Difference between revisions of "27 February 2018"

From mn/ifi/AFSecurity
Jump to: navigation, search
Line 14: Line 14:
 
* '''Neural Models of Reputation''',&nbsp; ''Pierre Lison'',&nbsp; ''Norwegian Computing Center.''<br/> This talk present ongoing research on developing data-driven, predictive models of entity reputation (in the sense that it can be considered benign or malicious) for end-point hosts. The talk explains the approach used for learning deep neural networks to automatically predict the reputation of domain names or IP addresses from features extracted from passive DNS data. Furthermore, the talk shows how recurrent neural networks can be employed to detect the presence of malware-generated domain names.
 
* '''Neural Models of Reputation''',&nbsp; ''Pierre Lison'',&nbsp; ''Norwegian Computing Center.''<br/> This talk present ongoing research on developing data-driven, predictive models of entity reputation (in the sense that it can be considered benign or malicious) for end-point hosts. The talk explains the approach used for learning deep neural networks to automatically predict the reputation of domain names or IP addresses from features extracted from passive DNS data. Furthermore, the talk shows how recurrent neural networks can be employed to detect the presence of malware-generated domain names.
 
* '''Intrusion Detection with Neural Networks''',&nbsp; ''Carlos García Cordero'',&nbsp; ''Technical University Darmstadt, Germany.''<br />This talk describes research on flow-based anomaly intrusion detection using replicator neural networks.
 
* '''Intrusion Detection with Neural Networks''',&nbsp; ''Carlos García Cordero'',&nbsp; ''Technical University Darmstadt, Germany.''<br />This talk describes research on flow-based anomaly intrusion detection using replicator neural networks.
* '''Safety of Cyber-Physical Systems''',&nbsp; ''Ulrich Fahrenberg'',&nbsp; ''École Polytecnique, Paris, France.''<br />Modeling and simulation are essential for ensuring the safety and correct functioning of cyber-physical systems (CPS) and are customarily used in industry.  However, running simulations is insufficient to assure functionality.  Formal verification offers itself as an alternative, but has not seen wide-spread adoption.  I will give an overview of the state of the art of CPS verification and point out several venues along which there have been recent promising advances. (Presentation slides: [https://wiki.uio.no/mn/ifi/AFSecurity/images/7/73/AFSec20180227-Fahrenberg-Ecole-Polytechnique.pdf Safety of Cyber-Physical Systems])
+
* [https://wiki.uio.no/mn/ifi/AFSecurity/images/7/73/AFSec20180227-Fahrenberg-Ecole-Polytechnique.pdf '''Safety of Cyber-Physical Systems'''],&nbsp; ''Ulrich Fahrenberg'',&nbsp; ''École Polytecnique, Paris, France.''<br />Modeling and simulation are essential for ensuring the safety and correct functioning of cyber-physical systems (CPS) and are customarily used in industry.  However, running simulations is insufficient to assure functionality.  Formal verification offers itself as an alternative, but has not seen wide-spread adoption.  I will give an overview of the state of the art of CPS verification and point out several venues along which there have been recent promising advances.  
 
* '''CA Authorization: Fixing a Problem or Shifting it Elsewhere?''',&nbsp; ''Nils Gruschka'',&nbsp; ''University of Oslo.''<br />Due to increased security awarenes Web sites are increasingly switching to HTTPS. In addition to the TLS protocol, certificates and the Web PKI are essential. However, numerous incidents of fake certificates have shattered the trust in the current Web PKI system. This talk explains the latest efforts for strengthening certificate security and discusses challenges for the future.   
 
* '''CA Authorization: Fixing a Problem or Shifting it Elsewhere?''',&nbsp; ''Nils Gruschka'',&nbsp; ''University of Oslo.''<br />Due to increased security awarenes Web sites are increasingly switching to HTTPS. In addition to the TLS protocol, certificates and the Web PKI are essential. However, numerous incidents of fake certificates have shattered the trust in the current Web PKI system. This talk explains the latest efforts for strengthening certificate security and discusses challenges for the future.   
 
* '''Quality of biometric data''',&nbsp; ''Christophe Charrier'',&nbsp; ''University of Caen, Paris, France.''<br />Quality assessment of biometric data requires consistent metrics. This talk focuses on the definition and validation of metrics for biometric data.
 
* '''Quality of biometric data''',&nbsp; ''Christophe Charrier'',&nbsp; ''University of Caen, Paris, France.''<br />Quality assessment of biometric data requires consistent metrics. This talk focuses on the definition and validation of metrics for biometric data.

