Your personal list 2002-06-12 16:15: Electromagnetic eavesdropping on computers (Markus Kuhn (University of Cambridge)) 2006-01-31 16:15: Covert channels in TCP/IP: attack and defence (Steven J. Murdoch, University of Cambridge) 2006-02-21 16:15: Design and implementation of a CC CAPP-compliant audit subsystem for the Mac OS X and FreeBSD operating systems (Robert N M Watson, University of Cambridge) 2006-02-28 16:15: Hiding on an Ethernet (Richard Clayton, University of Cambridge) 2006-03-07 16:15: Security Flaws in Tunnel Mode IPsec (Kenny Paterson, Royal Holloway, University of London) 2006-03-31 16:00: Enhancing Signature-based Collaborative Spam Detection (Jeff Yan, University of Newcastle upon Tyne) 2006-05-09 16:15: On inverting the VMPC one-way function (Kamil Kulesza, University of Cambridge) 2006-05-16 16:15: An overview of vulnerability research and exploitation (Peter Winter-Smith and Chris Anley, NGS Software) 2006-05-17 14:15: CCTV in the UK: A failure of theory or a failure of practice? (Martin Gill, PRCI Ltd) 2006-05-19 16:00: Network Security Monitoring (Richard Bejtlich, TaoSecurity) 2006-05-23 14:15: Opening locks by bumping in five seconds or less: is it really a threat to physical security? (Marc Weber Tobias, Investigative Law Offices) 2006-06-16 16:15: Bluetooth Simple Pairing: public key cryptography in adhoc wireless systems (Robin Heydon and Steven Wenham, CSR) 2006-07-25 16:15: Milk or wine: does software security improve with age? (Andy Ozment, Computer Laboratory, University of Cambridge) 2006-09-08 16:00: Peer-to-peer network topologies and anonymity (Nikita Borisov, Electrical and Computer Engineering Department, University of Illinois at Urbana-Champaign) 2006-09-19 16:15: Daonity - Grid security with behaviour conformity from Trusted Computing (Wenbo Mao, HP Labs, China) 2006-09-22 16:00: Cache collision timing attacks against AES (Joseph Bonneau, Stanford University) 2006-09-26 16:15: Privacy preserving data mining in distributed databases (Ehud Gudes, Department of Computer Science, Ben-Gurion University) 2006-10-04 14:15: Learning Probabilistic Sequence Models for Uncovering Gene Regulation (Mark Craven, University of Wisconsin) 2006-10-06 16:00: Distance bounding protocols: Authentication logic analysis (Catherine Meadows, Naval Research Laboratory) 2006-10-11 14:15: Logics for Unranked Trees: An Overview (Leonid Libkin, U of Edinburgh) 2006-10-18 14:15: Semantics in broad-coverage natural language processing (Ann Copestake, Computer Laboratory, University of Cambridge) 2006-10-18 16:15: The Polygraph (Marc Weber Tobias, Investigative Law Offices) 2006-10-18 16:15: Learning Probabilistic Sequence Models for Uncovering Gene Regulation (Mark Craven, University of Wisconsin) 2006-10-24 16:15: Becoming paranoid or, How I learned to start worrying and fear the Internet (George Neville-Neil) 2006-10-25 14:15: All-Optical Networks (Dr. Noriaki Kamiyama, Research Scientist, NTT Service Integration Laboratories) 2006-10-27 16:00: Hot or Not: Revealing Hidden Services by their Clock Skew (Steven J. Murdoch (Computer Laboratory, University of Cambridge)) 2006-10-31 16:15: Optically enhanced position-locked power analysis (Sergei Skorobogatov, Computer Laboratory, University of Cambridge) 2006-11-01 14:15: The Challenges and Thrills of a Young Industry (David Braben, Frontier) 2006-11-08 14:15: Security Applications and Aspects of Meaning-Based Computing (Dr Michael Lynch, CEO of Autonomy) 2006-11-15 14:15: Automatic termination proofs for software (Byron Cook, Microsoft Research) 2006-11-17 16:00: Identity-based and inter-domain password authenticated key exchange for pervasive systems (Ford Long Wong) 2006-11-21 16:15: Politics of Internet Security (Richard Allan, Cisco) 2006-11-22 14:15: Safety checking in a domain of collaborative applications. (David Greaves, Computer Laboratory, University of Cambridge) 2006-11-24 16:00: Towards a security policy for ubiquitous healthcare systems (JoonWoong Kim, Computer Laboratory) 2006-11-29 14:15: New Challenges in Describing Digital Music (Alan Blackwell and Alejandro Vinao, Computer Laboratory, University of Cambridge) 2007-01-17 14:15: Verification of fine-grain concurrency: Separation Logic for Floyd assertions in Petri nets. (Tony Hoare, Microsoft Research) 2007-01-23 16:15: Privacy preserving censorship (Yvo Desmedt, Department of Computer Science, University College London) 2007-01-24 14:15: Road transport data and their uses (Richard Gibbens (Computer Laboratory)) 2007-01-30 16:15: A reciprocation-based economy for multiple services in P2P grids (Miranda Mowbray, HP Labs Bristol UK) 2007-01-31 14:15: Mechanising First-Order Logic: Technology, Decidability and Applications (Christoph Weidenbach, Max Planck Institut) 2007-02-06 16:15: Data sharing and privacy in multi-agency working (Adam Warren, Department of Information Science, Loughborough University) 2007-02-07 14:15: From Pascal and ML to Perl and VB: Software Engineering in Postmodernity (James Noble, Victoria University of Wellington, New Zealand.) 