Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
(3 intermediate revisions by the same user not shown)
Line 3: Line 3:
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
|-
 
|-
| '''TIME:'''&nbsp; 15:00h,  Wednesday 26 February 2020<br />'''Place:'''&nbsp;  Kristen Nygaard's Hall (Room 5370), [https://wiki.uio.no/mn/ifi/AFSecurity/index.php/Location Ole-Johan Dahl's House, UiO]<br /><br />'''AGENDA:'''<br />
+
| '''TIME:'''&nbsp; POSTPONED<br />'''Place:'''&nbsp;  Kristen Nygaard's Hall (Room 5370), [https://wiki.uio.no/mn/ifi/AFSecurity/index.php/Location Ole-Johan Dahl's House, UiO]<br /><br />'''AGENDA:'''<br />
15:00h Welcome to UiO<br />15:15h Invited Talk:
+
14:00h Welcome to UiO, coffee served<br />14:15h Invited talk:
| <center>[[File:logo-Karlstad.jfif|200px|link=https://wiki.uio.no/mn/ifi/AFSecurity/]]</center><center>Karlstad Uni</center>
+
| <center>[[File:logo-Karlstad.png|150px|link=https://wiki.uio.no/mn/ifi/AFSecurity/]]</center>
 
|}
 
|}
* '''TITLE:''' &nbsp;''Privacy for mobile apps: Technical, regulatory and human challenges'' <br />'''SPEAKER:''' &nbsp;''Nurul Momen''&nbsp; (Karlstad University) <br />'''ABSTRACT:'''  What is the most intimate thing that you possess? If the answer is your mobile phone, you'd probably be interested in finding out how apps behave. In one end, we have a powerful device capable of collecting, monitoring, processing, transmitting data and in other end, this device is connected to hundreds of services through apps. Undeniably, users are being subjected to privacy exploitation due to the obvious reason - surveillance capitalism. We intend to turn the table around by simply asking - how do the apps behave?
+
* '''TITLE:''' &nbsp;''Privacy for mobile apps: Technical, regulatory and human challenges'' <br />'''SPEAKER:''' &nbsp;''Nurul Momen''&nbsp; (Karlstad University) <br />'''ABSTRACT:'''  What is the most intimate device that you possess? If the answer is your mobile phone, you'd probably be interested in finding out how apps behave. In one end, we have a powerful device capable of collecting, monitoring, processing, transmitting data and in other end, this device is connected to hundreds of services through apps. Undeniably, users are being subjected to privacy exploitation due to the obvious reason - surveillance capitalism. We intend to turn the table around by simply asking - how do the apps behave?
  
16:00h Discussion<br />
+
15:00h Discussion<br />
  
'''BIO:''' &nbsp; Nurul Momen  
+
'''BIO:''' &nbsp; Nurul Momen is a Ph.D. candidate in the Department of Computer Science and Mathematics at Karlstad University, Sweden. His research interests focus on privacy-enhancing technologies, transparency, usability, mobile communications, and data protection, particularly the security and privacy aspects of access-control models for mobile operating systems. Momen received an M.S. in security and an M.S. in privacy from the double-degree program at the Technical University of Berlin, Germany, and the University of Trento, Italy. Contact him at nurul.momen@kau.se.<br />
PhD Student, PriSec<br />
 
Dept. of Mathematics & Computer Science <br />
 
Karlstad University, Sweden.
 
  
 
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
{| border="0" cellpadding="1" cellspacing="1" width="90%"

Revision as of 11:36, 14 March 2020

Privacy for Mobile Apps

TIME:  POSTPONED
Place:  Kristen Nygaard's Hall (Room 5370), Ole-Johan Dahl's House, UiO

AGENDA:

14:00h Welcome to UiO, coffee served
14:15h Invited talk:

Logo-Karlstad.png
  • TITLE:  Privacy for mobile apps: Technical, regulatory and human challenges
    SPEAKER:  Nurul Momen  (Karlstad University)
    ABSTRACT: What is the most intimate device that you possess? If the answer is your mobile phone, you'd probably be interested in finding out how apps behave. In one end, we have a powerful device capable of collecting, monitoring, processing, transmitting data and in other end, this device is connected to hundreds of services through apps. Undeniably, users are being subjected to privacy exploitation due to the obvious reason - surveillance capitalism. We intend to turn the table around by simply asking - how do the apps behave?

15:00h Discussion

BIO:   Nurul Momen is a Ph.D. candidate in the Department of Computer Science and Mathematics at Karlstad University, Sweden. His research interests focus on privacy-enhancing technologies, transparency, usability, mobile communications, and data protection, particularly the security and privacy aspects of access-control models for mobile operating systems. Momen received an M.S. in security and an M.S. in privacy from the double-degree program at the Technical University of Berlin, Germany, and the University of Trento, Italy. Contact him at nurul.momen@kau.se.

AFSecurity-small.png AFSecurity is organised by the UiO Research Group on Digital Security Sec-light-360.png