University of Birmingham > Talks@bham > Computer Security Seminars

Computer Security Seminars

Add to your list(s) Send you e-mail reminders Further detail
Subscribe using ical/vcal (Help)

The computer security seminars (CompSecSem) are informal meetings of staff and PhD students, with the goal of broadening our knowledge and improving our understanding of computer-security-related concepts and techniques. We maintain a mailing list, complete with an archive, for E-mail discussion.

The computer security seminars are an informal weekly seminar series to discuss work in progress. The meetings take place every Thursday at 11:00 in the Sloman Lounge and will typically be followed by lunch in Staff House. All are welcome. An archive of meetings prior to May 2009 is available.

Tell a friend about this list:

3 upcoming talks and 95 talks in the archive.

Automotive security research from a tier 1 perspective

UserMichael Feiri and Martin Thompson (ZF TRW).

HouseComputer Science, The Sloman Lounge (UG).

ClockThursday 15 June 2017, 11:00-12:00

Ethics, Risk and Responsibility in Cyber Security Research

Please note room change

UserKatherine Fletcher (Oxford) and Garfield Benjamin (Birmingham).

HouseComputer Science room 245.

ClockThursday 08 June 2017, 11:00-12:00

Information Security in Practice

UserDavid Deighton (Birmingham).

HouseComputer Science, The Sloman Lounge (UG).

ClockThursday 01 June 2017, 11:00-12:00

Certifying the uncertifiable

UserJulio Hernandez-Castro (University of Kent).

HouseComputer Science, The Sloman Lounge (UG).

ClockThursday 18 May 2017, 11:00-12:00

Title to be confirmed

UserAngela Sasse (UCL).

HouseComputer Science, The Sloman Lounge (UG).

ClockThursday 11 May 2017, 11:00-12:00

Certifying the uncertifiable

UserThanassis Giannetsos (Surrey).

HouseComputer Science, The Sloman Lounge (UG).

ClockThursday 23 March 2017, 11:00-12:00

A formal Security Analysis of the Signal Messaging Protocol

UserLuke Garratt (University of Oxford).

HouseComputer Science, The Sloman Lounge (UG).

ClockThursday 23 February 2017, 11:00-12:00

Fixed-Point Arithmetic in Somewhat Homomorphic Encryption Schemes

UserSrinivas Vivek (University of Bristol).

HouseComputer Science, The Sloman Lounge (UG).

ClockThursday 16 February 2017, 11:00-12:00

A Surfeit of SSH Ciphersuites

UserKenny Paterson (Royal Holloway University of London).

HouseComputer Science, The Sloman Lounge (UG).

ClockThursday 09 February 2017, 11:00-12:00

Security Notions for Whitebox Cryptography

UserChris Brzuska (Hamburg University of Technology).

HouseSloman Lounge, School of Computer Science.

ClockThursday 19 January 2017, 11:00-12:00

Do we need trust for verifiability in e-voting?

UserPeter Browne Roenne (Luxembourg).

HouseSloman Lounge, School of Computer Science.

ClockThursday 12 January 2017, 11:00-12:00

Post-quantum cryptography

UserPeter Schwabe (Radboud, NL).

HouseSloman Lounge, School of Computer Science.

ClockThursday 15 December 2016, 11:00-12:00

Alpha-Beta Privacy

UserLuca Vigano (KCL).

HouseSloman Lounge, School of Computer Science.

ClockThursday 01 December 2016, 11:00-12:00

Transparency Overlays and Applications

UserSarah Meiklejohn (UCL).

HouseSloman Lounge, School of Computer Science.

ClockThursday 17 November 2016, 11:00-12:00

Understanding and Improving the Security Impact of Smartphone Apps

UserVincent Taylor (University of Oxford) .

HouseSloman Lounge, School of Computer Science.

ClockThursday 10 November 2016, 11:00-12:00

The Million-Key Question – Investigating the Origins of RSA Public Keys

UserPetr Svenda (Masaryk University, Czech Republic).

HouseSloman Lounge, School of Computer Science.

ClockThursday 20 October 2016, 11:00-12:00

Computer Science Summer Interns

UserConnor Brasnell, Rhys Howard, Luke Taher and Christopher Wilson (University of Birmingham).