2007-02-13 16:15: Anonymity in the wild: Mixes on unstructured networks (Shishir Nagaraja, Computer Laboratory, University of Cambridge) 2007-02-14 14:15: Computing for the Future of the Planet (Andy Hopper, Computer Laboratory, University of Cambridge) 2007-02-21 14:15: The Lixto Web Data Extraction Project: A Status Report (Georg Gottlob, Oxford University) 2007-02-27 16:15: Power analysis attacks (Elisabeth Oswald, Department of Computer Science, University of Bristol) 2007-02-28 14:15: Security and Cooperation in Wireless Networks (Jean-Pierre Hubaux, EPFL) 2007-03-01 10:15: Securing vehicular networks (Jean-Pierre Hubaux, EPFL) 2007-03-06 16:15: Alternative security mechanisms for WiFi networks (Daniel Cvrcek, Computer Laboratory, University of Cambridge) 2007-03-07 16:15: Annual Presentation of Student Projects (Student presentations.) 2007-04-13 16:00: Resiliency aspects of security protocols (Marcus Granado) 2007-04-18 14:15: Church's Problem on the Synthesis of Nonterminating Programs (Wolfgang Thomas, RWTH Aachen University) 2007-04-25 14:15: DNA Microarray Technology at Agilent Technologies: Engineering, Manufacturing and Applications (Bill Peck, Agilent Technologies, Santa Clara California) 2007-05-01 14:15: Phishing tips and techniques: tackle, rigging, and how and when to phish (Peter Gutmann, University of Auckland) 2007-05-01 16:15: The commercial malware industry (Peter Gutmann, University of Auckland) 2007-05-02 14:15: “I want to tell you a joke. Are you ready?” – Implementing automated pun generation for children with complex communication needs. (Annalu Waller, School of Computing, University of Dundee) 2007-05-08 16:15: Towards open trusted computing frameworks (Matt Barrett) 2007-05-09 14:15: Modelling Biochemical Pathways with Stochastic Process Algebra (Jane Hillston, University of Edinburgh) 2007-05-15 14:30: Alertme.com - implementing wireless home security 2.0 (Amyas Phillips, Alertme.com) 2007-05-15 16:15: Realities of online banking fraud (Matthew Pemble, Vizuri) 2007-05-16 14:15: New Directions for Navigation (Alan Jones, Cotares.com) 2007-05-18 16:00: Composer in residence conversation (Alejandro Vinao) 2007-05-23 14:15: Electronics Revolution - driving pivotal change in Computer Science (Simon.Moore, Computer Laboratory, University of Cambridge) 2007-05-25 16:00: On password-based key exchange (Feng Hao, Computer Laboratory) 2007-05-30 14:15: Smart-card based authentication on an insecure network (Peter Sweeney, Centre for Communication Systems Research, University of Surrey.) 2007-06-01 16:00: Boom! Headshot! (Mike Bond) 2007-06-22 16:00: OpenHSM: An Open key life cycle protocol for Public Key Infrastructure's Hardware Security Modules (Jean Martina, Comupter Laboratory, University of Cambridge) 2007-06-29 16:00: Experiences as an e-counting election observer (Steven J. Murdoch (Computer Laboratory, University of Cambridge)) 2007-07-13 16:00: Cyberdice: peer-to-peer gambling in the presence of cheaters (Frank Stajano, Computer Laboratory) 2007-07-20 16:00: Cyberdice 2: Peer-to-peer gambling in presence of cheaters (Frank Stajano, Computer Laboratory) 2007-07-27 16:00: Keep your enemies close: Distance bounding against smartcard relay attacks (Saar Drimer, CL) 2007-07-30 16:15: The economics of revealing and protecting private information: Evidence from human subject experiments and surveys (Jens Grossklags, School of Information, University of California Berkeley) 2007-08-03 16:00: Exploiting concurrency vulnerabilities in system call wrappers (Robert Watson (University of Cambridge)) 2007-08-10 16:00: Protecting online games (Mike Bond) 2007-08-17 16:00: Summary of USENIX Security 2007 (Steven J. Murdoch (Computer Laboratory, University of Cambridge)) 2007-09-07 16:00: Attacks on real-world wireless sensor networks (Frank Stajano, Dan Cvrcek, Matt Lewis) 2007-09-19 14:15: SQ Minus EQ can Predict Programming Aptitude (Stuart Wray) 2007-10-02 16:15: High security locks: illusion or reality (Marc Weber Tobias) 2007-10-05 16:00: A new approach to E-banking (Matthew Johnson, Computer Laboratory) 2007-10-08 16:15: Introductions (Speaker to be confirmed) 2007-10-10 14:15: How to Write Bug-Free Code - A Live Demonstration (Douglas Squirrel, youdDevise.com) 2007-10-12 16:00: Short presentation on research by the AFP Computer Forensic Team (Matt Thomson, Australian Federal Police) 2007-10-15 16:15: (Skills) Drawing a good diagram / (Research) Mixed Reality (Andrew Rice and Joseph Newman) 2007-10-16 16:15: Synergy of crime science and security engineering (Shaun Whitehead) 2007-10-17 14:15: How Do We Know What to Design? (Fred Brooks, University of North Carolina at Chapel Hill) 2007-10-19 16:00: Discussion: Bi-directional authentication in TLS (Steven J. Murdoch (Computer Laboratory, University of Cambridge)) 2007-10-22 16:15: (Skills) A few introductory topics in typography / (Research) MIMO in academia and MIMO in the industry (Jonathan Davies and Francisco Monteiro) 2007-10-24 14:15: TechTalk by Google - The Chubby lock service for loosely-coupled distributed systems (Mike Burrows, Principal Engineer, Google) 2007-10-29 16:15: Travel Tracking with CarbonHero (Nick Burch and Andreas Zachariah) 2007-10-30 16:15: Key amplification in unstructured networks (Shishir Nagaraja, Computer Laboratory, University of Cambridge) 2007-10-31 14:15: Multi-core programming with automatic parallelisation (Tim Harris, Microsoft Research, Cambridge) 2007-11-02 16:00: HCI perspectives on security (Luke Church (University of Cambridge)) 2007-11-05 16:15: (Skills) Programming Languages / (Research) Server Power-Performance Optimization (Anthony Hylick and others) 2007-11-07 14:15: Birrell's distributed reference listing revisited (Richard Jones, University of Kent) 2007-11-09 16:00: Practical web application security (Steven J. Murdoch (Computer Laboratory, University of Cambridge)) 2007-11-12 16:15: (Skills) MATLAB – The Language of Technical Computing / (Skills) Kernel Development: A Primer (Will Carson and Rip Sohan) 2007-11-13 14:00: Sun Small Programmable Object Technology (Sun SPOT) (Randy Smith, Sun) 2007-11-13 16:15: Authentication protocols based on human interaction in security pervasive computing (Nguyen Hoang Long, Oxford University Computing Laboratory) 2007-11-14 14:15: Software Defect Mining with Formal Concept Analysis (Christian Lindig, Dagstuhl, Germany) 2007-11-19 16:15: (Skills) Programming ATMEL Microcontrollers / (Research) Orthogonal Distributed Carrier Multiple Access in Wireless Networks (Simon Hay and Bogdan Roman) 2007-11-21 14:15: Executable Biology: Successes and Challenges (Jasmin Fisher, Microsoft Research, Cambridge, United Kingdom) 2007-11-26 16:15: (Skills) Best Papers Michaelmas 2007 / (Research) A primer on physical layer collaborative communication (Ioannis Chatzigeorgiou, Weisi Guo and others) 2007-11-27 16:15: Networked information processing and privacy in Japan (Andrew A. Adams, School of Systems Engineering, University of Reading) 2007-11-28 14:15: Automation for Interactive Theorem Provers (Lawrence Paulson, Computer Laboratory, University of Cambridge) 2007-12-04 16:15: The Anti-Bank: the privatized delivery of social grants using biometric encrypted smart-cards in southern Africa (Keith Breckenridge, Professor of History and Internet Studies, University of KwaZulu-Natal, South Africa) 2007-12-07 16:00: Graphical passwords: some recent results (Jeff Yan, University of Newcastle) 2007-12-07 16:00: Security seminar presentation (Jeff Yan, University of Newcastle) 2007-12-11 16:15: Tracking the Russian Business Network (RBN) (Jart Armin) 2007-12-14 16:00: The eStream stream-cipher contest (Emilia Käsper, ESAT, KU Leuven) 2007-12-18 16:15: Towards interactive belief, knowledge, and provability: possible application to zero-knowledge proofs (Simon Kramer, École Polytechnique Paris) 2008-01-16 14:15: Searching for Evil (Ross Anderson and Richard Clayton, Computer Laboratory, University of Cambridge) 2008-01-18 16:00: Summary of the 24th Chaos Communication Congress (Steven J. Murdoch (Computer Laboratory, University of Cambridge)) 2008-01-21 16:15: (Skills) Techniques for significant software engineering tasks / (Research) Particle Filters for Inertial Navigation (Simon Fothergill and Oliver Woodman) 2008-01-23 16:15: Fine-grained differences and similarities in meanings (Graeme Hirst, Department of Computer Science, University of Toronto) 2008-01-28 16:15: (Skills) Academic Research Explained / (Research) Datacentre design and report on BT visit (Robert Harle and Andrew Rice) 2008-01-29 10:30: Exploiting Online Games (Gary McGraw, CTO, Cigital) 2008-01-30 14:15: Executable Biology: Successes and Challenges (Jasmin Fisher, Microsoft Research, Cambridge UK) 2008-02-04 16:15: (Skills) Everything you wanted to know about revision control but never dared to ask / (Research) Selecting the optimal 8PSK mapping scheme using EXIT charts (David Cottingham and William Carson) 2008-02-06 14:15: Defence against the Dark Arts (Mike Prettejohn, Netcraft) 