University of Birmingham > Talks@bham > Computer Security Seminars

Computer Security Seminars

Add to your list(s) Send you e-mail reminders Further detail
Subscribe using ical/vcal (Help)

The computer security seminars (CompSecSem) are informal meetings of staff and PhD students, with the goal of broadening our knowledge and improving our understanding of computer-security-related concepts and techniques. We maintain a mailing list, complete with an archive, for E-mail discussion.

The computer security seminars are an informal weekly seminar series to discuss work in progress. The meetings take place every Thursday at 11:00 in the Sloman Lounge and will typically be followed by lunch in Staff House. All are welcome. An archive of meetings prior to May 2009 is available.

Tell a friend about this list:

4 upcoming talks and 107 talks in the archive.

TRAKS: A Universal Key Management Scheme for ERTMS

NB change of location: Room 245

UserRichard Thomas (Birmingham).

HouseComputer Science room 245.

ClockThursday 23 November 2017, 11:00-12:00

How (not) to use TLS between 3 parties

UserIoana Boureanu (Surrey).

HouseComputer Science, The Sloman Lounge (UG).

ClockThursday 26 October 2017, 11:00-12:00

Birmingham Security and Privacy research showcase

Please note longer time and change of venue

UserMark Ryan, Flavio Garcia, David Galindo, Mihai Ordean (Birmingham).

HouseLearning Centre, UG07.

ClockThursday 19 October 2017, 11:00-12:30

Theoretical computer science seminar

Theoretical Computer Science in Quantum Circuit Design

Also of interest in Security

UserPeter Hines (University of York).

HouseComputer Science, The Sloman Lounge (UG).

ClockFriday 13 October 2017, 11:00-12:00

Birmingham Research Showcase

UserChristophe Petit, Eike Ritter, Mark Ryan, Garfield Benjamin, David Galindo (Birmingham).

HouseComputer Science, The Sloman Lounge (UG).

ClockThursday 20 July 2017, 11:00-12:00

Security and Privacy group research showcase

UserSpeaker to be confirmed.

HouseComputer Science, The Sloman Lounge (UG).

ClockFriday 14 July 2017, 11:00-12:00

Blockchain & Hyperledger

UserPete Cripps (Cloud Architect, IBM).

HouseComputer Science, The Sloman Lounge (UG).

ClockThursday 06 July 2017, 11:00-12:00

Automotive security research from a tier 1 perspective

UserMichael Feiri and Martin Thompson (ZF TRW).

HouseComputer Science, The Sloman Lounge (UG).

ClockThursday 15 June 2017, 11:00-12:00

Ethics, Risk and Responsibility in Cyber Security Research

Please note room change

UserKatherine Fletcher (Oxford) and Garfield Benjamin (Birmingham).

HouseComputer Science room 245.

ClockThursday 08 June 2017, 11:00-12:00

Information Security in Practice

UserDavid Deighton (Birmingham).

HouseComputer Science, The Sloman Lounge (UG).

ClockThursday 01 June 2017, 11:00-12:00

Certifying the uncertifiable

UserJulio Hernandez-Castro (University of Kent).

HouseComputer Science, The Sloman Lounge (UG).

ClockThursday 18 May 2017, 11:00-12:00

Title to be confirmed

UserAngela Sasse (UCL).

HouseComputer Science, The Sloman Lounge (UG).

ClockThursday 11 May 2017, 11:00-12:00

Certifying the uncertifiable

UserThanassis Giannetsos (Surrey).

HouseComputer Science, The Sloman Lounge (UG).

ClockThursday 23 March 2017, 11:00-12:00

A formal Security Analysis of the Signal Messaging Protocol

UserLuke Garratt (University of Oxford).

HouseComputer Science, The Sloman Lounge (UG).

ClockThursday 23 February 2017, 11:00-12:00

Fixed-Point Arithmetic in Somewhat Homomorphic Encryption Schemes

UserSrinivas Vivek (University of Bristol).

HouseComputer Science, The Sloman Lounge (UG).

ClockThursday 16 February 2017, 11:00-12:00

A Surfeit of SSH Ciphersuites

UserKenny Paterson (Royal Holloway University of London).

HouseComputer Science, The Sloman Lounge (UG).

ClockThursday 09 February 2017, 11:00-12:00

Security Notions for Whitebox Cryptography

UserChris Brzuska (Hamburg University of Technology).

HouseSloman Lounge, School of Computer Science.

ClockThursday 19 January 2017, 11:00-12:00

Do we need trust for verifiability in e-voting?

