 April 2018
    Jeremy Blackburn, University of Alabama at Birmingham
    Data-driven Research for Advanced Modeling and Analysis or: How I Learned to Stop Worrying and Love the DRAMA
    ACE Seminar, MPEB 1.20
  • 12 April 2018
    Jonathan Bootle, UCL
    Cryptanalysis of Compact-LWE
    InfoSec Seminar, Roberts 421
  • 5 April 2018
    Mustafa Al-Bassam, UCL
    Chainspace: A Sharded Smart Contracts Platform
    InfoSec Seminar, Roberts 421
  • 22 March 2018
    Shehar Bano, UCL
    Meta-Issues in Information Security: Ethical Issues in Network Measurement
    InfoSec Seminar, Main Quad Pop-Up 102
  • 15 March 2018
    Paul Grubbs, Cornell University
    Message Franking: From Invisible Salamanders to Encryptment
    ACE Seminar, Main Quad Pop-Up 102
  • 8 March 2018
    Kasper Bonne Rasmussen, Oxford University
    Device Pairing at the Touch of an Electrode
    ACE Seminar, Main Quad Pop-Up 102
  • 1 March 2018
    Apostolos Pyrgelis, UCL
    Knock Knock, Who’s There? Membership Inference on Aggregate Location Data
    InfoSec Seminar, Main Quad Pop-Up 102
  • 1 March 2018
    Kit Smeets, UCL
    Rounded Gaussians - Fast and Secure Constant-Time Sampling for Lattice-Based Crypto
    InfoSec Seminar, Main Quad Pop-Up 102
  • 8 February 2018
    Jaya Klara Brekke, Durham University
    Tracing Trustlessness
    ACE Seminar, Main Quad Pop-Up 102
  • 1 February 2018
    Ben Livshits, Imperial College London
    Research Challenges in a Modern Web Browser
    ACE Seminar, Main Quad Pop-Up 102
  • 25 January 2018
    Tristan Caulfield, UCL
    Meta-Issues in Information Security: fake news as a security incident
    InfoSec Seminar, Main Quad Pop-Up 102
  • 18 January 2018
    Jamie Hayes, UCL
    Adversarial Machine Learning
    InfoSec Seminar, Main Quad Pop-Up 102
  • 11 January 2018
    Mark Handley, UCL
    Meltdown and Spectre vulnerabilities: What went wrong?
    InfoSec Seminar, Roberts 508

2017

  • 14 December 2017
    Benedikt Bünz, Stanford University
    Bulletproofs: Short Proofs for Confidential Transactions and More
    ACE Seminar, Roberts 508
  • 7 December 2017
    Luca Melis, UCL
    Differentially Private Mixture of Generative Neural Networks
    InfoSec Seminar, Roberts 508
  • 30 November 2017
    Steven Murdoch, UCL
    Working with the media
    InfoSec Seminar, Roberts 508
  • 23 November 2017
    Jonathan Bootle, UCL
    Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability
    InfoSec Seminar, Roberts 508
  • 16 November 2017
    Alice Hutchings, University of Cambridge
    Cybercrime in the sky
    ACE Seminar, Roberts 508
  • 9 November 2017
    Mobin Javed, Uc Berkeley
    Mining Large-Scale Internet Data to Find Stealthy Abuse
    ACE Seminar, Roberts 508
  • 3 November 2017
    Alexander Koch, Karlsruhe Institute of Technology
    The Minimum Number of Cards in Practical Card-based Protocols
    ACE Seminar, MPEB 6.12
  • 26 October 2017
    Vincent Primault, UCL
    Evaluating and Configuring Location Privacy Protection Mechanisms
    InfoSec Seminar, Roberts 508
  • 19 October 2017
    Changyu Dong, Newcastle University
    Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
    ACE Seminar, Roberts 508
  • 12 October 2017
    Arthur Gervais, ETH Zurich
    On the Security and Scalability of Proof of Work Blockchains
    ACE Seminar, Roberts 508
  • 5 October 2017
    Raphael Toledo, UCL
    Mix-ORAM: Towards Delegated Shuffles
    InfoSec Seminar, Roberts 508
  • 5 October 2017
    Ania Piotrowska, UCL
    AnNotify: A Private Notification Service
    InfoSec Seminar, Roberts 508
  • 28 September 2017
    Nicolas Christin, Carnegie Mellon University