HouseSloman Lounge, School of Computer Science.

ClockThursday 15 September 2016, 11:00-12:00

LeiA: A Lightweight Authentication Protocol for CAN

UserAndreea Radu (University of Birmingham).

HouseSloman Lounge, School of Computer Science.

ClockThursday 01 September 2016, 11:00-12:00

BeleniosRF: A Non-Interactive Receipt-Free Electronic Voting Scheme

UserDavid Galindo (University of Birmingham).

HouseSloman Lounge, School of Computer Science.

ClockThursday 25 August 2016, 11:00-12:00

Lock It and Still Lose It - On the (In)Security of Automotive Remote Keyless Entry Systems

UserDavid Oswald and Flavio Garcia (University of Birmingham).

HouseSloman Lounge, School of Computer Science.

ClockThursday 04 August 2016, 11:00-12:00

A Formal Security Analysis of ERTMS Train to Trackside Protocols

UserRichard Thomas (University of Birmingham).

HouseSloman Lounge, School of Computer Science.

ClockThursday 16 June 2016, 11:00-12:00

Internet Voting on Insecure Platforms

UserYvo Desmedt (The University of Texas at Dallas).

HouseRoom 217, School of Computer Science.

ClockThursday 09 June 2016, 14:00-15:00

Should we ban encryption? The world is not black and white

UserYvo Desmedt (The University of Texas at Dallas).

HouseRoom 245, School of Computer Science.

ClockThursday 09 June 2016, 11:00-12:00

Towards Deployment of a Next-generation Secure Internet Architecture

UserAdrian Perrig (ETH Zurich).

HouseUG07, Learning Centre.

ClockThursday 14 April 2016, 11:00-12:00

Investigatory Powers Bill

UserIan Batten (University of Birmingham).

HouseSloman Lounge, School of Computer Science.

ClockThursday 24 March 2016, 11:00-12:00

Cyber Security: It's a Socio-Technical Challenge

UserBudi Arief (University of Kent).

HouseSloman Lounge, School of Computer Science.

ClockThursday 17 March 2016, 11:00-12:00

Names with interleaved scopes

UserDan Ghica (Computer Science).

HouseSloman Lounge, School of Computer Science.

ClockThursday 25 February 2016, 11:00-12:00

cMix: Anonymization by High-Performance Scalable Mixing

UserJoeri de Ruiter (University of Birmingham).

HouseSloman Lounge, School of Computer Science.

ClockThursday 04 February 2016, 11:00-12:00

On the feasibility of cryptography for a wireless insulin pump system

UserEduard Marín Fàbregas (KU Leuven).

HouseRoom 245, School of Computer Science.

ClockThursday 26 November 2015, 11:00-12:00

Side-Channel Attacks on SHA-1-based Product Authentication ICs

UserDavid Oswald (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 12 November 2015, 11:00-12:00

Protocol State Fuzzing of TLS Implementations

UserJoeri de Ruiter (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 24 September 2015, 11:00-12:00

BackScan: Backdoor Detection via Functionality Profiling

UserSam Thomas (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 17 September 2015, 11:00-12:00

Pareto Efficient Solutions of Attack-Defence Trees

UserZaruhi Aslanyan (Technical University of Denmark).

HouseRoom 245, School of Computer Science.

ClockThursday 10 September 2015, 11:00-12:00

Security trade-offs and verifiability in IoT

UserMark Ryan (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 20 August 2015, 11:00-12:00

Wirelessly Lockpicking a Vehicle Immobilizer

UserFlavio Garcia ( University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 06 August 2015, 11:00-12:00

Template Power Analysis Against ECC Software Implementations

UserErick Nascimento (University of Campinas, Brazil).

HouseRoom 245, School of Computer Science.

ClockThursday 30 July 2015, 11:00-12:00

Smart-Guard: Defending user input from malware and keyloggers

UserMichael Denzel (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 02 July 2015, 11:00-12:00

Encrypted cloud-based data sharing

UserAlexander Kaitai Liang, Aalto University Finland.

HouseRoom 245, School of Computer Science.

