MAY
01
2025
JULIA LEN
MIT / UNC Chapel Hill
APR
24
2025
MICHELE ORRÙ
CNRS
APR
17
2025
EMMA DAUTERMAN
MIT / Stanford
APR
10
2025
YIPING MA
UPenn
APR
03
2025
BENJAMIN CASE
Meta
MAR
06
2025
SACHA SERVAN-SCHREIBER
Tinfoil
FEB
27
2025
ALIN TOMESCU
Aptos Labs
DEC
12
2024
HARI VENUGOPALAN
UC Davis
DEC
05
2024
ARTHUR LAZZARETTI
Yale University
NOV
21
2024
MIRO HALLER
UCSD
NOV
14
2024
MAHIMNA KELKAR
Cornell Tech
NOV
07
2024
JINHAO ZHU
UC Berkeley
NOV
01
2024
MIKKO HYPPONEN & BEN ADIDA
OCT
31
2024
ROXANA GEAMBASU
Columbia University
OCT
24
2024
WENTING ZHENG
CMU
MAY
23
2024
ANISH ATHALYE
MIT
MAY
16
2024
DEIAN STEFAN
UCSD
APR
25
2024
SACHA SERVAN-SCHREIBER
MIT
APR
11
2024
SOURAV DAS
UIUC
APR
04
2024
THEOPHILE WALLEZ
Inria Paris
MESSAGING LAYER SECURITY
Theophile will speak about verifying TreeSync. This work won a distinguished paper award and the 2023 Internet Defense prize at USENIX Security!
Read abstract and more information
MAR
21
2024
BEN NASSI
Cornell Tech
MAR
14
2024
MENGYUAN LI
MIT
MAR
07
2024
ERIC RESCORLA
DESIGNING PROTOCOLS THAT ACTUALLY GET DEPLOYED
Eric will discuss the factors that determine whether a new cryptographic protocol does or does not become widely used.
Read abstract and more information
FEB
29
2024
NICK SULLIVAN
CFRG
CRYPTOGRAPHIC THEORY INTO APPLIED TECHNOLOGY
Nick Sullivan is the former Head of Research and Cryptography at Cloudflare, and is the co-chair of the Crypto Forum Research Group.
Read abstract and more information
FEB
22
2024
ELIZABETH MARGOLIN
Penn
FEB
15
2024
TOLIK ZINOVYEV
BU
DEC
13
2023
KARTHIK GARIMELLA
NYU
NOV
16
2023
SEBASTIAN ANGEL
University of Pennsylvania
OCT
04
2023
YAN LONG
University of Michigan
SEP
27
2023
KINAN DAK ALBAB
Brown
JUL
07
2023
EMMA DAUTERMAN
UC Berkeley
JUN
28
2023
ROBERTA DE VITI
MPI-SWS
MAY
17
2023
JOON YOUNG SEO
Google
MAY
10
2023
ZEYU LIU
Yale
MAY
03
2023
ZACHARY DESTEFANO
NYU
APR
21
2023
KE ZHONG
University of Pennsylvania
APR
05
2023
MAYANK RATHEE
UC Berkeley
MAR
15
2023
KE WU
CMU
MAR
08
2023
ALEXANDER BIENSTOCK
NYU
MAR
01
2023
ABIGAIL HARRISON
University of Connecticut
FEB
08
2023
KIMBERLY RUTH
Stanford University
DEC
15
2021
MITI MAZMUDAR
U Waterloo
DEC
08
2021
IVAN DE OLIVEIRA NUNES
RIT
DEC
01
2021
CRAIG DISSELKOEN
UCSD
OCT
20
2021
MARINA MOORE
NYU
OCT
06
2021
ZHIYUN QIAN
UC Riverside
MAY
22
2019
KAT JOYCE
Google
FEB
21
2019
DANIEL GRUSS
Graz University of Technology
FEB
20
2019
DEREK LEUNG
Algorand
DEC
10
2018
NIKOLA K. BLANCHARD
IRIF
NOV
28
2018
Fan Zhang
OCT
17
2018
TAMARA SILBERGLEIT
Duke University
SEP
13
2018
OFIR WEISSE
University of Michigan
FORESHADOW: BREAKING THE VIRTUAL MEMORY ABSTRACTION WITH TRANSIENT OUT-OF-ORDER EXECUTION
Breaking Intel SGX with speculative execution attacks.