    Bridging large-scale data collection and analysis
    ACE Seminar, Roberts G08
  • 14 September 2017
    Jonathan Spring, UCL
    Practicing a Science of Security: A Philosophy of Science Perspective
    InfoSec Seminar, Roberts G08
  • 24 August 2017
    Francois Labreche, École Polytechnique de Montreal
    POISED: Spotting Twitter Spam Off the Beaten Paths
    InfoSec Seminar, Gordon Street(25)
  • 10 August 2017
    Ian Miers, Johns Hopkins University
    ZCash: past, present, and future of an Anonymous Bitcoin like Crypto-Currency
    ACE Seminar, Gordon Street(25)
  • 3 August 2017
    Patrick McCorry, UCL
    Applications of the Blockchain using Cryptography
    InfoSec Seminar, Gordon Street(25)
  • 31 July 2017
    Sanaz Taheri Boshrooyeh, Koç University
    Inonymous: Anonymous Invitation-Based System
    InfoSec Seminar, Roberts
  • 31 July 2017
    Devris Isler, Koç University
    Threshold Single Password AuthenticationThreshold Single Password Authentication
    InfoSec Seminar, Roberts
  • 20 July 2017
    Prof Adam O’Neill, Georgetown University
    New Results on Secure Outsourced Database Storage
    ACE Seminar, Gordon Street(25)
  • 13 July 2017
    Apostolos Pyrgelis, UCL
    What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy
    InfoSec Seminar, Gordon Street(25)
  • 6 July 2017
    Prof Negar Kiyavash, UIUC
    Adversarial machine learning: the case of optimal attack strategies against recommendation systems
    ACE Seminar, Gordon Street(25)
  • 22 June 2017
    Prof Jintai Ding, University of Cincinnati
    Post Quantum key Exchange
    ACE Seminar, Gordon Street(25)
  • 15 June 2017
    Guillermo Suárez-Tangil, UCL
    How to deal with that many apps: towards the use of lightweight techniques on the detection of mobile malware
    InfoSec Seminar, Gordon Street(25)
  • 6 June 2017
    Prof Adam Doupé, Arizona State University
    The Effectiveness of Telephone Phishing Scams and Possible Solutions
    ACE Seminar, MPEB 1.02
  • 1 June 2017
    Marjori Pomarole, Facebook
    Automatic Learning and Enforcement of Authorization Rules in Online Social Networks
    ACE Seminar, Gordon Street(25)
  • 4 May 2017
    Ruba Abu-Salma, UCL
    Obstacles to the Adoption of Secure Communication Tools
    InfoSec Seminar, Gordon Street(25)
  • 27 April 2017
    Anna Squicciarini, Penn State University
    Toward Controlling Malicious Users in Online Social Platforms
    ACE Seminar, Roberts 309
  • 6 April 2017
    Paul Simmonds, Global Identity Foundation
    Fix digital identity! Stop the bad guys
    ACE Seminar, Gordon Street(25)
  • 27 March 2017
    Brian Witten, Symantec
    Emerging Security Research at Symantec Research Labs
    ACE Seminar, MPEB 103
  • 23 March 2017
    Shehar Bano, UCL
    Characterization of Internet Censorship from Multiple Perspectives
    InfoSec Seminar, Gordon Street(25)
  • 16 March 2017
    Prof Foteini Baldimtsi, UCL
    TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub
    ACE Seminar, Gordon Street(25)
  • 9 March 2017
    Katriel Cohn-Gordon, Oxford University
    Post-compromise Security and the Signal Protocol
    ACE Seminar, Gordon Street(25)
  • 2 March 2017
    Hamish, UK Civil Service
    Perspectives on the Investigatory Powers Act
    ACE Seminar, Gordon Street(25)
  • 23 February 2017
    Mohammad Hajiabadi, UCL
    Limitations of black-box constructions in cryptography
    InfoSec Seminar, Gordon Street(25)
  • 16 February 2017
    Joanne Woodage, Royal Holloway, University of London
    Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
    ACE Seminar, Gordon Street(25)
