Blackhat 2011 Recap
Friday, January 28, 2011, 10-11am in PHO 339 Speaker: Ari Trachtenberg, Boston University Electrical and Computer Engineering NISLAB weekly seminar, in conjuction with the RISCS center Abstract: This month's Blackhat conference covered a frightening array of potential exploits, including: Setting up rogue base stations to take over cellphones Attempts at technical attribution of the Stuxnet worm Bypassing tamper-evident seals Counterattacking hackers Making... More
DoD Information Assurance Scholarship
Students who are interested in programs in Information Assurance at Boston University are eligible to apply for full scholarships. Students must be full-time and US citizens. Full tuition, fees, books, $19K stipend for graduate students, $14K stipend for undergraduate students, and hands-on experience in information security internships. More
Position for Assistant/Associate Professor
BOSTON UNIVERSITY METROPOLITAN COLLEGE ASSISTANT/ASSOCIATE PROFESSOR COMPUTER SCIENCE Boston University’s Metropolitan College seeks to fill a full-time non-tenure track faculty position in the Department of Computer Science (bu.edu/csmet) starting by September 1, 2011. The successful candidate will have a Ph.D. in CS or a related field, and expertise in one or more of the... More
Position for Applications Security Engineer
Title: Applications Security Engineer Location: Cambridge, MA Compensation: Competitive. Eligible for quarterly bonus and pre-IPO stock option grants twice per year. Job Description: Next Jump is looking for a world class Applications Security Engineer to ensure our engineering efforts are adhering to the highest level of applications security. The ideal candidate will be on... More
On Unconditionally Secure Computation with Vanishing Communication Cost
Tuesday November 23, 2010, 10:00 am in MCS 137 Speaker: Ye Wang, Boston University Electric and Computer Engineering Abstract: We propose a novel distortion-theoretic approach to a secure three-party computation problem. Alice and Bob have deterministic sequences, and Charlie wishes to compute a normalized sum-type function of those sequences. We construct three-party protocols that allow Charlie to compute... More