Read abstract and more information
SEP
05
2018
ETHAN CECCHETTI
Cornell University - Initiative for CryptoCurrencies & Contracts (IC3)
PUBLIC INCOMPRESSIBLE ENCODINGS (PIES)
Ethan will talk about Decentralized Storage Networks (DSNs) and Public Incompressible Encodings (PIEs), a core building block needed to verify that potentially-cheating servers are redundantly storing public data.
Read abstract and more information
MAY
16
2018
TRAMMELL HUDSON
Two Sigma Investments
MAY
09
2018
MICHAEL SCHAPIRA
Hebrew University of Jerusalem
NETWORK TIME PROTOCOL
Michael will talk about preventing "time shifting attacks" in the presence of powerful man-in-the-middle attackers.
Read abstract and more information
MAY
02
2018
ILIA LEBEDEV
MIT CSAIL
TRUSTED EXECUTION ENVIRONMENTS
Ilia will talk about Sanctum, an extension of the RISC-IV architecture that provides a trusted execution environment (i.e., enclaves) for applications.
Read abstract and more information
MAR
14
2018
RADU SION
Stony Brook University
DEC
06
2017
SERGEY GORBUNOV
University of Waterloo
NOV
29
2017
AANCHAL MALHOTRA
Boston University
OCT
25
2017
YOSSI GILAD
MIT CSAIL and Boston University
OCT
18
2017
JOSEPH ZADEH
JASK
OCT
11
2017
GEORGE PORTOKALIDIS
Stevens Institute of Technology
SEP
27
2017
SALVATORE J STOLFO
Columbia University
MAY
10
2017
RALUCA ADA POPA
Berkeley
MAY
03
2017
DHINAKARAN VINAYAGAMURTHY
University of Waterloo
APR
26
2017
BENJAMIN FULLER
University of Connecticut
SECURE COMPUTATION
Ben will talk about the problem of database search, the current state of the art, and attacks against these systems.
Read abstract and more information
MAR
22
2017
HENRY CORRIGAN-GIBBS
Stanford University Department of Computer Science
MAR
15
2017
SHAILESHH BOJJA VENKATAKRISHNAN
University of Illinois Urbana-Champaign
FEB
22
2017
RAPHAEL BOST
Direction Générale pour l'Armement
FEB
15
2017
DOMENIC PUZIO
CapitalOne
NOV
02
2016
KOSTYA SEREBRYANY
Google
OS SECURITY
Kostya will talk about sanitizing, fuzzing, and hardening C/C++ code for security and reliability.
Note:
This talk will happen at 11 am instead of the normal 4 pm slot.
Read abstract and more information
OCT
12
2016
BALAJI SRINIVASAN
21.co and a16z
BITCOIN
Balaji will be speaking about
How Bitcoin enables a Machine-Payable Web
. This is a joint talk with MIT Media Lab Digital Currency Initiative.
Read abstract and more information
SEP
28
2016
ETHAN HEILMAN
BU
SEP
14
2016
MUNEEB ALI
Princeton and Blockstack
APR
20
2016
ENGIN KIRDA
Northeastern University
APR
13
2016
YOSSI GILAD
MIT/BU
MAR
09
2016
ROXANA GEAMBASU
Columbia University
MAR
02
2016
AANCHAL MALHOTRA
Boston Universitiy
FEB
10
2016
TRAMMELL HUDSON
Two Sigma
DEC
09
2015
RANJIT KUMARESAN
MIT
NOV
18
2015
ANDRE DEHON
University of Pennsylvania
NOV
11
2015
YONATAN SOMPOLINSKY
The Hebrew University of Jerusalem
NOV
04
2015
ZAKIR DURUMERIC
University of Michigan
OCT
28
2015
CRISTINA NITA-ROTARU
Northeastern University
OCT
21
2015
PETER Y A RYAN
University of Luxembourg
SEP
30
2015
ETHAN HEILMAN
Boston University
MAY
20
2015
SHARON GOLDBERG
Boston University
MAY
06
2015
BRYAN FORD
EPFL
APR
29
2015
RANJIT KUMARESAN
MIT
MAR
04
2015
SERGEY GORBUNOV
MIT
CRYPTOGRAPHY
Sergey Gorbunov is giving a practice job talk. Come and give feedback!