ClockThursday 04 June 2015, 11:00-12:00

Symbolic protocol verification - where next?

UserCas Cremers, University of Oxford.

HouseRoom 245, School of Computer Science.

ClockThursday 14 May 2015, 11:00-12:00

Leakage attacks beyond the single target setting

UserElisabeth Oswald, Bristol University.

HouseRoom 245, School of Computer Science.

ClockThursday 07 May 2015, 11:00-12:00

Verifiable Electronic Voting: Making it Real

Note unusual day

UserSteve Schneider, University of Surrey.

HouseRoom 245, School of Computer Science.

ClockFriday 24 April 2015, 11:00-12:00

Set-pi: Set Membership Pi-calculus

UserAlessandro Bruni (Technical University of Denmark).

HouseRoom 245, School of Computer Science.

ClockThursday 16 April 2015, 11:00-12:00

Unikernels and the Next Generation Cloud

UserJon Crowcroft (University of Cambridge).

HouseRoom 245, School of Computer Science.

ClockThursday 09 April 2015, 11:00-12:00

How to detect unauthorised usage of a key

UserMark Ryan and Jiangshan Yu (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 26 March 2015, 11:00-12:00

Providing transparent accountability for electronic currencies

UserIvan Gazeau (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 12 March 2015, 11:00-12:00

Demonstration of CT-Mail

Note unusual time

UserMark Ryan, Piotr Kordy, and Michael Denzel (Uni of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 12 March 2015, 10:00-11:00

Privacy and Access Control for Outsourced Personal Records

UserDominique Schroeder (Saarland University).

HouseRoom 245, School of Computer Science.

ClockThursday 05 March 2015, 11:00-12:00

Title to be confirmed

UserCas Cremers, University of Oxford.

HouseRoom 245, School of Computer Science.

ClockThursday 19 February 2015, 11:00-12:00

StarfishNet: decentralised security for low-power wireless networks

UserJustin King-Lacroix, University of Oxford.

HouseRoom 245, School of Computer Science.

ClockThursday 12 February 2015, 11:00-12:00

Understanding and Fighting Malicious Activity on Online Social Networks

UserGianluca Stringhini, University College London.

HouseRoom 245, School of Computer Science.

ClockThursday 05 February 2015, 11:00-12:00

CESG's Secure Communications Strategy

UserPeter Haigh, CESG.

HouseRoom 245, School of Computer Science.

ClockThursday 04 December 2014, 11:00-12:00

Blindspot: Indistinguishable Anonymous Communications

UserJoseph Gardiner (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 27 November 2014, 11:00-12:00

PhD Student Five Minute Talks

UserVarious speakers.

HouseRoom 245, School of Computer Science.

ClockThursday 13 November 2014, 11:00-12:00

Security of ECDSA in Bitcoin

UserNicolas T. Courtois (University College London).

HouseRoom 245, School of Computer Science.

ClockThursday 06 November 2014, 11:30-12:30

Hack.lu CTF

UserVarious speakers.

HouseRoom 245, School of Computer Science.

ClockThursday 30 October 2014, 11:00-12:00

Key usage detection

UserJiangshan Yu (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 09 October 2014, 11:00-12:00

Formal Methods for the Security of the Internet of Services

UserLuca Vigano, King's College London.

HouseRoom 245, School of Computer Science.

ClockSunday 27 July 2014, 12:00-13:00

Probabilistic assessment of security scenarios - challenges and solutions

UserBarbara Kordy, University of Luxembourg.

HouseRoom 245, School of Computer Science.

ClockThursday 24 July 2014, 11:00-12:00

Balancing Societal Security and Individual Privacy: Accountable Escrow System

User Jia Liu, Mark D. Ryan (University of Birmingham); Liqun Chen (HP Labs, Bristol).

HouseRoom 245, School of Computer Science.

ClockThursday 10 July 2014, 11:00-12:00

An overview of some GCHQ/NSA projects

UserTom Chothia, University of Birmingham.

HouseRoom 245, School of Computer Science.

ClockThursday 03 July 2014, 11:00-12:00

Entropy model checking [NOTE: CHANGE OF LOCATION]

UserChunyan Mu, University of Birmingham.

