Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
 
(29 intermediate revisions by the same user not shown)
Line 1: Line 1:
== 5G Security & Challenges ==
+
== Privacy for Mobile Apps ==
  
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
|-
 
|-
| '''DATE:'''&nbsp; Tuesday 10 September 2019<br />
+
| '''TIME:'''&nbsp; 29 April 2020, 14:00h<br />'''Place:'''&nbsp;  Virtual seminar room: email josang@mn.uio.no to get the address, <br /><br />'''AGENDA:'''<br />
'''PLACE:'''&nbsp;  Kristan Nygaards Hall (Room 5370), IFI, UiO - OJD House . <br /><br />
+
14:00h Welcome to AF''Security'''s virtual seminar room<br />14:05h Invited talk:
'''AGENDA:'''<br />
+
| <center>[[File:logo-Karlstad.png|150px|link=https://wiki.uio.no/mn/ifi/AFSecurity/]]</center>
14:00h Welcom at UiO<br /><br />14:15h Invited Talk:
 
| [[File:Logo-SINTEF.jpg|300px|link=https://ccdcoe.org/]]
 
 
|}
 
|}
* '''TALK:''' &nbsp;''5G Security &amp; Challenges''<br />'''SPEAKER:''' ''Ravi Borgaonkar'' (SINTEF) &nbsp; <br />'''ABSTRACT:'''  5G network promises to transform industries and our digital society by providing enhanced capacity, higher data rates, lower battery for machine-type devices, higher availability and reduced power consumption. In a way, 5G will act as a vehicle to drive much needed digital transformation race and will push the world into the information age. In addition, 5G can be used to replace the existing emergency communication network infrastructures. However, with a higher speed and low latency, higher bandwidth availability attacks and attack surface will also be increased. In addition, in coming years, 5G may become the national critical infrastructure itself, thereby requiring new requirements, regulations, and policies to safeguard the national security interests.  In this talk, we visit 5G security architecture &amp; outline potential security challenges in deployed networks. We use previously known and severe telecom security attacks examples to demonstrate potential risks of 5G. Finally, the talk will cover future research directions to minimize security risks to build 5G enabled information transportation superhighways.
+
* '''TITLE:''' &nbsp;''Privacy for mobile apps: Technical, regulatory and human challenges'' <br />'''SPEAKER:''' &nbsp;''Nurul Momen''&nbsp; (Karlstad University) <br />'''ABSTRACT:'''  What is the most intimate device that you possess? If the answer is your mobile phone, you'd probably be interested in finding out how apps behave. In one end, we have a powerful device capable of collecting, monitoring, processing, transmitting data and in other end, this device is connected to hundreds of services through apps. Undeniably, users are being subjected to privacy exploitation due to the obvious reason - surveillance capitalism. We intend to turn the table around by simply asking - how do the apps behave?
  
15:00h Discussion<br />
+
14:45h Discussion<br />
  
 +
'''BIO:''' &nbsp; Nurul Momen is a Ph.D. candidate in the Department of Computer Science and Mathematics at Karlstad University, Sweden. His research interests focus on privacy-enhancing technologies, transparency, usability, mobile communications, and data protection, particularly the security and privacy aspects of access-control models for mobile operating systems. Momen received an M.S. in security and an M.S. in privacy from the double-degree program at the Technical University of Berlin, Germany, and the University of Trento, Italy. Contact him at nurul.momen@kau.se.<br />
  
'''SPEAKER BIO''' <br/>
 
Dr. Ravishankar Borgaonkar works as a research scientist at SINTEF Digital and undertakes research in securing next generation digital communication. He holds a PhD in telecommunication security area from Technischen Universität Berlin (TU Berlin, 2013). His primary research themes are related to mobile telecommunication networks and security threats for the next generation of digital communication, ranging from 2G/3G/4G/5G network security to end-user device security. He has extensive experience as a security researcher (Deutsche Telekom's lab, Intel Collaborative Research Institute for Secure Computing at Aalto University, University of Oxford), focusing lately on 5G security research.
 
 
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
|-
 
|-
 
| [[File:AFSecurity-small.png|250px]]
 
| [[File:AFSecurity-small.png|250px]]
| AF''Security'' is organised by the UiO Research Group on [https://www.mn.uio.no/ifi/english/research/groups/sec/ Information &amp; Cyber Security]
+
| AF''Security'' is organised by the UiO Research Group on [https://www.mn.uio.no/ifi/english/research/groups/sec/ Digital Security]
| [[File:Sec-uio-light-1000.png|250px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
+
| [[File:Sec-light-360.png|250px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
|}
 
|}

Latest revision as of 17:02, 24 April 2020

Privacy for Mobile Apps

TIME:  29 April 2020, 14:00h
Place:  Virtual seminar room: email josang@mn.uio.no to get the address,

AGENDA:

14:00h Welcome to AFSecurity's virtual seminar room
14:05h Invited talk:

Logo-Karlstad.png
  • TITLE:  Privacy for mobile apps: Technical, regulatory and human challenges
    SPEAKER:  Nurul Momen  (Karlstad University)
    ABSTRACT: What is the most intimate device that you possess? If the answer is your mobile phone, you'd probably be interested in finding out how apps behave. In one end, we have a powerful device capable of collecting, monitoring, processing, transmitting data and in other end, this device is connected to hundreds of services through apps. Undeniably, users are being subjected to privacy exploitation due to the obvious reason - surveillance capitalism. We intend to turn the table around by simply asking - how do the apps behave?

14:45h Discussion

BIO:   Nurul Momen is a Ph.D. candidate in the Department of Computer Science and Mathematics at Karlstad University, Sweden. His research interests focus on privacy-enhancing technologies, transparency, usability, mobile communications, and data protection, particularly the security and privacy aspects of access-control models for mobile operating systems. Momen received an M.S. in security and an M.S. in privacy from the double-degree program at the Technical University of Berlin, Germany, and the University of Trento, Italy. Contact him at nurul.momen@kau.se.

AFSecurity-small.png AFSecurity is organised by the UiO Research Group on Digital Security Sec-light-360.png