FEB
25
2015
ANDREW BAUMANN
Microsoft Research
SYSTEMS SECURITY
Andrew will be speaking about
Shielding applications from an untrusted cloud with Haven
NOTE: This talk will be at 3 pm
Read abstract and more information
FEB
18
2015
MUHAMMAD NAVEED
UIUC
FEB
11
2015
FARINAZ KOUSHANFAR
Rice University
JAN
14
2015
JEAN YANG
MIT
PROGRAMMING LANGUAGE SECURITY
Jean Yang will be giving a practice faculty talk. Come and give her feedback!
NOV
13
2014
JAMES MICKENS
Microsoft Research
OCT
01
2014
VOLODYMYR KUZNETSOV AND GEORGE CANDEA
EPFL
SEP
24
2014
JULIAN BANGERT
MIT
SEP
10
2014
HAKIM WEATHERSPOON
Cornell
MAY
15
2014
BRYAN FORD
Yale
APR
23
2014
ALLEY STOUGHTON
Lincoln Labs
APR
16
2014
WILLIAM YOUNG AND NANCY LEVESON
MIT
APR
09
2014
NICK FEAMSTER
Georgia Tech
MAR
19
2014
JIM GETTYS
Bell Labs
FEB
19
2014
THOMAS HARDJONO
MIT
DEC
11
2013
EMIL STEFANOV
Berkeley
NOV
20
2013
PROF. STEPHEN CHONG
Harvard University
NOV
14
2013
PROF. ENGIN KIRDA
Northeastern University
OCT
23
2013
PROF. WILLIAM ROBERTSON
Northeastern University
OCT
09
2013
JOEL REARDON
ETH Zurich
OCT
02
2013
XI WANG
MIT
SEP
18
2013
DR. SENY KAMARA
Microsoft Research Redmond
SEP
11
2013
PROF. YEVGENIY DODIS
New York University
AUG
28
2013
PROF. TAL MORAN
Interdisciplinary Center Herzliya Israel
JUN
19
2013
AMIT LEVY AND DEIAN STEFAN
Stanford
MAY
22
2013
DR. ROBERT N. M. WATSON
University of Cambridge
MAY
01
2013
GAVIN ANDRESEN, BITCOIN FOUNDATION
Chief Scientist
APR
03
2013
PROF. SANJIT A. SESHIA
UC Berkeley
MAR
20
2013
DR. DAVID CHISNALL
University of Cambridge UK
MAR
19
2013
PROF. SIMHA SETHUMADHAVAN
Columbia University
MAR
13
2013
JUSTIN THALER
Harvard University
FEB
11
2013
HAOHUI MAI
University of Illinois at Urbana-Champaign
DEC
10
2012
CHRIS ENG
Veracode - industry talk
DEC
03
2012
DR. NADIA HENINGER
Microsoft Research New England
CRYPTANALYSIS, NETWORK SECURITY
Nadia Heninger will talk about
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices.
Read abstract and more information
NOV
26
2012
EUNSUK KANG
MIT
NOV
19
2012
PROF. MIKE WALFISH
UT Austin
NOV
05
2012
DR. ARI JUELS
RSA the Security Division of EMC
OCT
22
2012
AMIR RAHMATI
UMass Amherst
EMBEDDED DEVICES SECURITY
Amir Rahmati will talk about
TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks.
Read abstract and more information
OCT
01
2012
CHRIS FLETCHER
MIT
FULLY HOMOMORPHIC ENCRYPTION AND HARDWARE
Chris Fletcher will talk about
Techniques for performing secure computation on encrypted data.
Read abstract and more information
SEP
24
2012
XI WANG
MIT
SEP
17
2012
PROF. GREG MORRISETT
Harvard University
MAY
07
2012
JEAN YANG
MIT
APR
23
2012
EMIL STEFANOV
Berkeley
APR
09
2012
ROBERT GRIFFIN, RSA
Security Division of EMC
CLOUD SECURITY
Bob Griffin, Chief Security Architect at RSA, will talk about "Keys and Clouds: Searching for the Equilibrium". This is an industry talk co-organized with RSA Labs.
