CERIAS Weekly Security Seminar - Purdue University
Video
4.1(7)

CERIAS Weekly Security Seminar - Purdue University

by CERIAS <[email protected]>

646 episodesLatest 13 days agoEN-US
CERIAS -- the Nation's top-ranked interdisciplinary academic education and research institute -- hosts a weekly cyber security, privacy, resiliency or autonomy speaker, highlighting technical discovery, a case studies or exploring cyber operational approaches; they are not product demonstrations, service sales pitches, or company recruitment presentations. Join us weekly...or explore 25 years of archives for the who's-who in cybersecurity.

Purdue University

Episodes (646)

  1. Pragathi Jha, Modeling Cyber Adversaries: A Critical Survey of Methods and Assumptions

    Apr 29, 202649m#917Video

    Cybersecurity practitioners face a persistent methodological problem: how should we reason about intelligent adversaries who observe our defenses, adapt their tactics, and choose targets based on our vulnerabilities? The

  2. Smriti Bhatt, Evolving Security Landscape in the Agentic AI-Enabled IoT Era

    Apr 22, 202659m#916Video

    The rapid evolution of connected devices and technologies has transformed the Internet of Things (IoT) into increasingly intelligent and autonomous systems. This talk focuses on the progression from traditional IoT to th

  3. Gary Hayslip, The AI Arms Race

    Apr 15, 202652m#915Video

    Ransomware has evolved from basic digital extortion into a sophisticated, AI-powered threat that's faster,smarter, and more devastating than ever before. In this session, we'll explore how threat actors are weaponizing a

  4. Brian Peretti, Symposium Closing Keynote: AI, Cybersecurity, and the Path Forward

    Apr 8, 20261h 13m#914Video

    Annual Security Symposium. Visit: https://ceri.as/2026 Artificial intelligence is rapidly transforming both the opportunities and risks within cybersecurity, creating a new landscape that today's students and researchers

  5. Jen Sims, Analyzing Supply Chain Risk in Mobile Applications for Home Energy Storage Systems

    Apr 1, 202655m#913Video

    The rapid adoption of mobile applications for managing consumer whole-house battery and energy systems has introduced new questions about software supply chain security. While these applications are not currently integra

  6. Kelechi Kalu, Software Signing in Practice: Lessons from Adoption and Usability Toward Broader Supply Chain Trust

    Mar 25, 20261h 3m#912Video

    Software signing is a foundational mechanism for improving software supply-chain security because it helps establish artifact provenance, integrity, and authenticity across organizational boundaries. Yet the security val

  7. Ashish Kundu, Quantum Secure Networks

    Mar 11, 20261h 1m#911Video

    Quantum threats to cryptography has been fueled by Shor's and Grover's quantum algorithms and their derivatives. That has led a decade-long development of post-quantum cryptography algorithms and standards. While there a

  8. Ruqi Zhang, Discovering and Controlling AI Safety Risks in Foundation Models: A Probabilistic Perspective

    Mar 4, 202659m#910Video

    As foundation models, including large language models and multimodal models, are increasingly deployed in complex and high-stakes settings, ensuring their safety has become more important than ever. In this talk, I prese

  9. Danny Vukobratovich, ISO 27001 as the Engine, NIST CSF 2.0 as the Dashboard, A Practical Operating Model

    Feb 25, 20261h 3m#909Video

    Many organizations adopt security frameworks but struggle to turn them into day-to-day operations that reduce risk without slowing delivery. This talk presents a practical operating model that pairs ISO/IEC 27001 (as the

  10. Thai Le, Towards Robust and Trustworthy AI Speech Models: What You Read Isn't What You Hear

    Feb 18, 202638m#908Video

    Deepfake voice technology is rapidly advancing, but how well do current detection systems handle differences in language and writing style? Most existing work focuses on robustness to acoustic variations such as backgrou

  11. Bethanie Williams, AI-Assisted Cyber-Physical Attack Detection in Smart Manufacturing Systems

    Feb 11, 202647m#907Video

    The rise of Industry 4.0 has transformed manufacturing through the integration of cyber-physical systems, connectivity, and real-time data exchange into increasingly automated and intelligent platforms. While these advan