  • 9 February 2017
    Enrico Mariconti, UCL
    MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models
    InfoSec Seminar, Gordon Square (16-18) 101
  • 9 February 2017
    Arman Khouzani, QMUL
    Universally Optimal Design For Minimum Information Leakage
    ACE Seminar, Gordon Square (16-18) 101
  • 2 February 2017
    Prof Carlos Cid, Royal Holloway, University of London
    A Model for Secure and Mutually Beneficial Software Vulnerability Sharing in Competitive Environments
    ACE Seminar, Gordon Street(25)
  • 26 January 2017
    Gerard Briscoe, UCL
    Designing Digital Cultures For Preferable Futures
    InfoSec Seminar, Gordon Street(25)
  • 19 January 2017
    Vasilios Mavroudis, UCL
    On the Privacy and Security of the Ultrasound Ecosystem
    InfoSec Seminar, Gordon Street(25)

2016

  • 7 December 2016
    Lorenzo Cavallaro, Royal Holloway, University of London
    CopperDroid: Automatic Android Malware Analysis and Classification
    ACE Seminar, Anatomy G29
  • 1 December 2016
    Alexandra Silva, UCL
    Automata learning - infinite alphabets and application to verification
    InfoSec Seminar, Gordon Street(25)
  • 24 November 2016
    Peter Scholl, University of Bristol
    Identifying Cheaters in Secure Multi-Party Computation
    ACE Seminar, Gordon Street(25)
  • 24 November 2016
    Gunes Acar, KU Leuven
    Advanced online tracking: A look into the past and the future
    ACE Seminar, Gordon Street(25)
  • 17 November 2016
    Christophe Petit, Oxford University
    Post-quantum cryptography based on supersingular isogeny problems?
    ACE Seminar, Gordon Street(25)
  • 9 November 2016
    Mary Maller, UCL
    Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions
    InfoSec Seminar, Roberts 309
  • 9 November 2016
    Jeremiah Onaolapo, UCL
    Understanding The Use Of Leaked Webmail Credentials
    InfoSec Seminar, Roberts 309
  • 3 November 2016
    N Asokan, Aalto University
    Technology Transfer from Security Research Projects: A Personal Perspective
    ACE Seminar, Gordon Street(25)
  • 2 November 2016
    Jens Groth, Zachary Peterson, Jens Krinke, UCL and Cal Poly
    ACE Lectures, including Jens Groth’s Inaugural Lecture: “Zero-Knowledge Proofs”
    ACE Event, Roberts 421
  • 27 October 2016
    Apostolos Pyrgelis, UCL
    Privacy-Friendly Mobility Analytics using Aggregate Location Data
    InfoSec Seminar, Gordon Street(25)
  • 20 October 2016
    Toby, GCHQ/NCSC
    Cyber Security in Practice: Detecting Real Attacks on Real Networks
    ACE Seminar, Gordon Street(25)
  • 13 October 2016
    Kostas Chatzikokolakis, LIX, École Polytechnique
    Geo-indistinguishability: A Principled Approach to Location Privacy
    ACE Seminar, Gordon Street(25)
  • 29 September 2016
    Sune K. Jakobsen, UCL
    Cryptogenography: Anonymity without trust
    InfoSec Seminar, Roberts 110
  • 22 September 2016
    Lukasz Olejnik, UCL
    Designing Web with Privacy
    InfoSec Seminar, MPEB 1.02
  • 15 September 2016
    Pengfei Wang, National University of Defense Technology
    How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel
    ACE Seminar, Engineering Front Executive Suite 103
  • 15 September 2016
    Liqun Chen, HP
    Cryptography in Practice
    ACE Seminar, Engineering Front Executive Suite 103
  • 5 August 2016
    Sanjay K. Jha, University of New South Wales
    A Changing Landscape: Securing The Internet Of Things (IoT)
    ACE Seminar, MPEB 1.02
  • 28 July 2016
    Delphine Reinhardt, University of Bonn
    ACE Seminar, Roberts 110
  • 26 July 2016
    Gilles Barthe, IMDEA Software Institute
    Language-based techniques for cryptography and privacy
