CERIAS Weekly Security Seminar - Purdue University
by CERIAS <[email protected]>
Purdue University
Apr 29, 2026Episodes (646)

Pragathi Jha, Modeling Cyber Adversaries: A Critical Survey of Methods and Assumptions
Apr 29, 202649m#917Video
Cybersecurity practitioners face a persistent methodological problem: how should we reason about intelligent adversaries who observe our defenses, adapt their tactics, and choose targets based on our vulnerabilities? The

Smriti Bhatt, Evolving Security Landscape in the Agentic AI-Enabled IoT Era
Apr 22, 202659m#916Video
The rapid evolution of connected devices and technologies has transformed the Internet of Things (IoT) into increasingly intelligent and autonomous systems. This talk focuses on the progression from traditional IoT to th

Gary Hayslip, The AI Arms Race
Apr 15, 202652m#915Video
Ransomware has evolved from basic digital extortion into a sophisticated, AI-powered threat that's faster,smarter, and more devastating than ever before. In this session, we'll explore how threat actors are weaponizing a

Brian Peretti, Symposium Closing Keynote: AI, Cybersecurity, and the Path Forward
Apr 8, 20261h 13m#914Video
Annual Security Symposium. Visit: https://ceri.as/2026 Artificial intelligence is rapidly transforming both the opportunities and risks within cybersecurity, creating a new landscape that today's students and researchers

Jen Sims, Analyzing Supply Chain Risk in Mobile Applications for Home Energy Storage Systems
Apr 1, 202655m#913Video
The rapid adoption of mobile applications for managing consumer whole-house battery and energy systems has introduced new questions about software supply chain security. While these applications are not currently integra

Kelechi Kalu, Software Signing in Practice: Lessons from Adoption and Usability Toward Broader Supply Chain Trust
Mar 25, 20261h 3m#912Video
Software signing is a foundational mechanism for improving software supply-chain security because it helps establish artifact provenance, integrity, and authenticity across organizational boundaries. Yet the security val

Ashish Kundu, Quantum Secure Networks
Mar 11, 20261h 1m#911Video
Quantum threats to cryptography has been fueled by Shor's and Grover's quantum algorithms and their derivatives. That has led a decade-long development of post-quantum cryptography algorithms and standards. While there a

Ruqi Zhang, Discovering and Controlling AI Safety Risks in Foundation Models: A Probabilistic Perspective
Mar 4, 202659m#910Video
As foundation models, including large language models and multimodal models, are increasingly deployed in complex and high-stakes settings, ensuring their safety has become more important than ever. In this talk, I prese

Danny Vukobratovich, ISO 27001 as the Engine, NIST CSF 2.0 as the Dashboard, A Practical Operating Model
Feb 25, 20261h 3m#909Video
Many organizations adopt security frameworks but struggle to turn them into day-to-day operations that reduce risk without slowing delivery. This talk presents a practical operating model that pairs ISO/IEC 27001 (as the

Thai Le, Towards Robust and Trustworthy AI Speech Models: What You Read Isn't What You Hear
Feb 18, 202638m#908Video
Deepfake voice technology is rapidly advancing, but how well do current detection systems handle differences in language and writing style? Most existing work focuses on robustness to acoustic variations such as backgrou

Bethanie Williams, AI-Assisted Cyber-Physical Attack Detection in Smart Manufacturing Systems
Feb 11, 202647m#907Video
The rise of Industry 4.0 has transformed manufacturing through the integration of cyber-physical systems, connectivity, and real-time data exchange into increasingly automated and intelligent platforms. While these advan

Mary Jean Amon, Parental Sharing ("Sharenting") Through the Lens of Interdependent Privacy
Feb 4, 202646m#906Video
Parental sharing, sometimes termed "sharenting," refers to ways that parents share information about their children online and is a common mechanism through which young children are exposed to social media. Parental shar