2008-02-11 16:15: (Research) On-body sensor network for sports applications / (Research) Water Distribution Network System: Channel Modeling Study (Marcelo Pias and Min Lin) 2008-02-12 16:15: Hot or Not: Fingerprinting hosts through clock skew (Steven J. Murdoch (Computer Laboratory, University of Cambridge)) 2008-02-13 14:15: Rethink and Arise! (Theodor Holm Nelson, Founder, Project Xanadu) 2008-02-13 16:15: Hardware defences against side channel and invasive attacks (Philip Paul, Computer Lab, University of Cambridge) 2008-02-15 16:00: Healthcare data research (Philip Woodall) 2008-02-19 15:00: (Research) Analogue Markers: A Marker Design Optimised to Represent Continuous Quantities / (Research) Optical motion capture using Nintendo Wii controllers (Tom Craig and Simon Hay) 2008-02-20 14:15: High-Performance Processing with Field-Programmable Logic (George Constantinides, Imperial College London) 2008-02-22 16:00: Is SSL provably secure ? (Nigel Smart, Department of Computer Science, University of Bristol) 2008-02-25 16:15: (Skills) Analog Electronics / (Research) Deployment of Wireless Sensor Networks (Anthony Hylick and Ruoshui Liu) 2008-02-27 14:15: Delay Tolerant Routing in Mobile and Sensor Networks (Cecilia Mascolo, UCL) 2008-02-29 16:00: MD5crypt and GBDE: observations of a non-union cryptographer (Poul-Henning Kamp) 2008-03-03 16:15: (Skills) Keeping your data and communications private / (Research) Radio Propagation Modelling for Wireless Sensor Network Deployments (Alastair Beresford, Brian Jones and Yan Wu) 2008-03-05 16:15: Student Design Project Presentations (Alan Blackwell (University of Cambridge)) 2008-03-10 16:15: (Skills) Best papers Lent 2008 / (Research) Language-Based Optimisation of Sensor-Driven Distributed Computing Applications (Jonathan Davies and others) 2008-03-12 14:15: Sustainable Energy -- without the hot air (David J.C. MacKay, University of Cambridge) 2008-03-25 16:15: Minimal TCB Code Execution (Jonathan M. McCune, Carnegie Mellon University) 2008-03-27 16:00: A Sybil-proof one-hop DHT (Chris Lesniewski-Laas, MIT) 2008-04-08 16:15: An Empirical Analysis of Phishing Attack and Defense (Tyler Moore (Computer Laboratory, University of Cambridge)) 2008-04-15 16:15: Process isolation for cloud computing using commodity operating systems (Wenbo Mao, Director and Chief Engineer, EMC Research China) 2008-04-23 16:15: Fighting online crime (Mikko Hyppönen, Chief Research Officer, F-Secure Corporation) 2008-04-28 16:15: (Skills) How -not- to review a paper / (Research) Giving off the Right Signals! (Ioannis Chatzigeorgiou and Simon Fothergill) 2008-04-29 16:15: "From the Casebooks of..." (Mark Seiden) 2008-04-30 14:15: Copyright vs Community (Richard Stallman, www.gnu.org) 2008-05-02 16:00: On a new e-Voting scheme (Feng Hao) 2008-05-06 14:00: (Skills) OpenGL / (Research) Optimising Network Selection Using Coverage Maps (Oliver Woodman and David Cottingham) 2008-05-07 14:15: Stylized Rendering for Multi-resolution Image Representation: Reconciling Efficiency with Aesthetics in Image Compression (Neil Dodgson, Computer Laboratory) 2008-05-09 16:00: Thinking inside the box: system-level failures of tamper proofing (Steven J. Murdoch (Computer Laboratory, University of Cambridge)) 2008-05-12 14:00: (Skills) From analog to digital circuits / (Skills) Distribution fitting Tool (Bogdan Roman and Min Lin) 2008-05-14 14:15: Citations and Argumentation for Better Information Access (Simone Teufel, Computer Laboratory) 2008-05-19 14:00: (Skills) Generic Programming in C++ / (Skills) Using MATLAB with test and measurement instruments (Tom Craig and Ruoshui Liu) 2008-05-20 14:30: Privacy-preserving datagram delivery for ubiquitous systems (David Evans (Computer Laboratory)) 2008-05-21 14:15: How to prove that a communications protocol stack is up to the job (James Collier, Chief Technical Officer , Cambridge Silicon Radio, http://www.csr.com) 2008-05-27 14:00: (Skills) Writing technical reports and theses based in MS Word / (Research) Near real-time analysis of high speed video for sprinting (Francisco Monteiro and Robert Harle) 2008-05-28 14:15: Acceleration of scientific computing using graphics hardware (Graham Pullan, Department of Engineering, University of Cambridge) 2008-06-02 14:00: (Skills) How to accelerate your program in Matlab / (Research) Renewable Energy and Data Centres (Yan Wu and Sherif Akoush) 2008-06-09 14:00: (Skills) Best Papers Easter 2008 / (Research) Fatlab or Fitlab: Are computer scientists and engineers lazy? (Alastair Beresford and others) 2008-06-13 16:00: Public understanding of risk (discussion) (David Spiegelhalter, DPMMS) 2008-06-17 16:15: "Fourteen Thousand Messages" (John