    Computer Science Distinguished Letcture, MPEB 1.02*
  • 14 July 2016
    Yvo Desmedt, UCL, UT Dallas
    Internet Voting on Insecure Platforms
    InfoSec Seminar, Roberts 110
  • 7 July 2016
    Sebastian Meiser, UCL
    Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms against Structural Attacks
    InfoSec Seminar, MPEB 1.04
  • 7 July 2016
    Jonathan Bootle, UCL
    How to do Zero Knowledge from Discrete Logs in under 7kB
    InfoSec Seminar, MPEB 1.04
  • 30 June 2016
    Raphael Toledo, UCL
    InfoSec Seminar, Roberts 110
  • 23 June 2016
    Maura Paterson,, Birkbeck
    Algebraic Manipulation Detection Codes and Generalized Difference Families
    ACE Seminar, Roberts 422
  • 16 June 2016
    Simon Parkin, UCL
    Productive Security: A scalable methodology for analysing employee security behaviours
    ACE Seminar, Robers 309
  • 10 June 2016
    Eran Toch, Tel Aviv University
    Not Even Past: Longitudinal Privacy in Online Social Networks
    ACE Seminar, Roberts 508
  • 9 June 2016
    Ingolf Becker, UCL
    International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms
    InfoSec Seminar, Roberts 110
  • 26 May 2016
    David Bernhard, Bristol University
    Ballot Privacy
    ACE Seminar, Roberts 110
  • 19 May 2016
    Panagiotis Andriotis, UCL
    Digital Forensics: Retrieving Evidence from Mobile Devices
    InfoSec Seminar, Roberts 110
  • 12 May 2016
    Prof Aris Pagourtzis, NTUA
    Reliable Message Transmission Despite Limited Knowledge and Powerful Adversaries
    ACE Seminar, Roberts 110
  • 28 April 2016
    Pyrros Chaidos, UCL
    Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting
    InfoSec Seminar, Roberts 110
  • 21 April 2016
    Mirco Musolesi, UCL
    Identity and Identification in the Smartphone Era
    InfoSec Seminar, Roberts 110
  • 14 April 2016
    Robin Wilton, The Internet Society
    Trust, Ethics and Autonomy - the ethics of the Internet
    ACE Seminar, Roberts 4.22
  • 7 April 2016
    Prof Kenny Paterson, Royal Holloway,University of London
    Cryptographic Vulnerability Disclosure - The Good, The Bad, and The Ugly
    ACE Seminar, Roberts 110
  • 31 March 2016
    Gábor Gulyás, Inria
    Taking Re-identification Attacks of Social Networks to the Next Level
    ACE Seminar, Roberts 110
  • 24 March 2016
    Prof Jens Groth, UCL
    Cryptography for Eagles
    InfoSec Seminar, Roberts 110
  • 17 March 2016
    Wouter Lueks, University of Nijmegen
    Distributed encryption and applications
    ACE Seminar, Roberts 110
  • 10 March 2016
    Bingsheng Zhang, Lancaster University
    On Secure E-voting systems — End-2-end Verifiability, Privacy, Scalability, Accountability
    ACE Seminar, Roberts 110
  • 9 March 2016
    Ben Livshits, Microsoft Research Redmond
    Finding Malware at Web Scale
    CS Seminar, Medawar G02 Watson LT*
  • 3 March 2016
    Prof Aurélien Francillon, Eurecom
    Trust, but verify: why and how to establish trust in embedded devices
    ACE Seminar, Roberts 110
  • 25 February 2016
    Prof Fabio Massacci, University of Trento
    Cyberinsurance: good for your company, bad for your country?
    ACE Seminar, MPEB 6.12
  • 18 February 2016
    Luca Melis, UCL
    Efficient Private Statistics with Succinct Sketches
    InfoSec Seminar, Roberts 110
  • 18 February 2016
    Sheharbano Khattak, University of Cambridge
    Do You See What I See? Differential Treatment of Anonymous Users
    InfoSec Seminar, Roberts 110
  • 15 February 2016
    Cecilie Oerting, UCL
    Shining Light on Darknet: Does anonymity disinhibit user behavior on underground marketplaces?
