Blackhat 2011 Recap

January 27th, 2011

Friday, January 28, 2011, 10-11am in PHO 339 Speaker: Ari Trachtenberg, Boston University Electrical and Computer Engineering NISLAB weekly seminar, in conjuction with the RISCS center Abstract: This month's Blackhat conference covered a frightening array of potential exploits, including: Setting up rogue base stations to take over cellphones Attempts at technical attribution of the Stuxnet worm Bypassing tamper-evident seals Counterattacking hackers Making... More

DoD Information Assurance Scholarship

December 13th, 2010

Students who are interested in programs in Information Assurance at Boston University are eligible to apply for full scholarships. Students must be full-time and US citizens. Full tuition, fees, books, $19K stipend for graduate students, $14K stipend for undergraduate students, and hands-on experience in information security internships. More

Position for Assistant/Associate Professor

December 7th, 2010

BOSTON UNIVERSITY METROPOLITAN COLLEGE ASSISTANT/ASSOCIATE PROFESSOR COMPUTER SCIENCE Boston University’s Metropolitan College seeks to fill a full-time non-tenure track faculty position in the Department of Computer Science (bu.edu/csmet) starting by September 1, 2011. The successful candidate will have a Ph.D. in CS or a related field, and expertise in one or more of the... More

Position for Applications Security Engineer

December 7th, 2010

Title: Applications Security Engineer Location: Cambridge, MA Compensation: Competitive. Eligible for quarterly bonus and pre-IPO stock option grants twice per year. Job Description: Next Jump is looking for a world class Applications Security Engineer to ensure our engineering efforts are adhering to the highest level of applications security. The ideal candidate will be on... More

On Unconditionally Secure Computation with Vanishing Communication Cost

November 23rd, 2010

Tuesday November 23, 2010, 10:00 am in MCS 137 Speaker: Ye Wang, Boston University Electric and Computer Engineering Abstract: We propose a novel distortion-theoretic approach to a secure three-party computation problem. Alice and Bob have deterministic sequences, and Charlie wishes to compute a normalized sum-type function of those sequences. We construct three-party protocols that allow Charlie to compute... More