Revision as of 20:49, 6 March 2018

AFSecurity Seminar

Cybersecurity Research Topics

DATE:  Tuesday 27 February 2018

LOCATION:  Kristen Nygaard's Hall (Room 5370), IFI - OJD House.

AGENDA:

14:00h Welcome at IFI

14:10h Invited Talks:

  • Neural Models of ReputationPierre LisonNorwegian Computing Center.
    This talk present ongoing research on developing data-driven, predictive models of entity reputation (in the sense that it can be considered benign or malicious) for end-point hosts. The talk explains the approach used for learning deep neural networks to automatically predict the reputation of domain names or IP addresses from features extracted from passive DNS data. Furthermore, the talk shows how recurrent neural networks can be employed to detect the presence of malware-generated domain names.
  • Intrusion Detection with Neural NetworksCarlos García CorderoTechnical University Darmstadt, Germany.
    This talk describes research on flow-based anomaly intrusion detection using replicator neural networks.
  • Safety of Cyber-Physical SystemsUlrich FahrenbergÉcole Polytecnique, Paris, France.
    Modeling and simulation are essential for ensuring the safety and correct functioning of cyber-physical systems (CPS) and are customarily used in industry. However, running simulations is insufficient to assure functionality. Formal verification offers itself as an alternative, but has not seen wide-spread adoption. I will give an overview of the state of the art of CPS verification and point out several venues along which there have been recent promising advances.
  • CA Authorization: Fixing a Problem or Shifting it Elsewhere?Nils GruschkaUniversity of Oslo.
    Due to increased security awarenes Web sites are increasingly switching to HTTPS. In addition to the TLS protocol, certificates and the Web PKI are essential. However, numerous incidents of fake certificates have shattered the trust in the current Web PKI system. This talk explains the latest efforts for strengthening certificate security and discusses challenges for the future.
  • Quality of biometric dataChristophe CharrierUniversity of Caen, Paris, France.
    Quality assessment of biometric data requires consistent metrics. This talk focuses on the definition and validation of metrics for biometric data.

16:00h Discussion
Chair: Audun Jøsang


SPEAKER BIOS:

  • Pierre Lison is a senior research scientist at the Norwegian Computing Center in Oslo, where he is involved in several research projects related to language technology and machine learning. He studied computer science and computational linguistics at the universities of Louvain (Belgium) and Saarland (Germany), and completed his PhD in 2014 at the University of Oslo..
  • Carlos García Cordero is a scientist, systems engineer, mathematician, musician and thinker. Carlos' research experience and interests are wide and cover diverse topics such as cyber-security, artificial intelligence, programming languages, compilers, machine learning and computer graphics, among others. Carlos is currently studying a PhD in Cyber Security and Distributed Machine Learning at TU Darmstadt. He has an MSc in Artificial Intelligence from The University of Edinburgh and a BSc in Computer Systems Engineering from the ITESM CSF in Mexico, both achieved with the highest honors.
  • Ulrich (Uli) Fahrenberg holds a PhD in mathematics from Aalborg University, Denmark. He has started his career in computer science as an assistant professor at Aalborg University. Afterwards he has worked as a postdoc at Inria Rennes, France, and since 2016 he is a researcher at the computer science lab at École polytechnique in Palaiseau, France. Fahrenberg has worked in algebraic topology, concurrency theory, real-time verification, and general quantitative verification. He has published more than 60 papers in computer science and mathematics.
  • Nils Gruschka studied computer science at the University of Kiel, Germany, and received his PhD degree in 2008. He was a senior researcher at NEC Laboratories Europe in Heidelberg, Germany. In 2012, he became a professor at Kiel University of Applied Sciences, Germany. Since 2018 he is an associate professor at the University of Oslo, Norway.
  • Christophe Charrier obtained his PhD in Computer Science from the University Jean Monnet (Saint-Etienne) in 1998. From 1998 to 2001, he was a Research Assistant with the Laboratory of Radio Communications and Signal Processing, Laval University, Quebec, QC, Canada. In 2001, he joined the Cherbourg Institute of Technology at Saint-Lo as an assistant professor. In 2008, he joined the GREYC lab and the e-payment and biometrics research unit. In 2008, he was a Visiting Scholar with the Laboratory for Image and Video Engineering, University of Texas, Austin. From 2009 to 2011, he was an Invited Professor with the Computer Department, University of Sherbrooke, Sherbrooke, QC, Canada. His current research interests include digital image and video coding, processing, quality assessment, computational vision, biometrics (evaluation of biometric systems, fingerprint quality assessment...) Since 2016, he is the head of e-payment and biometrics research unit.
AFSecurity is organised by the University of Oslo SecurityLab Logo-UiO-SecurityLab-colour.jpg