    InfoSec Seminar, Roberts 110
  • 11 February 2016
    Tristan Caulfield, UCL
    Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption
    InfoSec Seminar, Roberts 110
  • 11 February 2016
    Simon Parkin, UCL
    Better the Devil You Know: A User Study of Two CAPTCHAs and a Possible Replacement Technology
    InfoSec Seminar, Roberts 110
  • 11 February 2016
    Simon Parkin, UCL
    An Exploratory Study of User Perceptions of Payment Methods in the UK and the US
    InfoSec Seminar, Roberts 110
  • 28 January 2016
    Jonathan Spring, UCL
    Avoiding pseudoscience: prudence, logic, and verification in studying information security
    InfoSec Seminar, Roberts 110
  • 21 January 2016
    Marcel Keller, Bristol University
    Malicious-for-free OT Extension and Its Application to MPC
    ACE Seminar, Roberts 110
  • 14 January 2016
    Anil Madhavapeddy, University of Cambridge
    Unikernels: Library operating systems for the masses
    ACE Seminar, Roberts 110

2015

  • 17 December 2015
    Peter Ryan, University of Luxembourg
    Voting with Transparent Verification and Coercion Mitigation
    ACE Seminar, MPEB 6.12
  • 10 December 2015
    Kasper Bonne Rasmussen, University of Oxford
    Efficient and Scalable Oblivious User Matching
    ACE Seminar, Birbeck B30
  • 3 December 2015
    Bruce Christianson, University of Hertfordshire
    Implementing Impossible Requirements - changing the role of trust in secure systems design
    ACE Seminar, Torrington (1-19) 115 Galton LT
  • 27 November 2015
    Alexandros Kapravelos, NCSU
    Analyzing and understanding in depth malicious browser extensions
    InfoSec Seminar, MPEB 6.12
  • 26 November 2015
    Prof Bhavani Thuraisingham, University of Texas
    Cloud-Centric Assured Information Sharing
    ACE Seminar, Birkbeck B30
  • 19 November 2015
    Sergio Maffeis, Imperial College
    Language based Web security
    ACE Seminar, Birkbeck B30
  • 17 November 2015
    Geoffroy Couteau, ENS
    Encryption Switching Protocols
    InfoSec Seminar, Roberts 4.21
  • 12 November 2015
    Seny Kamara, Microsoft Research
    Inference Attacks on Property-Preserving Encrypted Databases
    InfoSec Seminar, MPEB 1.02
  • 12 November 2015
    Melissa Chase, Microsoft Research
    Algebraic MACs and Lightweight Anonymous Credentials
    ACE Seminar, MPEB 1.02
  • 6 November 2015
    Radu Sion, Stony Brook University
    Privacy, Security, and Energy in Modern Clouds. Three Buzzwords in A Boat: The Amusing Adventures of a Naive Academic on Wall Street
    ACE Seminar, MPEB 6.12
  • 30 October 2015
    Prof Susanne Bødker, Aarhus University
    Experiencing Security
    ACE Seminar, MPEB 1.02
  • 29 October 2015
    Benoit Libert, ENS Lyon
    Fully secure functional encryption for linear functions from standard assumptions
    ACE Seminar, Birkbeck B30
  • 21 October 2015
    Earl Barr, Mirco Musolesi, Prof Susan Landau, UCL
    New academic year kick-off (Reception to follow)
    ACE event, Roberts 421*
  • 15 October 2015
    Thomas Peters, ENS Paris
    Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
    ACE Seminar, Birkbeck B30
  • 8 October 2015
    Henrik Ziegeldorf, RWTH Aachen University
    Secure and Anonymous Decentralized Bitcoin Mixing
    ACE Seminar, Birbeck B30
  • 2 October 2015
    Khilan Gudka, University of Cambridge
    Clean Application Compartmentalization with SOAAP
    InfoSec Seminar, Roberts 309
  • 1 October 2015
    Prof Chris Mitchell, Royal Holloway
    Real-world security analyses of OAuth 2.0 and OpenID Connect
    ACE Seminar, Birkbeck B30
  • 24 September 2015
    Dr. Ana Salagean, Loughborough University