UserPeter Browne Roenne (Luxembourg).

HouseSloman Lounge, School of Computer Science.

ClockThursday 12 January 2017, 11:00-12:00

Post-quantum cryptography

UserPeter Schwabe (Radboud, NL).

HouseSloman Lounge, School of Computer Science.

ClockThursday 15 December 2016, 11:00-12:00

Alpha-Beta Privacy

UserLuca Vigano (KCL).

HouseSloman Lounge, School of Computer Science.

ClockThursday 01 December 2016, 11:00-12:00

Transparency Overlays and Applications

UserSarah Meiklejohn (UCL).

HouseSloman Lounge, School of Computer Science.

ClockThursday 17 November 2016, 11:00-12:00

Understanding and Improving the Security Impact of Smartphone Apps

UserVincent Taylor (University of Oxford) .

HouseSloman Lounge, School of Computer Science.

ClockThursday 10 November 2016, 11:00-12:00

The Million-Key Question – Investigating the Origins of RSA Public Keys

UserPetr Svenda (Masaryk University, Czech Republic).

HouseSloman Lounge, School of Computer Science.

ClockThursday 20 October 2016, 11:00-12:00

Computer Science Summer Interns

UserConnor Brasnell, Rhys Howard, Luke Taher and Christopher Wilson (University of Birmingham).

HouseSloman Lounge, School of Computer Science.

ClockThursday 15 September 2016, 11:00-12:00

LeiA: A Lightweight Authentication Protocol for CAN

UserAndreea Radu (University of Birmingham).

HouseSloman Lounge, School of Computer Science.

ClockThursday 01 September 2016, 11:00-12:00

BeleniosRF: A Non-Interactive Receipt-Free Electronic Voting Scheme

UserDavid Galindo (University of Birmingham).

HouseSloman Lounge, School of Computer Science.

ClockThursday 25 August 2016, 11:00-12:00

Lock It and Still Lose It - On the (In)Security of Automotive Remote Keyless Entry Systems

UserDavid Oswald and Flavio Garcia (University of Birmingham).

HouseSloman Lounge, School of Computer Science.

ClockThursday 04 August 2016, 11:00-12:00

A Formal Security Analysis of ERTMS Train to Trackside Protocols

UserRichard Thomas (University of Birmingham).

HouseSloman Lounge, School of Computer Science.

ClockThursday 16 June 2016, 11:00-12:00

Internet Voting on Insecure Platforms

UserYvo Desmedt (The University of Texas at Dallas).

HouseRoom 217, School of Computer Science.

ClockThursday 09 June 2016, 14:00-15:00

Should we ban encryption? The world is not black and white

UserYvo Desmedt (The University of Texas at Dallas).

HouseRoom 245, School of Computer Science.

ClockThursday 09 June 2016, 11:00-12:00

Towards Deployment of a Next-generation Secure Internet Architecture

UserAdrian Perrig (ETH Zurich).

HouseUG07, Learning Centre.

ClockThursday 14 April 2016, 11:00-12:00

Investigatory Powers Bill

UserIan Batten (University of Birmingham).

HouseSloman Lounge, School of Computer Science.

ClockThursday 24 March 2016, 11:00-12:00

Cyber Security: It's a Socio-Technical Challenge

UserBudi Arief (University of Kent).

HouseSloman Lounge, School of Computer Science.

ClockThursday 17 March 2016, 11:00-12:00

Names with interleaved scopes

UserDan Ghica (Computer Science).

HouseSloman Lounge, School of Computer Science.

ClockThursday 25 February 2016, 11:00-12:00

cMix: Anonymization by High-Performance Scalable Mixing

UserJoeri de Ruiter (University of Birmingham).

HouseSloman Lounge, School of Computer Science.

ClockThursday 04 February 2016, 11:00-12:00

On the feasibility of cryptography for a wireless insulin pump system

UserEduard Marín Fàbregas (KU Leuven).

HouseRoom 245, School of Computer Science.

ClockThursday 26 November 2015, 11:00-12:00

Side-Channel Attacks on SHA-1-based Product Authentication ICs

UserDavid Oswald (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 12 November 2015, 11:00-12:00

Protocol State Fuzzing of TLS Implementations

UserJoeri de Ruiter (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 24 September 2015, 11:00-12:00

BackScan: Backdoor Detection via Functionality Profiling

UserSam Thomas (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 17 September 2015, 11:00-12:00

Pareto Efficient Solutions of Attack-Defence Trees

UserZaruhi Aslanyan (Technical University of Denmark).

HouseRoom 245, School of Computer Science.

