A Universally Composable Treatment of Network Time

Aanchal Malhotra from Boston University came to give a talk about her work on a universally composable treatment of network time. Here, I’ll give a brief overview of the work, but you can find more information in their paper.


Understanding Code-Reuse Attacks and Reducing Attack Surface

Georgios Portokalidis came to MIT to talk about his recent work on understanding code-reuse attacks.

What is a code reuse attack? They are attacks repurposing existing components. In particular, they…


A Brief History of Symbiote Defense

Salvatore Stolfo came to MIT to give a talk about his work on symbiote defense. It is very interesting work and is now part of a startup called Red Balloons Security, who deploys this technology for Hewlett-Packard printers.


Opaque: An Oblivious and Encrypted Distributed Analytics Platform

Raluca Ada Popa came to MIT to give a talk on her recent NSDI paper that provides a platform to perform oblivious distributed analytics.


Prio: Private, Robust, and Efficient Computation of Aggregate Statistics

Henry Corrigan-Gibbs came to give a talk on his NSDI paper on private computation of aggregate statistics. I’ll provide an overview of his work, but for more details, especially on the cryptography…


Dandelion: Redesigning the Bitcoin Network for Anonymity

Shaileshh Bojja Venkatakrishnan came to MIT to give a talk on his work redesigning the Bitcoin network. I’ll provide an overview here, but for more details, I refer you to his paper.


Sophos: Forward Private Searchable Encryption

Raphael Bost came to MIT to give a talk on his recent CCS paper about forward private searchable encryption. I’ll give an overview of his work, but I refer you to his paper for more details.

MIT Security Seminar
MIT Security Seminar
Summary of talks from the MIT security seminar
More information
Followers
290