    Higher order differential attacks on stream ciphers
    ACE Seminar, MPEB 1.02
  • 18 September 2015
    Pyrros Chaidos, UCL
    Short Accountable Ring Signatures Based on DDH
    InfoSec Seminar, MPEB 1.02
  • 10 September 2015
    Sarah Meiklejohn, UCL
    Centrally Banked Cryptocurrencies
    InfoSec Seminar, Birkbeck B30
  • 27 August 2015
    Odette Beris, UCL
    The Behavioural Security Grid (BSG) Risk and Emotion
    InfoSec Seminar, Roberts 422
  • 27 August 2015
    Steve Dodier-Lazaro, UCL
    Appropriation and Principled Security
    InfoSec Seminar, Roberts 422
  • 27 August 2015
    Simon Parkin, UCL
    Title: Appropriation of security technologies in the workplace
    InfoSec Seminar, Roberts 422
  • 20 August 2015
    Oliver Hohlfeld, Aachen University
    An Internet Census Taken by an Illegal Botnet
    ACE Seminar, Roberts 421
  • 20 August 2015
    Dali Kaafar, NICTA
    How smart is our addiction? Some experimental analyses of Security and Privacy in the mobile apps ecosystem
    ACE Seminar, Roberts 421
  • 13 August 2015
    Steve Dodier-Lazaro, UCL
    Research tools for remote user studies within UCL ISRG
    InfoSec Seminar, Roberts 309
  • 30 July 2015
    Ingolf Becker, UCL
    Applying Sentiment Analysis to Identify Different Conceptions of Security and Usability
    InfoSec Seminar, MPEB 1.02
  • 30 July 2015
    Kat Krol, UCL
    “Too taxing on the mind!” Authentication grids are not for everyone
    InfoSec Seminar, MPEB 1.02
  • 23 July 2015
    Gareth Tyson, Queen Mary
    Is your VPN keeping you safe?
    ACE Seminar, MPEB 1.02
  • 9 July 2015
    Andreas M. Antonopoulos, University of Nicosia
    Consensus algorithms, blockchain technology and bitcoin
    ACE Seminar, Roberts G06 Sir Ambrose Fleming LT
  • 2 July 2015
    Gennaro Parlato, University of Southampton
    Security Analysis of Self-Administrated Role-Based Access Control through Program Verification
    ACE Seminar, South Wing 9 Garwood LT
  • 25 June 2015
    Mauro Migliardi, University of Padova
    Green, Energy-Aware Security? What are we talking about? And Why?
    ACE Seminar, MPEB 1.02
  • 18 June 2015
    Elisabeth Oswald, University of Bristol
    Making the most of leakage
    ACE Seminar, Roberts 421
  • 11 June 2015
    Lucky Onwuzurike, UCL
    Danger is My Middle Name - Experimenting with SSL Vulnerabilities on Android Apps
    InfoSec Seminar, Torrington (1-19) 115 Galton LT
  • 11 June 2015
    Emiliano de Cristofaro, UCL
    Controlled Data Sharing for Collaborative Predictive Blacklisting
    InfoSec Seminar, Torrington (1-19) 115 Galton LT
  • 3 June 2015
    Matthew Smith, University of Bonn
    System Security meets Usable Security – Administrators and Developers are humans too
    ACE Seminar, MPEB 1.02
  • 4 June 2015
    Ben Smith, École Polytechnique
    (Slightly) more practical quantum factoring
    ACE Seminar, MPEB 1.20
  • 28 May 2015
    Jamie Hayes, UCL
    Guard Sets for Onion Routing
    InfoSec Seminar, MPEB 1.02
  • 28 May 2015
    Angela Sasse, UCL
    Current and emerging attacks on banking systems: report from a practitioner workshop
    InfoSec Seminar, MPEB 1.02
  • 21 May 2015
    Sandra Scott-Hayward, Queen’s University Belfast
    Design for deployment of Secure, Robust, and Resilient Software-Defined Networks
    ACE Seminar, MPEB 1.02
  • 21 May 2015
    Michiel Kosters, Nanyang Technological University
    The last fall degree and an application to HFE
    ACE Seminar, MPEB 1.02
  • 14 May 2015
    Mariana Raykova, SRI International
    Candidate Indistinguishability Obfuscation and Applications
    ACE Seminar, Roberts 309
  • 14 May 2015
    Marco Cova, Lastline, Inc.