Levine) 2008-06-24 16:15: Advances in Hash Cryptanalysis (Christian Rechberger, IAIK, Graz University of Technology) 2008-09-03 14:15: STRUCTURE AND DYNAMICS IN COMPLEX SYSTEMS (Prof Luciano da Fontoura Costa, University of São Paulo, Brazil) 2008-09-05 16:00: Electronic health records: which is worse, the UK system or the US System? (Deborah C. Peel, Patient Privacy Rights) 2008-09-19 16:00: Security economics (Pythagoras Petratos, Oxford University) 2008-10-08 14:15: Content Distribution based on Social Swarming (Carmen Guerrero – Dpt. of Telematics Engineering at University Carlos III Madrid (UC3M)) 2008-10-13 14:00: Introductions (Speaker to be confirmed) 2008-10-13 14:00: Design, Compilation and Runtime Solutions for Energy-Efficient Microprocessors (Timothy M. Jones - School of Informatics, University of Edinburgh) 2008-10-15 14:15: Practical Dynamic Software Updating for C (Michael Hicks - University of Maryland) 2008-10-20 14:00: (Research) Pedestrian Localisation for Indoor Environments / (Skills) Atmel Programming (Oliver Woodman and Brian Jones) 2008-10-21 16:15: Browsing with the enemy: a German view (Kai Buchholz-Stepputtis and Boris Hemkemeier) 2008-10-22 14:15: Forensic Genomics:Kin Privacy, Driftnets and Other Open Questions (Frank Stajano, Lucia Bianchi, Pietro Liò and Douwe Korff) 2008-10-27 14:00: (Research) Clean Slate Networking Design (Simon Hay and Robin Message) 2008-10-29 14:15: How to Protect your Data by Eliminating Trusted Storage Infrastructure (David Mazieres - Stanford University) 2008-10-31 16:00: ATM Security 2008 Conference (Steven J. Murdoch (Computer Laboratory, University of Cambridge)) 2008-11-03 14:00: (Research) Using Coverage Maps to Optimise Network Connectivity for Vehicles (David Cottingham) 2008-11-04 16:15: Improving Tor using a TCP-over-DTLS Tunnel (Joel Reardon, University of Waterloo) 2008-11-05 14:15: The Manticore project (John Reppy - University of Chicago) 2008-11-10 14:00: (Research) Modeling the Model Athlete : Automatic Coaching of Rowing Technique / (Research) Efficient Medium Access Control (Simon Fothergill and Bogdan Roman) 2008-11-11 16:15: Is the Operating System the Right Place to Address Mobile Phone Security? (Craig Heath, Symbian) 2008-11-12 14:15: Defending Networked Resources Against Floods of Unwelcome Requests (Michael Walfish - University of Texas, Austin and University College London) 2008-11-14 16:00: An introduction to EMV (Mike Bond) 2008-11-17 14:00: Monitoring of physical activity in populations - current status and future possibilities (Soren Brage) 2008-11-19 14:15: Robust Networks (Sanjeev Goyal, University of Cambridge, Economics Department) 2008-11-21 16:00: The robustness of CAPTCHAs (Jeff Yan, Newcastle University) 2008-11-24 14:00: (Skills) Best Papers Michaelmas 2008 / (Research) K-factor distribution studying for underground to above ground channel model (Min Lin and others) 2008-11-26 14:15: MetiTarski: An Automatic Theorem Prover for Real-Valued Special Functions (Larry Paulson - Univ. of Cambridge Computer Laboratory) 2008-11-27 14:00: Economics of architectural change: resistance to distributed denial of service attacks (Mikko Särelä, NomadicLab, Ericsson) 2008-11-28 14:45: Dynamics, robustness and fragility of trust (Dusko Pavlovic) 2008-12-01 13:00: (Research) Distributed fountain codes: concept and analysis (A. Tarable and I. Chatzigeorgiou) 2008-12-02 16:15: Talking to strangers (Bruce Christianson, University of Hertfordshire) 2008-12-03 14:15: Second-Order Quantifier Elimination (Renate Schmidt - University of Manchester) 2008-12-08 14:00: (Research) Programming networks of vehicles (Jonathan Davies) 2008-12-09 16:15: Bayesian Inference and Traffic Analysis (Carmela Troncoso, Microsoft Research Cambridge/KU Leuven(COSIC)) 2009-01-13 16:15: Identity Theft and the Mobile Device (Andy Jones - Head of Information Security Research, Centre for Information & Security Systems Research, BT Innovate) 2009-01-14 14:15: Statistical Parsing of Natural Language with Lexicalised Grammars (Stephen Clark - Oxford University) 2009-01-16 16:00: How secure is my messaging protocol for clinical communication? (Mohammed Al-Ubaydli) 2009-01-19 14:00: (Research) Energy-Efficient Sentient Computing (Mbou Eyole-Monono) 2009-01-20 16:15: Hardware security: trends and pitfalls of the past decade (Sergei Skorobogatov - Computer Laboratory, University of Cambridge) 2009-01-21 14:15: Structured Hidden Markov Model: A General Tool for Analysing Sequential data (Marco Botta - University of Torino) 2009-01-26 14:00: Estimating the position error of 802.11-based indoor positioning systems (Rene Hansen, Aalborg University) 2009-01-27 16:15: Improving Cache Performance