The 2nd TCE Summer School on Computer Security

  • Date/Time
    Date(s) - 21/07/2013 - 25/07/2013
    All Day

    Location
    Auditorium 2, Taub Building (CS)

    Categories No Categories


     
    Topics include applied and theoretical research in areas such as cloud security, HW security, electronic voting, privacy issues and more.
     
    Organizers
    Eli Biham (CS Dean, Technion)
    Yuval Ishai (CS Technion)
     
    Main Speakers
    Alex Halderman (University of Michigan)
    Nadia Heninger (University of Pennsylvania)
    Vitaly Shmatikov (University of Texas at Austin)
    Gene Tsudik (University of California, Irvine)
     
    Guest Speakers
    Orr Dunkelman (Haifa University)
    Danny Harnik (IBM Research)
    Amir Herzberg (Bar-Ilan University)
    Niv Gilboa (Ben Gurion University)
    Yehuda Lindell (Bar-Ilan University)
    Tal Moran (IDC Herzliya)
    Benny Pinkas (Bar-Ilan University)
    Alon Rosen (IDC Herzliya)
    Tomer Teller (Check Point)
     
    Program
    Sunday, July 21   Videos/Slides
    09:15-09:30
    Opening remarks
    Yuval Ishai (CS, Technion)
    Eli Biham (CS Dean, Technion)
     
    09:30-11:00
    Adventures in Public-Key Cryptanalysis
    Nadia Heninger (University of Pennsylvania) – part 1

    Slides | Video

    11:00-11:30 Coffee Break  
    11:30-13:00
    Adventures in Public-Key Cryptanalysis 
    Nadia Heninger (University of Pennsylvania) – part 2

    Slides | Video

    13:00-14:00 Lunch  
    14:00-15:00
    Adventures in Public-Key Cryptanalysis
    Nadia Heninger (University of Pennsylvania) – part 3

    Slides | Video

    15:00-16:00
    Non-Interactive Secure Computation Systems
    Benny Pinkas (Bar-Ilan University)
    Slides | Video
    16:00-16:15 Coffee Break  
    16:15-17:15
    Broadcast Encryption – an Overview
    Niv Gilboa (Ben Gurion University)
    Slides | Video
         
    Monday, July 22 * Note late start  
    10:00-11:30
    Attacks Illustrated 2013
    Tomer Teller (Check Point) – part 1
    Slides | Video
    11:30-12:00 Coffee Break  
    12:00-13:30
    Attacks Illustrated 2013
    Tomer Teller (Check Point) – part 2
    Slides | Video
    13:30-14:30 Lunch  
    14:30-15:30
    Secure Two-Party Computation in Practice
    Yehuda Lindell (Bar-Ilan University) – part 1

    Slides | Video
    15:30-16:30
    Secure Two-Party Computation in Practice
    Yehuda Lindell (Bar-Ilan University) – part 2

    Slides | Video
    16:30-16:45 Coffee Break  
    16:45-17:30
    Secure Two-Party Computation in Practice
    Yehuda Lindell (Bar-Ilan University) – part 3

    Slides | Video
         
    Tuesday, July 23    
    09:30-11:00
    Security and Privacy in Named-Data Networking
    Gene Tsudik (University of California, Irvine)

    Video
    11:00-11:30 Coffee Break  
    11:30-13:00
    A Minimalist Approach to Remote Attestation
    Gene Tsudik (University of California, Irvine)

    Video
    13:00-14:00 Lunch  
    14:00-15:00
    Oblivious Pseudo-Random Functions and Applications
    Gene Tsudik (University of California, Irvine)
    Video
    15:00-16:00
    Security and Deduplication in the Cloud
    Danny Harnik (IBM Research)
    Slides | Video
    16:00-16:15 Coffee Break  
    16:15-17:15
    Cryptographic Elections – How to Simultaneously Achieve Verifiability and Privacy
    Alon Rosen (IDC Herzliya)

    Slides 1  | Slides 2

    Video

         
    Wednesday, July 24    
    09:30-11:00
    Challenging Crypto Assumptions: From Cold Boot Attacks to Censorship Resistance
    Alex Halderman (University of Michigan)
    Video
    11:00-11:30 Coffee Break  
    11:30-13:00
    Challenging Engineering Assumptions: Election Security in Practice
    Alex Halderman (University of Michigan)
    Video
    13:00-14:00 Lunch  
    14:00-15:00
    Challenging Measurement Assumptions: Fast Internet-wide Scanning
    Alex Halderman (University of Michigan) – part 3
    Video
    15:00-16:00
    Verifiable Anonymous Polling
    Tal Moran (IDC Herzliya)

    N/A
    16:00-16:15 Coffee Break  
    16:15-17:15
    Off-Path Hacking: The Illusion of Challenge-Response Authentication
    Amir Herzberg (Bar-Ilan University)
    Slides | Video
         
    Thursday, July 25    
    09:30-11:00
    Privacy Technologies: What Works, What Doesn't, and What Is To Be Done
    Vitaly Shmatikov (University of Texas at Austin) – part 1
    Slides | Video
    11:00-11:30 Coffee Break  
    11:30-13:00
    Privacy Technologies: What Works, What Doesn't, and What Is To Be Done
    Vitaly Shmatikov (University of Texas at Austin) – part 2
    Slides | Video
    13:00-14:00 Lunch  
    14:00-15:00
    Privacy Technologies: What Works, What Doesn't, and What Is To Be Done
    Vitaly Shmatikov (University of Texas at Austin) – part 3
    Slides | Video
    15:00-16:00
    When Cryptography is not the Answer (even when it is)
    Orr Dunkelman (Haifa University)
    Slides | Video
    16:00-16:15 Conclusion