    Analyzing Malware at Scale
    ACE Seminar, Roberts 309
  • 12 May 2015
    Luciano Bello, Chalmers Technical University
    Information-flow tracking for web technologies
    ACE Seminar, MPEB 1.03
  • 7 May 2015
    Martin Albrecht, RHUL
    So, how hard is this LWE thing, anyway?
    ACE Seminar, MPEB 1.03
  • 12 May 2015
    Luciano Bello, Chalmers Technical University
    Information-flow tracking for web technologies
    ACE Seminar, MPEB 1.03
  • 30 April 2015
    Steve Brierley, University of Cambridge
    The impact of quantum computing on cryptography
    ACE Seminar, Roberts 309
  • 23 April 2015
    Prof Mark Ryan , Birmingham University
    Du-Vote: Remote Electronic Voting with Untrusted Computers
    ACE Seminar, MPEB 1.03
  • 16 April 2015
    Emiliano De Cristofaro, UCL
    The Genomics Revolution: Innovation Dream or Privacy Nightmare?
    InfoSec Seminar, MPEB 1.03
  • 9 April 2015
    Essam Ghadafi, UCL
    Decentralized Traceable Attribute-Based Signatures
    InfoSec Seminar, MPEB 1.03
  • 26 March 2015
    Pyrros Chaidos, UCL
    Making Sigma-protocols Non-interactive and Building Referendums without Random Oracles
    InfoSec Seminar, MPEB 1.02
  • 19 March 2015
    Paul Burton, University of Bristol
    DataSHIELD: taking the analysis to the data not the data to the analysis
    ACE Seminar, MPEB 1.03
  • 12 March 2015
    Markulf Kohlweiss, Microsoft Research
    Triple Handshake: Can cryptography, formal methods, and applied security be friends?
    ACE Seminar, MPEB 1.03
  • 5 March 2015
    J. Clark, G. Eydmann, Wynyard Group
    Wynyard Group – Advance Crime Analytics for Foreign Fighters Analysis
    ACE Seminar, MPEB 1.03
  • 26 February 2015
    Nicolas Courtois, UCL
    Bad randoms, key management and how to steal bitcoins
    InfoSec Seminar, MPEB 1.03
  • 19 February 2015
    Emil Lupu, Imperial College
    On the Challenges of Detecting and Diagnosing Malicious Data InjectionsOn the Challenges of Detecting and Diagnosing Malicious Data Injections
    ACE Seminar, MPEB 1.03
  • 12 February 2015
    Ian Goldberg, University of Waterloo
    Ibis: An Overlay Mix Network for Microblogging
    ACE Seminar, MPEB 1.03
  • 5 February 2015
    David Clark, UCL
    Detecting Malware with Information Complexity
    InfoSec Seminar, MPEB 1.03
  • 29 January 2015
    K. Krol, I. Kirlappos, UCL
    Upcoming papers at NDSS Usable Security Workshop (USEC’15)
    InfoSec Seminar, MPEB 1.03
  • 19 January 2015
    Ben Livshits, Microsoft Research
    PrePose: Security and Privacy for Gesture-Based Programming
    ACE Seminar, MPEB 6.12
  • 22 January 2015
    Ioannis Papagiannis, Facebook
    Uncovering Large Groups of Active Malicious Accounts in Online Social Networks
    ACE Seminar, MPEB 1.03
  • 15 January 2015
    Tristan Caulfield, UCL
    Modelling Security Policy
    InfoSec Seminar, MPEB 1.03
  • 12 January 2015
    Alptekin Küpçü, Koç University
    Single Password Authentication
    ACE Seminar, MPEB 6.12

2014

  • 18 December 2014
    Jon Crowcroft, University of Cambridge
    Can we build a Europe-only cloud, and should we?