  12. Mary Jean Amon, Parental Sharing ("Sharenting") Through the Lens of Interdependent Privacy

    Feb 4, 202646m#906Video

    Parental sharing, sometimes termed "sharenting," refers to ways that parents share information about their children online and is a common mechanism through which young children are exposed to social media. Parental shar

  13. Young Kim, Counterfeit Medical Devices and Medicines as a Fundamental Cyber-Physical Security Problem

    Jan 28, 202653m#905Video

    Hardware security is not a new problem, but it is rapidly expanding in both consumer and medical domains due to hyperconnectivity. Medical devices and counterfeit medicines represent a fundamental security challenge. In

  14. Vijayanth Tummala, Evaluating The Impact of Cyberattacks On AI-based Machine Vision Systems: A Case Study of Threaded Fasteners

    Jan 21, 202632m#904Video

    AI-driven machine vision systems are becoming essential in mechanical engineering applications such as fastener classification, yet their increasing connectivity exposes them to adversarial cyberattacks. Model evasion at

  15. Rohan Paleja, Building Interpretability into Human-Aware Robots through Neural Tree-Based Models

    Jan 14, 202644m#903Video

    Collaborative robots and machine-learning-based virtual agents are increasingly entering the human workspace with the aim of increasing productivity, enhancing safety, and improving the quality of our lives. These agents

  16. Peter Ukhanov, From MOVEit to EBS – a Look at Mass Exploitation Extortion Campaigns

    Dec 10, 202554m#902Video

    Over the past several years, CL0P has executed multiple mass exploitation campaigns using zero-day vulnerabilities in popular software products that resulted in mass data exfiltration. In this talk we'll take a look at t

  17. Antonio Bianchi, Attacking and Defending Modern Software with LLMs

    Dec 3, 202553m#901Video

    In this talk, I will discuss recent research projects at the intersection of software security and automated reasoning. Specifically, I will present our work on assessing the exploitability of the Android kernel and deve

  18. Stephen Flowerday, The Hidden Laundromat at Play: how illicit value moves through online games

    Nov 19, 20251h 2m#900Video

    Online video games have evolved into vast financial ecosystems where real and virtual value mix at scale. This presentation shows how these spaces serve as efficient laundering channels, converting illicit funds from org

  19. Abulhair Saparov, Can/Will LLMs Learn to Reason?

    Nov 12, 202552m#899Video

    Reasoning—the process of drawing conclusions from prior knowledge—is a hallmark of intelligence. Large language models, and more recently, large reasoning models have demonstrated impressive results on many reasoning-int

  20. Hanshen Xiao, When is Automatic Privacy Proof Possible for Black-Box Processing?

    Nov 5, 202558m#898Video

    Can we automatically and provably quantify and control the information leakage from a black-box processing? From a statistical inference standpoint, in this talk, I will start from a unified framework to summarize existi

  21. Marcus Botacin, Malware Detection under Concept Drift: Science and Engineering

    Oct 29, 202552m#897Video

    The current largest challenge in ML-based malware detection is maintaining high detection rates while samples evolve, causing classifiers to drift. What is the best way to solve this problem? In this talk, Dr. Botacin pr

  22. Rajiv Khanna, The Shape of Trust: Structure, Stability, and the Science of Unlearning

    Oct 22, 202555m#895Video

    Trust in modern AI systems hinges on understanding how they learn—and, increasingly, how they can forget. This talk develops a geometric view of trustworthiness that unifies structure-aware optimization, stability analys

  23. Matthew Sharp, Securing Linux in a Heterogenous Enterprise Environment

    Oct 15, 202551m#894Video

    This seminar examines the challenges of securing Linux (and legacy UNIX) systems in heterogenous enterprise environments, where cohabitant Windows infrastructure often dictates corporate security focus, resources, and to

  24. Stephen Kines, Four Deadly Sins of Cyber: Sloth, Gluttony, Greed & Pride

    Oct 8, 202545m#893Video

    In the UK one of the great global car brands is on the verge of bankruptcy this month due to a single cyber-attack with the consequence of a potential loss of 130,000 jobs. Jaguar Land Rover is seeking a government bail-

  25. Sanket Naik, AI Agents for DevSecOps

    Oct 1, 202548m#892Video

    AI is enabling developers and non-developers (product managers, solutions engineers) to write more lines of code than even before. Businesses are under pressure to ship these AI built products to stay competitive while s