CAS Computer Scientists are Safeguarding the Internet and Defending Civil Rights
BU Today highlights Sharon Goldberg, Hariri Institute for Computing Junior Fellow and CAS Assistant Professor of Computer Science, who explains how information makes its way around the internet, securely and insecurely. Goldberg partners with Leonid Reyzin, a CAS Professor of Computer Science, to address how a flaw in one proposed... More
Security: Changing the Game, with Jennifer Lesser Henley, PMP Director of Security Operations, Facebook
Thursday, September 4, 2014 4:30–5:30pm Location: GSU Conference Auditorium, 775 Commonwealth Ave (Room 228) RSVP » We are under constant threats—from APT to data breaches and vulnerabilities to surveillance. Yet together we all play a role in keeping people safe, and making the internet and the world a more secure place. And we do that through... More
RISCS Seminar on Practical Security: Tandhy Simanjuntak and Sashank Narain
Monday, August 18, 2014 12–1pm Location: PHO 339 Talk 1 Title: Securing the Healthcare Industry : Implantable Medical Devices (IMD) Speaker/Bio: I'm a master student of Computer Science at Boston University Metropolitan College. Currently I’m involve in android security research, specifically in permissions. My interest is in mobile security and cyber security. Abstract: Nowadays, healthcare Industry is... More
RISCS Seminar on Practical Security: Ethan Heilman and Liangxiao Xin
Monday, August 11, 2014 12–1pm Location: PHO 339 Talk 1 Title: From the Consent of the Routed: Improving the Transparency of the RPKI. Speaker/Bio: Ethan is a PhD student in the Boston University Security Group (BUSec) of the Computer Science Dept. His research interests are: Network security, crypto currencies, hash function cryptanalysis and side channel attacks. His most recent projects... More
RISCS Seminar on Practical Security: Wenjie Shi and Morteza Hashemi
Monday, August 4, 2014 12–1pm Location: PHO 339 The intent of the seminar is to focus on practical elements of security, including implementation, offensive and defensive approaches, and even physical security: the type of security that is typically represented in non-academic hacker conferences such as BLACKHAT and DEFCON. Such practical areas of security are... More