    ACE Seminar, Roberts 110
  • 11 December 2014
    Ian Brown, Oxford Internet Institute
    The feasibility of transatlantic privacy-protective standards for surveillance
    ACE Seminar, Roberts 110
  • 4 December 2014
    Nik Whitfield, Panaseer
    Adventures in cyber risk metrics and anomaly detection for Insider and APT
    ACE Seminar, Roberts 110
  • 27 November 2014
    George Danezis, UCL
    An Automated Social Graph De-anonymization Technique
    InfoSec Seminar, Roberts 110
  • 20 November 2014
    Vasileios Routsis, UCL
    The evolution of online self-disclosure and privacy ethics. Normalising modern-day surveillance
    InfoSec Seminar, Roberts 110
  • 13 November 2014
    Mike Bond, Cryptomathic
    EMV Pre-Play and Relay Attacks - A New Frontier
    ACE Seminar, Roberts 110
  • 31 October 2014
    Prof Stefan Dziembowski, University of Warsaw
    Bitcoin contracts — digital economy without lawyers?
    ACE Seminar, MPEB 1.02
  • 23 October 2014
    S. Meiklejohn, S. Murdoch, G. Stringhini, UCL
    New academic year kick-off – Welcoming New Academics
    ACE Event, MPEB 1.02*
  • 16 October 2014
    Emiliano De Cristofaro, UCL
    What’s wrong with the Interwebs? Recent results measuring Web Filtering and Facebook Like Fraud
    InfoSec Seminar, Roberts 110
  • 9 October 2014
    Giovanni Vigna, UC Santa Barbara
    Eliciting maliciousness: from exploit toolkits to evasive malware
    ACE Seminar, Roberts 110
  • 18 September 2014
    Adrian Perrig, ETH Zurich
    PoliCert: A Highly Resilient Public-Key Infrastructure
    ACE Seminar, MPEB 6.12
  • 12 September 2014
    Andelka Phillips, Oxford University
    Genetic Testing Goes Online An overview of the industry and the challenges for regulators
    ACE Seminar, MPEB 6.12
  • 8 September 2014
    Martin Emms, Newcastle University
    Is the future of credit card fraud contactless?
    ACE Seminar, MPEB 6.12
  • 4 September 2014
    Christophe Petit, UCL
    On the complexity of the elliptic curve discrete logarithm problem for binary curves
    InfoSec Seminar, MPEB 6.12
  • 7 August 2014
    Susan E. McGregor, Columbia University
    Communicating Securely, Communicating Security: Information Security Issues for Journalists
    ACE Seminar, MPEB 6.12
  • 22 July 2014
    Gene Tsudik, UC Irvine
    Elements of Trust in Named-Data Networking
    ACE Seminar, MPEB 1.02
  • 10 July 2014
    Angela Sasse, UCL
    What security practitioners really think about usability – Insights from 3 case studies
    InfoSec Seminar, MPEB 6.12
  • 26 June 2014
    Amir Herzberg, Bar-Ilan University
    AnonPoP: the Anonymous Post-Office Protocol
    ACE Seminar, MPEB 1.20
  • 26 June 2014
    Srdjan Capkun, ETH Zurich
    Selected Results in Location-Based Security
    ACE Seminar, MPEB 6.12
  • 12 June 2014
    Steve Dodier-Lazaro, UCL
    Towards systematic application sandboxing on Linux
    InfoSec Seminar, MPEB 6.12
  • 29 May 2014
    Ivan Martinovic, Oxford University
    Fasten Your Seatbelts – An Overview and Security Considerations of Next Generation Air Traffic Communication
    ACE Seminar, MPEB 6.12
  • 15 May 2014
    Odette Beris and Tony Morton, UCL
    Employee Risk Understanding and Compliance: Looking Through a Johari Window
    InfoSec Seminar, MPEB 6.12
  • 1 May 2014
    Flavio Garcia, University of Birmingham
    The Pitfalls of Cyber-Security Research: From an Ethical and Legal Perspective
    ACE Seminar, MPEB 6.12