Latest

Functional encryption using Intel SGX

Functional encryption using Intel SGX

Dhinakaran Vinayagamurthy came to MIT to discuss Iron, a system that does functional encryption using Intel SGX. I’ll give you an overview…

Prio: Private, Robust, and Efficient Computation of Aggregate Statistics

Prio: Private, Robust, and Efficient Computation of Aggregate Statistics

Henry Corrigan-Gibbs came to give a talk on his NSDI paper on private computation of aggregate statistics. I’ll provide an overview of his…

Dandelion: Redesigning the Bitcoin Network for Anonymity

Dandelion: Redesigning the Bitcoin Network for Anonymity

Shaileshh Bojja Venkatakrishnan came to MIT to give a talk on his work redesigning the Bitcoin network. I’ll provide an overview here, but…

Detecting Malware Callouts in Realtime Network Traffic

Detecting Malware Callouts in Realtime Network Traffic

Domenic Puzio came to the MIT security seminar to talk his work at CapitalOne about detecting malware callouts in real time.

Beyond Sanitizers: Guided fuzzing and security hardening

Beyond Sanitizers: Guided fuzzing and security hardening

Kostya Serebryany from Google came to give a talk about his experience building dynamic testing tools. I’ll present an overview of his talk…

CDN on Demand: Affordable DDoS Defense using Untrusted IaaS-Clouds

CDN on Demand: Affordable DDoS Defense using Untrusted IaaS-Clouds

Yossi Gilad came to give a talk at the MIT on using untrusted IaaS clouds to prevent DDoS attacks, which was published in NDSS 2016. I will…

CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities

CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities

Engin Kirda from Northeastern University came to MIT to talk about recent work from his lab regarding Firefox extension-reuse…