while Mitigating Software Side-Channel Attacks (Ruby Lee - Princeton University) 2009-01-28 14:15: A Framework for the Analysis of Mix-Based Steganographic File Systems (Claudia Diaz - Department of Electrical Engineering (ESAT), K.U.Leuven, Belgium) 2009-02-03 14:30: An overview of the Smart Flow project (David Eyers (University of Cambridge)) 2009-02-03 16:15: Privacy-Preserving 802.11 Access-Point Discovery (Janne Lindqvist - Helsinki University of Technology, Finland) 2009-02-04 14:15: IPv6: the basics (Ben Harris, University of Cambridge) 2009-02-09 14:00: (Research) Privacy Policies for the Individual / (Research) Traffic Signal Data: Prediction using Machine Learning (Sören Preibusch and Usman Khan) 2009-02-11 14:15: Modelling Quality Properties of Systems (John Herbert - University College, Cork, Ireland) 2009-02-12 16:00: Wedge: Splitting Applications into Reduced-Privilege Compartments (Andrea Bittau (UCL)) 2009-02-16 14:00: Visit from Philips (Speaker to be confirmed) 2009-02-18 14:15: Privacy and HCISec: Notes From The Front (Alma Whitten - Google) 2009-02-20 16:00: Security lessons from embedded devices (Philip Paeps, FreeBSD security team) 2009-02-23 14:00: What can pervasive computing learn from social networking? (Simon Hay, Andrew Rice and Joseph Newman) 2009-02-25 14:15: Balancing the expected and the surprising in geometric patterns: an investigation inspired by Bridget Riley's early Op art (Neil Dodgson - University of Cambridge) 2009-02-27 16:00: Mobile malware prevention using temporal information (John Tang, Computer Laboratory) 2009-03-02 14:00: An intro to publish/subscribe for distributed information systems (Salman Taherian) 2009-03-04 14:15: Collective Intelligence Techniques for Pervasive Computing (George Roussos - Birkbeck College, University of London) 2009-03-06 14:00: Securing Virtual Machine Monitors: What is Needed? (Paul Karger (IBM Research - Watson)) 2009-03-06 16:00: Conference report: Financial Cryptography 2009 (Steven J. Murdoch (Computer Laboratory, University of Cambridge)) 2009-03-09 14:00: (Research) Power Allocation for Turbo Coded Cooperative Networks (Weisi Guo) 2009-03-10 16:15: The Effectiveness of T-way Test Data Generation (Michael Ellims) 2009-03-11 14:15: Correctness by Construction of High-Integrity Software (Rod Chapman, Praxis High Integrity Systems) 2009-03-19 15:00: High Assurance Smart Cards for Multinational Coalitions and Other Applications of National Security (Paul Karger, IBM Watson Research Center) 2009-03-24 16:15: Privacy Implications of Public Listings on Social Networks (Joseph Bonneau, University of Cambridge) 2009-03-26 16:00: Pointless Tainting? Evaluating the practicality of pointer tainting (Asia Slowinska (Vrije Universiteit Amsterdam)) 2009-04-07 16:15: Cloning MiFare Classic rail and building passes, anywhere, anytime (Nicolas Courtois, University College London) 2009-04-22 14:15: "Re-architecting Internet capacity sharing" aka "Putting far-reaching Cambridge research into practice" (Andrea Soppera - BT Networks Research Centre) 2009-04-27 14:00: (Research) OpenRoomMap: Mapping the Gates building / (Skills) Best Papers Lent 2009 (Andrew Rice and DTG members) 2009-04-28 16:15: Bypassing Physical Security Systems (Marc Weber Tobias, Investigative Law Offices) 2009-04-29 14:15: Accounting for User Behaviour in Security (Angela Sasse - UCL) 2009-04-30 17:00: A conversation with Phil Zimmermann (Phil Zimmerman) 2009-05-05 14:00: (Research) Frequency diversity measurements at 2.4 GHz for wireless sensor networks (Ruoshui Liu) 2009-05-06 15:00: Inventing the User: EDSAC in context (Professor David Barron, Emeritus Professor of the University of Southampton, Dr Doron Swade MBE, formerly Senior Curator of Computing, Science Museum, and Professor Sir Maurice Wilkes) 2009-05-11 14:00: Flying round the world in a light aircraft (Andy Hopper) 2009-05-12 16:15: Whither Challenge Question Authentication? (Mike Just, University of Edinburgh) 2009-05-13 14:15: Model-Based Design: a New Landscape for Embedded Systems Development (David Maclay - Mathworks) 2009-05-14 16:00: PeerSoN: Privacy-Preserving P2P Social Networks (Sonja Buchegger (Deutsche Telekom Laboratories)) 2009-05-18 14:00: (Research) Bluetooth Tracking without Discoverability / (Skills) Deploying web user authentication with Shibboleth (Simon Hay and Sören Preibusch) 2009-05-20 14:15: Computational Creativity: A Different Future for AI Research (Simon Colton - Imperial College) 2009-05-26 14:00: (Research) Performance modelling and design of bit-interleaved coded modulation (William R. Carson) 2009-05-27 14:15: The 10 Cultures Problem (Bill Thompson) 2009-05-29 11:00: Online Social Networks and Applications: a Measurement Perspective (Ben Zhao (UCSB)) 2009-06-01 14:00: (Research) Hard Drive Energy Consumption and its Relation to Data Center Storage Array Energy (Anthony Hylick) 2009-06-03 14:15: No Wednesday Seminar today! (EXAMS!) 