Decentralizing Authorities into Scalable Strongest-Link Cothorities

Bryan Ford gave a talk at the security seminar this past week. He talked about recent work on decentralizing cothorities. This is still a work in progress, so there is no specific paper on it. I provide a…


A Universally Composable Treatment of Network Time

Aanchal Malhotra from Boston University came to give a talk about her work on a universally composable treatment of network time. Here, I’ll give a brief overview of the work, but you can find more information in their paper.


PHY Covert Channels: Can you see the Idles?

Hakim Weatherspoon from Cornell University gave a talk at the security seminar on his work at NSDI 2014 called Chupja, PHY Covert Channels: Can you see the idles? I will give a brief summary of his talk. If you want more details about his work, I would…


CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities

Engin Kirda from Northeastern University came to MIT to talk about recent work from his lab regarding Firefox extension-reuse vulnerabilities. I will outline the talk and work here, but for more information and…


Thunderstrike: Apple EFI Firmware Security Vulnerabilities

Trammell Hudson came to the MIT security seminar to present his work on finding security bugs in Apple’s EFI firmware. I’ll give a brief overview of his talk and this area, but if you’re interested, you can find more information…


Sophos: Forward Private Searchable Encryption

Raphael Bost came to MIT to give a talk on his recent CCS paper about forward private searchable encryption. I’ll give an overview of his work, but I refer you to his paper for more details.


Attacking the Network Time Protocol (NTP)

Aanchal Malhotra from Boston University came to the MIT security seminar to talk about attacks on NTP. This talk was related to a paper she published and presented at NDSS 2016. I will give an overview and outline of the talk, and I refer you to the paper…


Opaque: An Oblivious and Encrypted Distributed Analytics Platform

Raluca Ada Popa came to MIT to give a talk on her recent NSDI paper that provides a platform to perform oblivious distributed analytics.


User Managed Access Protocol

Thomas Hardjono presented “Consent Management using User Managed Access (UMA)”

The problem: There is a “data price” for being online because companies use your data for some form of profit (ads, analytics, etc.). This means that currently, users consent…

MIT Security Seminar
MIT Security Seminar
Summary of talks from the MIT security seminar
More information
Followers
290