Analyzing Private Network Data
Wednesday November 17, 2010, 4:00 pm in MCS 135 Speaker: Gerome Miklau, University of Massachusetts, Amherst Abstract: Social and communication networks are formed by entities (such as individuals or computer hosts) and their connections (which may be contacts, relationships, or flows of information). Such networks are analyzed to understand the influence of... More
Professional Development Lecture Event
Date: Wednesday, November 3, 2010 Time: 1:00 – 5:00 pm Location: Boston University George Sherman Union (GSU) 775 Commonwealth Ave. Boston, MA 02215 Conference Auditorium, Second floor Center for Reliable Information Systems and Cyber Security Metropolitan College Professional Development Lecture Event Sponsored by: Boston University Metropolitan College Department of Computer Science Boston University Center... More
Physics Colloquium by John Savage, Computer Science, Brown University on cybersecurity
Cyberspace—Taming the Wild West John E. Savage Department of Computer Science, Brown University October 26, 2010 (Tuesday) at 3:30pm (Refreshments at 3:15pm) SCI 107, Metcalf Science Center, Boston University Cyberspace often looks like the Wild West. Hackers attack at will, take control of territory (botnets), and generally act with impunity. Unfortunately, there is much more at... More
Engineering for a Trustworthy Cloud
Wednesday October 6, 2010, 3:00 pm in MCS 135 Speaker: Jim Miller, Microsoft Abstract: Engineering is a combination of science, economics, and timing. For the most part, things move along with a steady pace of incremental innovation enlarging existing markets, lowering costs, and opening new markets. But periodically all... More
Real-world Polymorphic Attack Detection
Tuesday October 5, 2010, 11:00 am in MCS 135 Speaker: Evangelos Markatos Abstract: As state-of-the-art attack detection technology becomes more prevalent, attackers have started to employ evasion techniques such as code obfuscation and polymorphism to defeat existing defenses. We have recently proposed network-level emulation, a heuristic detection method that scans network traffic to detect polymorphic attacks. More