Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
(25 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Embedded-Device Forensics ==
+
== Privacy for Mobile Apps ==
  
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
|-
 
|-
| '''TIME:'''&nbsp; 10:00h, Friday 4 October 2019<br />'''PLACE:'''&nbsp;  Kristan Nygaards Hall (Room 5370), IFI, UiO - OJD House<br /><br />'''AGENDA:'''<br />
+
| '''TIME:'''&nbsp; 29 April 2020, 14:00h<br />'''Place:'''&nbsp;  Virtual seminar room: email josang@mn.uio.no to get the address, <br /><br />'''AGENDA:'''<br />
10:00h Welcom at UiO<br />10:15h Invited Talk:
+
14:00h Welcome to AF''Security'''s virtual seminar room<br />14:05h Invited talk:
| [[File:Logo-SINTEF.png|300px|link=https://sintef.no/]]
+
| <center>[[File:logo-Karlstad.png|150px|link=https://wiki.uio.no/mn/ifi/AFSecurity/]]</center>
 
|}
 
|}
* '''TALK:''' &nbsp;''Case Studies in Invasive Embedded Device Forensics: Evidence Extraction and Firmware Verification''<br />'''SPEAKER:''' ''Sujeet Shenoi'' (University of Tulsa, USA) &nbsp; <br />'''ABSTRACT:'''  This presentation describes various electronic, physical and chemical techniques for extracting data and firmware from embedded devices.  The techniques range from basic non-invasive techniques to sophisticated invasive techniques using chip desoldering and chemical etching or laser ablation to expose bond wires inside chip packages and extract data.  Several case studies related to evidence extraction from embedded devices are presented. Also, case studies dealing with the extraction and verification of firmware in suspected supply chain compromises are presented.
+
* '''TITLE:''' &nbsp;''Privacy for mobile apps: Technical, regulatory and human challenges'' <br />'''SPEAKER:''' &nbsp;''Nurul Momen''&nbsp; (Karlstad University) <br />'''ABSTRACT:'''  What is the most intimate device that you possess? If the answer is your mobile phone, you'd probably be interested in finding out how apps behave. In one end, we have a powerful device capable of collecting, monitoring, processing, transmitting data and in other end, this device is connected to hundreds of services through apps. Undeniably, users are being subjected to privacy exploitation due to the obvious reason - surveillance capitalism. We intend to turn the table around by simply asking - how do the apps behave?
 
 
11:00h Discussion<br />
 
 
 
== Threat of Open-Source Intelligence ==
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
|-
 
| '''TIME:'''&nbsp; 14:00h, Friday 4 October 2019<br />'''PLACE:'''&nbsp;  Kristan Nygaards Hall (Room 5370), IFI, UiO - OJD House<br /><br />'''AGENDA:'''<br />
 
14:00h Welcom at UiO<br />
 
14:15h Invited Talk:
 
| [[File:Logo-SINTEF.png|300px|link=https://sintef.no/]]
 
|}
 
* '''TALK:''' &nbsp;''How Open-Source Intelligence is Used to Attack Critical Infrastructure Assets''<br />'''SPEAKER:''' ''Sujeet Shenoi'' (University of Tulsa, USA) &nbsp; <br />'''ABSTRACT:'''  This case-study-based presentation demonstrates how open-source information can be collected and leveraged to attack critical infrastructure assets.  The case studies include the Stuxnet malware, information operations on an offshore oil and gas platform and a cyber and physical penetration of a financial entity.
 
 
 
15:00h Discussion<br />
 
  
 +
14:45h Discussion<br />
  
 +
'''BIO:''' &nbsp; Nurul Momen is a Ph.D. candidate in the Department of Computer Science and Mathematics at Karlstad University, Sweden. His research interests focus on privacy-enhancing technologies, transparency, usability, mobile communications, and data protection, particularly the security and privacy aspects of access-control models for mobile operating systems. Momen received an M.S. in security and an M.S. in privacy from the double-degree program at the Technical University of Berlin, Germany, and the University of Trento, Italy. Contact him at nurul.momen@kau.se.<br />
  
'''SPEAKER BIO''' <br/>
 
Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma; and a member of the technical staff at Johns Hopkins University Applied Physics Laboratory, Laurel, Maryland. An active researcher with specialties in cyber security, cyber operations, critical infrastructure protection and digital forensics, Dr. Shenoi works on exciting “problems” ranging from helping solve homicides to penetrating telecommunications systems, oil and gas pipelines, wind farms and voting machines. Dr. Shenoi is the Editor-in-Chief of the International Journal of Critical Infrastructure Protection (Elsevier); and Editor of the Advances in Digital Forensics and Critical Infrastructure Protection (Springer) series, now in their thirteenth and eleventh volumes, respectively. He spearheads the University of Tulsa's elite Cyber Corps Program that trains “MacGyvers” for U.S. government agencies, and is the Director of the Cyber Security Education Consortium, a National Science Foundation ATE Center that is building a high-tech workforce in the Southwestern United States. For his innovative strategies integrating academics, research and service, Dr. Shenoi was named the 1998-1999 U.S. Professor of the Year by the Carnegie Foundation.
 
 
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
|-
 
|-
 
| [[File:AFSecurity-small.png|250px]]
 
| [[File:AFSecurity-small.png|250px]]
| AF''Security'' is organised by the UiO Research Group on [https://www.mn.uio.no/ifi/english/research/groups/sec/ Information &amp; Cyber Security]
+
| AF''Security'' is organised by the UiO Research Group on [https://www.mn.uio.no/ifi/english/research/groups/sec/ Digital Security]
| [[File:Sec-uio-light-1000.png|250px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
+
| [[File:Sec-light-360.png|250px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
|}
 
|}

Revision as of 17:02, 24 April 2020

Privacy for Mobile Apps

TIME:  29 April 2020, 14:00h
Place:  Virtual seminar room: email josang@mn.uio.no to get the address,

AGENDA:

14:00h Welcome to AFSecurity's virtual seminar room
14:05h Invited talk:

Logo-Karlstad.png
  • TITLE:  Privacy for mobile apps: Technical, regulatory and human challenges
    SPEAKER:  Nurul Momen  (Karlstad University)
    ABSTRACT: What is the most intimate device that you possess? If the answer is your mobile phone, you'd probably be interested in finding out how apps behave. In one end, we have a powerful device capable of collecting, monitoring, processing, transmitting data and in other end, this device is connected to hundreds of services through apps. Undeniably, users are being subjected to privacy exploitation due to the obvious reason - surveillance capitalism. We intend to turn the table around by simply asking - how do the apps behave?

14:45h Discussion

BIO:   Nurul Momen is a Ph.D. candidate in the Department of Computer Science and Mathematics at Karlstad University, Sweden. His research interests focus on privacy-enhancing technologies, transparency, usability, mobile communications, and data protection, particularly the security and privacy aspects of access-control models for mobile operating systems. Momen received an M.S. in security and an M.S. in privacy from the double-degree program at the Technical University of Berlin, Germany, and the University of Trento, Italy. Contact him at nurul.momen@kau.se.

AFSecurity-small.png AFSecurity is organised by the UiO Research Group on Digital Security Sec-light-360.png