APR
02
2012
DR. ALINA OPREA
RSA Labs
CLOUD COMPUTING SECURITY
New approaches to securing cloud data
: Alina will talk about some of the research RSA Labs has done on extending the trust perimeter from the enterprise data center into public clouds.
Read abstract and more information
FEB
27
2012
ARIEL J. FELDMAN
Princeton
FEB
13
2012
DR. SHAI HALEVI
IBM T. J. Watson Research Center
JAN
30
2012
EMILY STARK
MIT
JAN
23
2012
NIKOS TRIANDOPOULOS
RSA Labs & Boston University
DEC
19
2011
DR. DENNIS MOREAU
EMC Corporation
CLOUD COMPUTING SECURITY
Dennis will talk about
Focused Threat Response and Forensic Information Sharing: Current Challenges and Limits in Cloud Computing Scenarios
. This talk was jointly organized with the RSA Labs.
Read abstract and more information
DEC
12
2011
PROF. ROXANA GEAMBASU
Columbia University
NOV
28
2011
PROF. ADAM CHLIPALA
MIT
NOV
21
2011
PROF. STEPHEN CHONG
Harvard University
LANGUAGE-BASED SECURITY
Stephen will talk about
Inference of Expressive Information Security Policies
. This talk is joint with the PL seminar.
Read abstract and more information
NOV
14
2011
DR. JAD NAOUS
MIT
OCT
31
2011
KEVIN BOWERS
RSA Labs
OCT
17
2011
RALUCA ADA POPA
MIT
OCT
03
2011
DR. BEN LIVSHITS
Microsoft Research Redmond
AUG
04
2011
DR. ÚLFAR ERLINGSSON
security researcher at Google
CLOUD COMPUTING SECURITY
Úlfar will briefly outline some issues and potential research topics in cloud security, with examples from Google's past and current technology efforts used to give context.
Read abstract and more information
APR
14
2011
DR. ALINA OPREA
RSA Labs
APR
07
2011
PROF. LEONID REYZIN
Boston University
MAR
31
2011
RON ROTHBLUM
Weizmann Institute
HOMOMORPHIC ENCRYPTION
Ron Rothblum will give a talk for the CIS seminar: "Homomorphic Encryption: from Private-Key to Public-Key"
FEB
24
2011
PROF. SHARON GOLDBERG
Boston University
BGP SECURITY
Sharon will talk about recent work:
Let the Market Drive Deployment: A Strategy for Transitioning to BGP Security
. Joint work with Phillipa Gill and Michael Schapira.
Read abstract and more information
DEC
02
2010
DR. ASLAN ASKAROV
Cornell University
PREDICTIVE BLACK-BOX MITIGATION OF TIMING CHANNELS
We investigate techniques for general black-box mitigation of timing channels. The source of events is wrapped by a timing mitigator that delays output events so that they contain only a bounded amount of information. We introduce a general class of timing mitigators that can achieve any given bound on timing channel leakage, with a tradeoff in system performance. We show these mitigators compose well with other mechanisms for information flow control, and demonstrate they are effective against some known timing attacks.
NOV
03
2010
DR. FRANK MCSHERRY
Microsoft Research
DIFFERENTIAL PRIVACY
Frank will present his work on
Privacy Integrated Queries: A Programming Language for Differentially-Private Computation
Read abstract and more information
OCT
28
2010
PROF. ANDREW MYERS
Cornell University
LANGUAGE-BASED SECURITY FOR DISTRIBUTED SYSTEMS
Andrew will talk about
Fabric: Using language-based security to build secure distributed systems.
Read abstract and more information
OCT
21
2010
TAESOO KIM
MIT
PREVENTING SIDE CHANNEL ATTACKS EXPLOITING MEMORY LATENCY FOR CLOUD COMPUTING
Taesoo will talk about his work on preventing side channel attacks exploiting memory latency in cloud computing environments such as Amazon EC2 and Microsoft Azure. He will present his new protection mechanism (against RSA/AES cache attacks) that he developed together with Marcus Peinado from Microsoft Research.