ClockThursday 10 September 2015, 11:00-12:00

Security trade-offs and verifiability in IoT

UserMark Ryan (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 20 August 2015, 11:00-12:00

Wirelessly Lockpicking a Vehicle Immobilizer

UserFlavio Garcia ( University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 06 August 2015, 11:00-12:00

Template Power Analysis Against ECC Software Implementations

UserErick Nascimento (University of Campinas, Brazil).

HouseRoom 245, School of Computer Science.

ClockThursday 30 July 2015, 11:00-12:00

Smart-Guard: Defending user input from malware and keyloggers

UserMichael Denzel (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 02 July 2015, 11:00-12:00

Encrypted cloud-based data sharing

UserAlexander Kaitai Liang, Aalto University Finland.

HouseRoom 245, School of Computer Science.

ClockThursday 04 June 2015, 11:00-12:00

Symbolic protocol verification - where next?

UserCas Cremers, University of Oxford.

HouseRoom 245, School of Computer Science.

ClockThursday 14 May 2015, 11:00-12:00

Leakage attacks beyond the single target setting

UserElisabeth Oswald, Bristol University.

HouseRoom 245, School of Computer Science.

ClockThursday 07 May 2015, 11:00-12:00

Verifiable Electronic Voting: Making it Real

Note unusual day

UserSteve Schneider, University of Surrey.

HouseRoom 245, School of Computer Science.

ClockFriday 24 April 2015, 11:00-12:00

Set-pi: Set Membership Pi-calculus

UserAlessandro Bruni (Technical University of Denmark).

HouseRoom 245, School of Computer Science.

ClockThursday 16 April 2015, 11:00-12:00

Unikernels and the Next Generation Cloud

UserJon Crowcroft (University of Cambridge).

HouseRoom 245, School of Computer Science.

ClockThursday 09 April 2015, 11:00-12:00

How to detect unauthorised usage of a key

UserMark Ryan and Jiangshan Yu (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 26 March 2015, 11:00-12:00

Providing transparent accountability for electronic currencies

UserIvan Gazeau (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 12 March 2015, 11:00-12:00

Demonstration of CT-Mail

Note unusual time

UserMark Ryan, Piotr Kordy, and Michael Denzel (Uni of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 12 March 2015, 10:00-11:00

Privacy and Access Control for Outsourced Personal Records

UserDominique Schroeder (Saarland University).

HouseRoom 245, School of Computer Science.

ClockThursday 05 March 2015, 11:00-12:00

Title to be confirmed

UserCas Cremers, University of Oxford.

HouseRoom 245, School of Computer Science.

ClockThursday 19 February 2015, 11:00-12:00

StarfishNet: decentralised security for low-power wireless networks

UserJustin King-Lacroix, University of Oxford.

HouseRoom 245, School of Computer Science.

ClockThursday 12 February 2015, 11:00-12:00

Understanding and Fighting Malicious Activity on Online Social Networks

UserGianluca Stringhini, University College London.

HouseRoom 245, School of Computer Science.

ClockThursday 05 February 2015, 11:00-12:00

CESG's Secure Communications Strategy

UserPeter Haigh, CESG.

HouseRoom 245, School of Computer Science.

ClockThursday 04 December 2014, 11:00-12:00

Blindspot: Indistinguishable Anonymous Communications

UserJoseph Gardiner (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 27 November 2014, 11:00-12:00

PhD Student Five Minute Talks

UserVarious speakers.

HouseRoom 245, School of Computer Science.

ClockThursday 13 November 2014, 11:00-12:00

Security of ECDSA in Bitcoin

UserNicolas T. Courtois (University College London).

HouseRoom 245, School of Computer Science.

ClockThursday 06 November 2014, 11:30-12:30

Hack.lu CTF

UserVarious speakers.

HouseRoom 245, School of Computer Science.

ClockThursday 30 October 2014, 11:00-12:00

Key usage detection

UserJiangshan Yu (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 09 October 2014, 11:00-12:00

Formal Methods for the Security of the Internet of Services

UserLuca Vigano, King's College London.

HouseRoom 245, School of Computer Science.

ClockSunday 27 July 2014, 12:00-13:00

Probabilistic assessment of security scenarios - challenges and solutions

UserBarbara Kordy, University of Luxembourg.

HouseRoom 245, School of Computer Science.

ClockThursday 24 July 2014, 11:00-12:00

Balancing Societal Security and Individual Privacy: Accountable Escrow System

User Jia Liu, Mark D. Ryan (University of Birmingham); Liqun Chen (HP Labs, Bristol).