2009-06-08 14:00: (Research) Nice detectors for ugly lattices / (Research) Bringing The Next Billion Online: Computing Research For Developing Regions (Francisco Monteiro and Ripduman Sohan) 2009-06-10 14:15: Concurrency Through the Ages (Andrew Birrell - Microsoft Research Silicon Valley) 2009-06-17 14:15: What can sequent calculus do for functional programs? (Pierre-Louis Curien, Paris) 2009-06-17 16:00: Toward Energy-efficient Computing (David J. Brown, Sun Microsystems Inc.) 2009-06-30 16:15: Efficient Implementation of Physical Random Bit Sources (Richard Newell, Actel) 2009-07-01 14:15: Evolving a language in and for the real world (Bjarne Stroustrup - Texas A&M University) 2009-07-16 14:00: Who am I Competing Against?: Identifying Adversarial Protocols Against TCP in a Congested Link (Idris Rai, Makerere University, Uganda) 2009-07-20 14:00: Reflections on merging the digital and the physical (Tim Kindberg - HP Labs, Bristol) 2009-08-28 16:00: Faster and timing-attack resistant AES-GCM (Emilia Kasper, KU Leuven) 2009-09-15 16:15: So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users (Cormac Herley, Microsoft Research, Redmond) 2009-09-18 16:00: A spatial cloaking framework based on range search for nearest neighbor search (Hyoungschick Kim, University of Cambridge) 2009-09-22 14:00: Intra-Disk Parallelism: A Green Storage Solution for Data Centers (Sudhanva Gurumurthi, Assistant Professor in the Computer Science Department at the University of Virginia) 2009-09-25 16:00: Towards copy-evident JPEG images (Andrew Lewis (University of Cambridge)) 2009-10-07 14:15: Scalable Ontology-Based Information Systems (Ian Horrocks - Oxford University) 2009-10-12 13:00: Introductions (Speaker to be confirmed) 2009-10-13 16:15: Optical surveillance on silicon chips: your crypto keys are visible (Sergei Skorobogatov) 2009-10-14 14:15: Reaching Out: how to engage young people with computer science (Chris Bishop - Microsoft Research Cambridge) 2009-10-19 13:00: (Research) The case for apportionment / (Skills) Best Papers Easter 2009 (Speaker to be confirmed) 2009-10-21 14:15: Pushing JavaScript Performance (Lars Bak - Google Aarhus, Denmark) 2009-10-26 13:00: Magical Mystery Meeting (Andrew Rice) 2009-10-26 16:15: Policing Online Games -- Defining A Strong, Mutually Verifiable Reality in Virtual Games (Peter Wayner) 2009-10-28 14:15: Aggregated Security Monitoring in 10GB networks (Nathan Macrides and Nick McKenzie - Security Engineering, RBS) 2009-11-02 13:00: Bigraphs: a model for mobile informatic systems (Robin Milner) 2009-11-02 14:00: Surveillance in Speculative Fiction: Have Our Artists Been Sufficiently Imaginative? (Roger Clarke, University of New South Wales) 2009-11-04 14:15: Serializability Enforcement for Concurrent ML (Suresh Jagannathan - Purdue University, USA) 2009-11-09 13:00: (Research) Automated Physical Performance Assessment : Supplementary Assistance for Rowing Coaching / (Skills) Developing with Flash and Actionscript (Simon Fothergill and Oliver Woodman) 2009-11-10 14:30: The Elephant in the Room: Health Information System Security and the User-Level Environment (Juanita Fernando (Monash University)) 2009-11-11 14:15: On Quantitative Software Verification (Marta Kwiatkowska - Oxford University) 2009-11-17 16:15: Understanding scam victims: Seven principles for systems security (Frank Stajano, University of Cambridge) 2009-11-18 14:15: Insights from Expert Software Design Practice (Marian Petre - Open University) 2009-11-23 13:00: Wireless Sensor Networks for Infrastructure Monitoring: Radio Propagation (Dr Ian J. Wassell) 2009-11-25 14:15: Elements of a Networked Urbanism (Adam Greenfield - Nokia Helsinki) 2009-11-26 15:15: Energy Efficiency in Warehouse-Scale Computers (Luiz André Barroso) 2009-11-30 13:00: Seven years, two projects and four research themes (1st part) / Power allocation comparison for cooperative networks (2nd part) (Ioannis Chatzigeorgiou (1st part) / Weisi Guo (2nd part)) 2009-12-02 14:15: A POPLmark retrospective: Using proof assistants in programming language research (Stephanie Weirich - University of Pennsylvania, USA) 2009-12-04 10:00: MPhil Mini-Symposium Security Talks (MPhil students, University of Cambridge) 2009-12-09 14:15: Performance Comparisons of Hard Logic, Programmable Soft Logic, and Instruction Set Architectures (Jonathan Rose - University of Toronto) 2009-12-10 16:00: Security Architectures for Distributed Social Networks (Jonathan Anderson (University of Cambridge)) 2010-01-13 14:15: Multipath TCP (Mark Handley - UCL) 2010-01-18 13:00: (Research) Multi-Carrier Bursting: Feasibility, Analysis and Implementation / (Skills) Best Papers Michaelmas 2009 (Bogdan Roman and others) 2010-01-18 15:00: Anonymity via networks of mixes (Venkat Anantharam, EECS Department, University of California Berkeley.) 