Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
(33 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Red Teaming in Cyber Exercises ==
+
== Privacy for Mobile Apps ==
  
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
|-
 
|-
| '''DATE:'''&nbsp; 30 August 2019<br />
+
| '''TIME:'''&nbsp; POSTPONED<br />'''Place:'''&nbsp;  Kristen Nygaard's Hall (Room 5370), [https://wiki.uio.no/mn/ifi/AFSecurity/index.php/Location Ole-Johan Dahl's House, UiO]<br /><br />'''AGENDA:'''<br />
'''PLACE:'''&nbsp;  Kristan Nygaards Hall (Room 5370), IFI, UiO - OJD House . <br /><br />
+
14:00h Welcome to UiO, coffee served<br />14:15h Invited talk:
'''AGENDA:'''<br />
+
| <center>[[File:logo-Karlstad.png|150px|link=https://wiki.uio.no/mn/ifi/AFSecurity/]]</center>
14:00h Welcom at UiO<br /><br />14:15h Invited Talk:
 
| [[File:logo-ENSICAEN.png|300px|link=https://ccdcoe.org/]]
 
 
|}
 
|}
* '''TALK:''' &nbsp;''Privacy Threat of Keystroke Profiling on the Web''<br />'''SPEAKER:''' ''Denis Migdal'' (ENSICAEN) &nbsp; <br />'''ABSTRACT:''' In a browser environment, Keystroke Dynamics (the way of typing on a keyboard) is an interesting biometric modality as it requires neither additional sensors (just your keyboard), nor additional actions from the user.  Keystroke Dynamics can easily be collected through a Web page to authenticate,  identify,  or profile visitors...  even without their knowledge and consent. Contrary  to  learning-based  Keystroke  Dynamics  (s.a.  based  on  Deep  learning  or SVM), distance-based Keystroke Dynamics can be used with very few data.  However, it generally provides deceiving authentication and identification performances.  In a first part, we will see how to improve such performances, and how Keystroke Dynamics can pose serious threats to users privacy, even with only few information. Fortunately, thanks to Keystroke Dynamics Anonymization Systems, it is possible to protect our Keystroke Dynamics, or at last to disturb identification and profiling systems. Several  Keystroke  Dynamics  Anonymization  Systems  will  be  presented  in  the  second part, as  well  as  some  recommendations  to build  and  implement  Keystroke  Dynamics Anonymization Systems. In a third part, I will present a multi-modal privacy-compliant authentication based, among other, on Keystroke Dynamics, as well as some schemes and uses cases. Proof of authorship in an online collaborative document writing, or proof of identity on a Social Network constitute application of our proposed authentication. And if we still have time, the fourth part will be dedicated to synthetic generation of Keystroke Dynamics.  Usurpation of Keystroke Dynamics, Keystroke Dynamics dataset creation or augmentation, and better understanding of Keystroke Dynamics are goals of Keystroke Dynamics synthetic generation
+
* '''TITLE:''' &nbsp;''Privacy for mobile apps: Technical, regulatory and human challenges'' <br />'''SPEAKER:''' &nbsp;''Nurul Momen''&nbsp; (Karlstad University) <br />'''ABSTRACT:''' What is the most intimate device that you possess? If the answer is your mobile phone, you'd probably be interested in finding out how apps behave. In one end, we have a powerful device capable of collecting, monitoring, processing, transmitting data and in other end, this device is connected to hundreds of services through apps. Undeniably, users are being subjected to privacy exploitation due to the obvious reason - surveillance capitalism. We intend to turn the table around by simply asking - how do the apps behave?
16:00h Discussion<br />
 
  
 +
15:00h Discussion<br />
 +
 +
'''BIO:''' &nbsp; Nurul Momen is a Ph.D. candidate in the Department of Computer Science and Mathematics at Karlstad University, Sweden. His research interests focus on privacy-enhancing technologies, transparency, usability, mobile communications, and data protection, particularly the security and privacy aspects of access-control models for mobile operating systems. Momen received an M.S. in security and an M.S. in privacy from the double-degree program at the Technical University of Berlin, Germany, and the University of Trento, Italy. Contact him at nurul.momen@kau.se.<br />
  
'''SPEAKER BIO''' <br/>
 
Denis Migdal is PhD student at ENSICAEN in Caen, France. His PhD research project focuses on privacy protection against user profiling which can exploit biometric keystroke dynamics of normal user activity on the Web.
 
 
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
|-
 
|-
 
| [[File:AFSecurity-small.png|250px]]
 
| [[File:AFSecurity-small.png|250px]]
| AF''Security'' is organised by the UiO Research Group on [https://www.mn.uio.no/ifi/english/research/groups/sec/ Information &amp; Cyber Security]
+
| AF''Security'' is organised by the UiO Research Group on [https://www.mn.uio.no/ifi/english/research/groups/sec/ Digital Security]
| [[File:Sec-uio-light-1000.png|250px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
+
| [[File:Sec-light-360.png|250px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
|}
 
|}

Revision as of 11:36, 14 March 2020

Privacy for Mobile Apps

TIME:  POSTPONED
Place:  Kristen Nygaard's Hall (Room 5370), Ole-Johan Dahl's House, UiO

AGENDA:

14:00h Welcome to UiO, coffee served
14:15h Invited talk:

Logo-Karlstad.png
  • TITLE:  Privacy for mobile apps: Technical, regulatory and human challenges
    SPEAKER:  Nurul Momen  (Karlstad University)
    ABSTRACT: What is the most intimate device that you possess? If the answer is your mobile phone, you'd probably be interested in finding out how apps behave. In one end, we have a powerful device capable of collecting, monitoring, processing, transmitting data and in other end, this device is connected to hundreds of services through apps. Undeniably, users are being subjected to privacy exploitation due to the obvious reason - surveillance capitalism. We intend to turn the table around by simply asking - how do the apps behave?

15:00h Discussion

BIO:   Nurul Momen is a Ph.D. candidate in the Department of Computer Science and Mathematics at Karlstad University, Sweden. His research interests focus on privacy-enhancing technologies, transparency, usability, mobile communications, and data protection, particularly the security and privacy aspects of access-control models for mobile operating systems. Momen received an M.S. in security and an M.S. in privacy from the double-degree program at the Technical University of Berlin, Germany, and the University of Trento, Italy. Contact him at nurul.momen@kau.se.

AFSecurity-small.png AFSecurity is organised by the UiO Research Group on Digital Security Sec-light-360.png