Latest

Understanding Code-Reuse Attacks and Reducing Attack Surface

Understanding Code-Reuse Attacks and Reducing Attack Surface

Georgios Portokalidis came to MIT to talk about his recent work on understanding code-reuse attacks.

A Brief History of Symbiote Defense

A Brief History of Symbiote Defense

Salvatore Stolfo came to MIT to give a talk about his work on symbiote defense. It is very interesting work and is now part of a startup…

Opaque: An Oblivious and Encrypted Distributed Analytics Platform

Opaque: An Oblivious and Encrypted Distributed Analytics Platform

Raluca Ada Popa came to MIT to give a talk on her recent NSDI paper that provides a platform to perform oblivious distributed analytics.

Functional encryption using Intel SGX

Functional encryption using Intel SGX

Dhinakaran Vinayagamurthy came to MIT to discuss Iron, a system that does functional encryption using Intel SGX. I’ll give you an overview…

Prio: Private, Robust, and Efficient Computation of Aggregate Statistics

Prio: Private, Robust, and Efficient Computation of Aggregate Statistics

Henry Corrigan-Gibbs came to give a talk on his NSDI paper on private computation of aggregate statistics. I’ll provide an overview of his…

Dandelion: Redesigning the Bitcoin Network for Anonymity

Dandelion: Redesigning the Bitcoin Network for Anonymity

Shaileshh Bojja Venkatakrishnan came to MIT to give a talk on his work redesigning the Bitcoin network. I’ll provide an overview here, but…

Detecting Malware Callouts in Realtime Network Traffic

Detecting Malware Callouts in Realtime Network Traffic

Domenic Puzio came to the MIT security seminar to talk his work at CapitalOne about detecting malware callouts in real time.