Wednesday, September 24 10:00 AM Key Derivation From Noisy Sources With More Errors Than Entropy: Leo Reyzin Wednesday, October 1 10:00 AM Static analysis on mobile applications for security and privacy: Manuel Egele, BU Wednesday, October 15 10:00 AM Deriving Robust Keys from Physical Unclonable Functions: Merielle Spain, MIT Lincoln Labs Wednesday, October 22 9:00 AM Public-Coin Differing-Inputs Obfuscation and Its Applications: Omkant Pandey, UIUC Wednesday, October 29 10:00 AM Pretty Bad Privacy: Pitfalls of DNS Encryption: Haya Shulman, TU Darmstat Friday, November 7 9:00 AM Networking at the Speed of Light: P. Brighten Godfrey, UIUC (Networking Colloqiuim) Wednesday, November 12 11:00 AM Size-Hiding Secure Computation: Revisiting the Ideal Model: Melissa Chase, MSR Wednesday, November 19 10:00 AM Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces: Engin Kirda, NEU (BUSec Seminar) Monday, November 24 9:30 AM Candidate Construction of Obfuscation for all Circuits: Omer Paneth, BU Tuesday, November 25 2:30 PM Strong Key Derivation from Noisy Sources: Ben Fuller, PhD Defense