HouseRoom 245, School of Computer Science.

ClockThursday 10 July 2014, 11:00-12:00

An overview of some GCHQ/NSA projects

UserTom Chothia, University of Birmingham.

HouseRoom 245, School of Computer Science.

ClockThursday 03 July 2014, 11:00-12:00

Entropy model checking [NOTE: CHANGE OF LOCATION]

UserChunyan Mu, University of Birmingham.

HouseRoom 217, School of Computer Science.

ClockThursday 26 June 2014, 11:00-12:00

ECC-based bug attacks on OpenSSL: a retrospective

UserDan Page, University of Bristol.

HouseRoom 245, School of Computer Science.

ClockThursday 19 June 2014, 11:00-12:00

Security and privacy in society: meeting at the Royal Society

UserMark Ryan, University of Birmingham.

HouseRoom 245, School of Computer Science.

ClockThursday 05 June 2014, 11:00-12:00

Care.data: when good intentions are not enough

UserIan Batten, University of Birmingham.

HouseRoom 245, School of Computer Science.

ClockThursday 08 May 2014, 11:00-12:00

A Formal Model and Practical Technique for Quantifying Information Leakage in Software

UserChris Novakovic, University of Birmingham.

HouseRoom 245, School of Computer Science.

ClockWednesday 30 April 2014, 11:00-12:00

Timing attacks in security protocols: symbolic framework and proof techniques

UserVincent Cheval (School of Computer Science, University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 17 April 2014, 11:00-12:00

Robbing the bank using formal methods

UserJoeri de Ruiter.

HouseRoom 245, School of Computer Science.

ClockThursday 03 April 2014, 11:00-12:00

Stanford Javascript crypto library

UserMihai Ordean.

HouseRoom 245, School of Computer Science.

ClockThursday 27 March 2014, 11:00-12:00

Verifying Differential Privacy by Program Logic

UserMarco Gaboardi.

HouseRoom 222, School of Computer Science.

ClockThursday 20 March 2014, 10:00-11:00

NDSS dry run

UserMark Ryan.

HouseRoom 222, School of Computer Science.

ClockThursday 06 February 2014, 10:00-11:00

Quantitative analysis of opacity

UserChunyan Mu.

HouseRoom 245, School of Computer Science.

ClockThursday 05 December 2013, 11:00-12:00

Private machine learning: case of the Internet

UserShishir Nagaraja, School of Computer Science, University of Birmingham.

HouseRoom 245, School of Computer Science.

ClockThursday 07 November 2013, 11:00-12:00

A Schnorr-Like Lightweight Identity-Based Signature Scheme

UserFlavio Garcia, School of Computer, University of Birmingham.

HouseRoom 245, School of Computer Science.

ClockThursday 24 October 2013, 11:00-12:00

Dev-Vote: Electronic voting on an untrusted platform

UserGurchetan S Grewal.

HouseRoom 245, School of Computer Science.

ClockThursday 10 October 2013, 11:00-12:00

A Qualitative Comparison of SSL Validation Alternatives

UserHenning Perl, Leibniz Universität Hannover.

HouseRoom 245, School of Computer Science.

ClockMonday 29 July 2013, 11:00-12:00

Dynamic measurement and protected execution: model and analysis

UserIan Batten, School of Computer Science, University of Birmingham.

HouseRoom 245, School of Computer Science.

ClockThursday 18 July 2013, 11:00-12:00

Privacy issues: from protocols to applications

UserVincent Cheval (School of Computer Science, University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 04 July 2013, 11:00-12:00

Probabilistic Point-to-Point Information Leakage

UserChris Novakovic (School of Computer Science, University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 20 June 2013, 11:00-12:00

Imposing Order on the Temporal Chaos of ProVerif*

UserTom Chothia (School of Computer Science, University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 06 June 2013, 11:00-12:00

Caveat Coercitor: coercion-evidence in electronic voting

UserGurchetan S. Grewal and Mark Ryan.

HouseRoom 217, School of Computer Science.

ClockFriday 10 May 2013, 11:00-12:00

Static Analysis for Regular Expression Denial-of-Service Attacks

UserAsiri Rathnayake (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 09 May 2013, 11:00-12:00

If you have a question about this list, please contact: Andreea Radu; Dr Garfield Benjamin. If you have a question about a specific talk, click on that talk to find its organiser.

 

Talks@bham, University of Birmingham. Contact Us | Help and Documentation | Privacy and Publicity.
talks@bham is based on talks.cam from the University of Cambridge.