OCT
15
2010
DR. MICHAEL CLARKSON
Cornell University
SEP
30
2010
NADIA HENINGER
Princeton University
SEP
20
2010
DAVID SCHULTZ
MIT
AUG
02
2010
ETHAN HEILMAN
MIT
JUL
26
2010
TAESOO KIM
MIT
JUL
19
2010
PABLO AZAR
MIT
JUL
12
2010
VICTOR COSTAN
MIT
TRUSTVISOR: EFFICIENT TCB REDUCTION AND ATTESTATION
TrustVisor
is a paper from Oakland 2010 (IEEE Symposium on Security and Privacy). Also,
here
is a list of all the papers from Oakland and Usenix Security 2010 to consider for discussion at the reading group this summer.
MAY
24
2010
VICTOR COSTAN
MIT
TRUSTED HARDWARE
Victor will talk about TPMs (Trusted Platform Modules). These are trusted hardware devices that are gaining popularity with cloud security: under the assumption that the TPM is not attacked physically, some recent papers have shown how to provide confidential execution of programs on the cloud as well as how to check that the right software ran on the cloud.
MAY
17
2010
PROF. NICKOLAI ZELDOVICH
MIT
MAY
10
2010
CHRIS LESNIEWSKI-LAAS
MIT
SECURE DHTS
Chris will give a talk on his recent NSDI paper that tries to solve the hard problem of faking identities in a DHT: Whānau: A Sybil-proof Distributed Hash Table. FYI, the abstract and paper can be found
here
MAY
03
2010
DR. TAL MORAN
Harvard University
IDENTITY-BASED ENCRYPTION (IBE) INSTEAD OF PKI?
Can IBE obviate the need for PK infrastructure or facilitate key revocation? What is the tradeoff? These questions came up when discussing ICING last week.  Tal will give a short survey of IBE, concentrating on limitations for practical uses. The following papers are relevant (the introductions suffice to give you a good overview). A classical paper:
Identity based encryption from the Weil paring
(Dan Boneh and Matt Franklin)  and a fairly recent survey:
A tapestry of identity-based encryption: practical frameworks compared
(Xavier Boyen).
APR
26
2010
PROF. SHARON GOLDBERG
Boston University
APR
19
2010
PATRIOTS' DAY
No meeting.
APR
12
2010
EMILY SHEN, DAVID WILSON, MARTEN VAN DIJK, RALUCA ADA POPA
MIT
TUTORIAL OF RECENT CRYPTO ADVANCES FOR SYSTEMS PEOPLE
Some of us will give an overview of a variety of cryptographic tools/concepts that are efficient and of practical use to systems. There is no reading. We will cover the following topics at a high level: efficient homomorphic encryption schemes, proofs of retrievability/possession, attribute-based encryption, hidden vector encryption, predicate encryption, identity-based encryption, zero knowledge, proofs of knowledge, short signatures, broadcast encryption, and private information retrieval. Slides from the presentation are here
[ppt]
[pdf]
APR
05
2010
DR. CRAIG GENTRY
IBM T. J. Watson
SECURE DELEGATION OF COMPUTATION
We will discuss Craig's cryptographic breakthrough and its implications to cloud security as well as the general problem of securely delegating computation to the cloud.
Paper and details are here.
MAR
29
2010
TAESOO KIM
MIT
PROGRAM BINARY OBFUSCATION
The importance of program obfuscation goes without saying. We will discuss
Binary obfuscation using signals
. Taesoo will present an overview of the paper and then some of his research ideas to improve binary obfuscation. However, cryptographic results show that it is impossible to obfuscate programs. Is there a way to come close to this goal by making the adversary's job harder? This is an example where crypto knowledge and systems mechanisms work together.
MAR
22
2010
SPRING BREAK
No meeting.
MAR
15
2010
EUGENE WU
MIT
DISCUSSION OF THE PAPER
VANISH: ENHANCING THE PRIVACY OF THE WEB WITH SELF-DESTRUCTING DATA
Vanish aims to ensure destruction of private data after some timeout. Is it possible to provide data destruction/deletion guarantees? (Some researchers from Princeton/UTexas/Michigan apparently found a vulnerability in Vanish and called their attack
unVanish
. Vanish's authors wrote a
reply paper
attempting to fix various DHT vulnerabilities including those exploited by unVanish.)
MAR
08
2010
RALUCA ADA POPA
MIT