HouseRoom 217, School of Computer Science.

ClockThursday 26 June 2014, 11:00-12:00

ECC-based bug attacks on OpenSSL: a retrospective

UserDan Page, University of Bristol.

HouseRoom 245, School of Computer Science.

ClockThursday 19 June 2014, 11:00-12:00

Security and privacy in society: meeting at the Royal Society

UserMark Ryan, University of Birmingham.

HouseRoom 245, School of Computer Science.

ClockThursday 05 June 2014, 11:00-12:00

Care.data: when good intentions are not enough

UserIan Batten, University of Birmingham.

HouseRoom 245, School of Computer Science.

ClockThursday 08 May 2014, 11:00-12:00

A Formal Model and Practical Technique for Quantifying Information Leakage in Software

UserChris Novakovic, University of Birmingham.

HouseRoom 245, School of Computer Science.

ClockWednesday 30 April 2014, 11:00-12:00

Timing attacks in security protocols: symbolic framework and proof techniques

UserVincent Cheval (School of Computer Science, University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 17 April 2014, 11:00-12:00

Robbing the bank using formal methods

UserJoeri de Ruiter.

HouseRoom 245, School of Computer Science.

ClockThursday 03 April 2014, 11:00-12:00

Stanford Javascript crypto library

UserMihai Ordean.

HouseRoom 245, School of Computer Science.

ClockThursday 27 March 2014, 11:00-12:00

Verifying Differential Privacy by Program Logic

UserMarco Gaboardi.

HouseRoom 222, School of Computer Science.

ClockThursday 20 March 2014, 10:00-11:00

NDSS dry run

UserMark Ryan.

HouseRoom 222, School of Computer Science.

ClockThursday 06 February 2014, 10:00-11:00

Quantitative analysis of opacity

UserChunyan Mu.

HouseRoom 245, School of Computer Science.

ClockThursday 05 December 2013, 11:00-12:00

Private machine learning: case of the Internet

UserShishir Nagaraja, School of Computer Science, University of Birmingham.

HouseRoom 245, School of Computer Science.

ClockThursday 07 November 2013, 11:00-12:00

A Schnorr-Like Lightweight Identity-Based Signature Scheme

UserFlavio Garcia, School of Computer, University of Birmingham.

HouseRoom 245, School of Computer Science.

ClockThursday 24 October 2013, 11:00-12:00

Dev-Vote: Electronic voting on an untrusted platform

UserGurchetan S Grewal.

HouseRoom 245, School of Computer Science.

ClockThursday 10 October 2013, 11:00-12:00

A Qualitative Comparison of SSL Validation Alternatives

UserHenning Perl, Leibniz Universität Hannover.

HouseRoom 245, School of Computer Science.

ClockMonday 29 July 2013, 11:00-12:00

Dynamic measurement and protected execution: model and analysis

UserIan Batten, School of Computer Science, University of Birmingham.

HouseRoom 245, School of Computer Science.

ClockThursday 18 July 2013, 11:00-12:00

Privacy issues: from protocols to applications

UserVincent Cheval (School of Computer Science, University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 04 July 2013, 11:00-12:00

Probabilistic Point-to-Point Information Leakage

UserChris Novakovic (School of Computer Science, University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 20 June 2013, 11:00-12:00

Imposing Order on the Temporal Chaos of ProVerif*

UserTom Chothia (School of Computer Science, University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 06 June 2013, 11:00-12:00

Caveat Coercitor: coercion-evidence in electronic voting

UserGurchetan S. Grewal and Mark Ryan.

HouseRoom 217, School of Computer Science.

ClockFriday 10 May 2013, 11:00-12:00

Static Analysis for Regular Expression Denial-of-Service Attacks

UserAsiri Rathnayake (University of Birmingham).

HouseRoom 245, School of Computer Science.

ClockThursday 09 May 2013, 11:00-12:00

If you have a question about this list, please contact: Andreea Radu; Dr Garfield Benjamin. If you have a question about a specific talk, click on that talk to find its organiser.

 

Talks@bham, University of Birmingham. Contact Us | Help and Documentation | Privacy and Publicity.
talks@bham is based on talks.cam from the University of Cambridge.