Analyzing Private Network Data

November 17th, 2010

Wednesday November 17, 2010, 4:00 pm in MCS 135 Speaker: Gerome Miklau, University of Massachusetts, Amherst Abstract: Social and communication networks are formed by entities (such as individuals or computer hosts) and their connections (which may be contacts, relationships, or flows of information).  Such networks are analyzed to understand the influence of... More

Professional Development Lecture Event

November 3rd, 2010

Date:             Wednesday, November 3, 2010 Time:           1:00 – 5:00 pm Location:     Boston University George Sherman Union (GSU) 775 Commonwealth Ave. Boston, MA 02215 Conference Auditorium, Second floor Center for Reliable Information Systems and Cyber Security Metropolitan College Professional Development Lecture Event Sponsored by: Boston University Metropolitan College Department of Computer Science Boston University Center... More

Physics Colloquium by John Savage, Computer Science, Brown University on cybersecurity

October 18th, 2010

Cyberspace—Taming the Wild West John E. Savage Department of Computer Science, Brown University October 26, 2010 (Tuesday) at 3:30pm (Refreshments at 3:15pm) SCI 107, Metcalf Science Center, Boston University Cyberspace often looks like the Wild West. Hackers attack at will, take control of territory (botnets), and generally act with impunity. Unfortunately, there is much more at... More

Engineering for a Trustworthy Cloud

October 6th, 2010

Wednesday October 6, 2010, 3:00 pm in MCS 135 Speaker: Jim Miller, Microsoft Abstract: Engineering is a combination of science, economics, and timing.  For the most part, things move along with a steady pace of incremental innovation enlarging existing markets, lowering costs, and opening new markets.  But periodically all... More

Real-world Polymorphic Attack Detection

October 5th, 2010

Tuesday October 5, 2010, 11:00 am in MCS 135 Speaker: Evangelos Markatos Abstract: As state-of-the-art attack detection technology becomes more prevalent, attackers have started to employ evasion techniques such as code obfuscation and polymorphism to defeat existing defenses. We have recently proposed network-level emulation, a heuristic detection method that scans network traffic to detect polymorphic attacks. More