Tagged in

Cybersecurity

MIT Security Seminar
MIT Security Seminar
Summary of talks from the MIT security seminar
More information
Followers
291
More, on Medium

Understanding Code-Reuse Attacks and Reducing Attack Surface

Georgios Portokalidis came to MIT to talk about his recent work on understanding code-reuse attacks.

What is a code reuse attack? They are attacks repurposing existing components. In particular, they…


A Brief History of Symbiote Defense

Salvatore Stolfo came to MIT to give a talk about his work on symbiote defense. It is very interesting work and is now part of a startup called Red Balloons Security, who deploys this technology for Hewlett-Packard printers.


Dandelion: Redesigning the Bitcoin Network for Anonymity

Shaileshh Bojja Venkatakrishnan came to MIT to give a talk on his work redesigning the Bitcoin network. I’ll provide an overview here, but for more details, I refer you to his paper.


How Secure and Quick is QUIC? Provable Security and Performance Analyses.

Cristina Nita-Rotaru came from Northeastern to give talk on her recent Oakland S&P paper. In her talk, she discussed the trade-offs between provable security and guaranteed performance in adversarial networks. I will give a summary of the work here…


Selene: Voter-friendly, Receipt-free Verification

This week at the MIT security seminar, Peter Y A Ryan from University of Luxembourg came to talk about Selene, a new way to do vote verifications. I only provide a high level overview in this post, but if you are interested, Peter has made his…


Decentralizing Authorities into Scalable Strongest-Link Cothorities

Bryan Ford gave a talk at the security seminar this past week. He talked about recent work on decentralizing cothorities. This is still a work in progress, so there is no specific paper on it. I provide a…