Young Kim, Counterfeit Medical Devices and Medicines as a Fundamental Cyber-Physical Security Problem
Jan 28, 202653m#905Video
Hardware security is not a new problem, but it is rapidly expanding in both consumer and medical domains due to hyperconnectivity. Medical devices and counterfeit medicines represent a fundamental security challenge. In

Vijayanth Tummala, Evaluating The Impact of Cyberattacks On AI-based Machine Vision Systems: A Case Study of Threaded Fasteners
Jan 21, 202632m#904Video
AI-driven machine vision systems are becoming essential in mechanical engineering applications such as fastener classification, yet their increasing connectivity exposes them to adversarial cyberattacks. Model evasion at

Rohan Paleja, Building Interpretability into Human-Aware Robots through Neural Tree-Based Models
Jan 14, 202644m#903Video
Collaborative robots and machine-learning-based virtual agents are increasingly entering the human workspace with the aim of increasing productivity, enhancing safety, and improving the quality of our lives. These agents

Peter Ukhanov, From MOVEit to EBS – a Look at Mass Exploitation Extortion Campaigns
Dec 10, 202554m#902Video
Over the past several years, CL0P has executed multiple mass exploitation campaigns using zero-day vulnerabilities in popular software products that resulted in mass data exfiltration. In this talk we'll take a look at t

Antonio Bianchi, Attacking and Defending Modern Software with LLMs
Dec 3, 202553m#901Video
In this talk, I will discuss recent research projects at the intersection of software security and automated reasoning. Specifically, I will present our work on assessing the exploitability of the Android kernel and deve

Stephen Flowerday, The Hidden Laundromat at Play: how illicit value moves through online games
Nov 19, 20251h 2m#900Video
Online video games have evolved into vast financial ecosystems where real and virtual value mix at scale. This presentation shows how these spaces serve as efficient laundering channels, converting illicit funds from org

Abulhair Saparov, Can/Will LLMs Learn to Reason?
Nov 12, 202552m#899Video
Reasoning—the process of drawing conclusions from prior knowledge—is a hallmark of intelligence. Large language models, and more recently, large reasoning models have demonstrated impressive results on many reasoning-int

Hanshen Xiao, When is Automatic Privacy Proof Possible for Black-Box Processing?
Nov 5, 202558m#898Video
Can we automatically and provably quantify and control the information leakage from a black-box processing? From a statistical inference standpoint, in this talk, I will start from a unified framework to summarize existi

Marcus Botacin, Malware Detection under Concept Drift: Science and Engineering
Oct 29, 202552m#897Video
The current largest challenge in ML-based malware detection is maintaining high detection rates while samples evolve, causing classifiers to drift. What is the best way to solve this problem? In this talk, Dr. Botacin pr

Rajiv Khanna, The Shape of Trust: Structure, Stability, and the Science of Unlearning
Oct 22, 202555m#895Video
Trust in modern AI systems hinges on understanding how they learn—and, increasingly, how they can forget. This talk develops a geometric view of trustworthiness that unifies structure-aware optimization, stability analys

Matthew Sharp, Securing Linux in a Heterogenous Enterprise Environment
Oct 15, 202551m#894Video
This seminar examines the challenges of securing Linux (and legacy UNIX) systems in heterogenous enterprise environments, where cohabitant Windows infrastructure often dictates corporate security focus, resources, and to

Stephen Kines, Four Deadly Sins of Cyber: Sloth, Gluttony, Greed & Pride
Oct 8, 202545m#893Video
In the UK one of the great global car brands is on the verge of bankruptcy this month due to a single cyber-attack with the consequence of a potential loss of 130,000 jobs. Jaguar Land Rover is seeking a government bail-

Sanket Naik, AI Agents for DevSecOps
Oct 1, 202548m#892Video
AI is enabling developers and non-developers (product managers, solutions engineers) to write more lines of code than even before. Businesses are under pressure to ship these AI built products to stay competitive while s