2010-01-19 16:15: The impact of incident vs. forensic response (Andrew Sheldon (Evidence Talks)) 2010-01-20 14:15: Models of large-scale real-life networks (Bela Bollobas - University of Cambridge and University of Memphis) 2010-01-21 14:15: Proactive Fraud Management over Financial Data Streams (Pedro Sampaio, University of Manchester) 2010-01-22 16:00: Statistical Attacks on Personal Knowledge Questions (Joseph Bonneau, Cambridge University) 2010-01-25 14:00: (Research) Privacy types revisited / (Research) Predicting the Performance of Virtual Machine Migration (Sherif Akoush and Soren Preibush) 2010-01-27 14:15: Graphical Reasoning in Symmetric Monoidal Categories (Lucas Dixon - University of Edinburgh) 2010-01-29 16:00: Machiavelli confronts 21st century digital technology (George Danezis, Microsoft Research) 2010-02-01 14:00: (Research) Dissecting mobile phone power consumption / TBC (Andrew Rice and Rob Harle) 2010-02-03 14:15: Automated Experimentation: Beyond Deployment and Execution (Alexander Wolf - Imperial College London) 2010-02-08 14:00: Cancelled (Yan Wu) 2010-02-10 14:15: Third Generation Machine Intelligence (Chris Bishop - Microsoft Research Cambridge) 2010-02-15 14:00: (Research) Effects of Wind and Tree Movements on Foliated Fixed Wireless Links / (Skills) Modern Embedded Systems: A Primer (Tien Chua and Rip Sohan) 2010-02-17 14:15: Proving that programs eventually do something good (Byron Cook - Microsoft Research Cambridge) 2010-02-19 17:30: Risk, Security and Terrorism (Professor Lucia Zedner, University of Oxford) 2010-02-22 14:00: (Research) Pollution Monitoring in the Streets of Cambridge / (Research)An Application-Oriented Node Placement for Wireless Sensor Networks (Ruoshui Lui and Alastair Beresford) 2010-02-24 14:15: Generic Programming (Dietmar Kühl - Bloomberg) 2010-02-26 16:00: Capsicum: Practical capabilities for UNIX (Robert Watson (University of Cambridge)) 2010-03-01 14:00: (Research) Indoor object tracking using low-cost optical sensors / (Research)Modelling uncertainty in sensor data (Mattias Linnap and Agata Brajdic) 2010-03-03 14:00: Exhibition of Student Design Projects (Part 1B Students) 2010-03-04 16:00: Detecting Sybil attacks and recommending social contacts from proximity records (Daniele Quercia (University of Cambridge)) 2010-03-04 18:30: Chip and PIN -- notes on a dysfunctional security system (Saar Drimer, Computer Lab) 2010-03-08 14:00: (Skills) Introduction to Compressive Sensing: From Theory to Applications / (Skills) Best papers Lent 2010 (Wei Chen and others) 2010-03-10 14:15: Aura: A Programming Language with Authorization and Audit (Steve Zdancewic - University of Pennsylvania, USA) 2010-03-11 16:00: How Google Tests Software (James Whittaker (Google)) 2010-03-12 16:00: GPS jamming & interference (workshop report) (Markus Kuhn, Computer Laboratory) 2010-03-18 16:15: The Path Towards Scalable Practical Security for Web Transactions (Dr Corrado Ronchi, EISST Ltd) 2010-03-19 16:00: Notes on security breaches (Matt Scott, ACI) 2010-04-09 16:00: A DRE-based e-voting scheme (Feng Hao) 2010-04-16 14:00: Declassification Policy Inference (Jeff Vaughan (Harvard University)) 2010-04-21 14:15: Privacy in Advertising: Not all Adware is Badware (Paul Francis - MPI Kaiserslautern, Germany) 2010-04-26 14:00: The new DTG website (Bogdan Roman (University of Cambridge)) 2010-04-26 15:00: Building Secure Systems On and For Social Networks (Nishanth Sastry) 2010-04-27 16:15: Internet Voting: Threat or Menace (Jeremy Epstein, SRI International) 2010-04-28 14:15: From Separation Logic to Systems Code (Peter O'Hearn - Queen Mary University of London) 2010-04-29 16:00: Detecting Temporal Sybil Attacks (Neal Lathia (UCL)) 2010-04-30 16:00: How I got sued by Facebook (Pete Warden) 2010-05-04 14:00: Privacy as a competitive advantage (Sören Preibusch) 2010-05-04 15:00: Side-Channel Cryptanalysis (Joseph Bonneau (Cambridge University)) 2010-05-05 14:15: NO SEMINAR THIS WEEK (Speaker to be confirmed) 2010-05-10 14:00: Research: Estimating personal energy expenditure with location data / Research: Cooperative Wireless Networks: Review, Analysis and Optimization (Simon Hay and Weisi Guo) 2010-05-12 14:15: Privacy in Advertising: Not all Adware is Badware (Paul Francis - MPI Kaiserslautern, Germany) 2010-05-14 16:00: Chip and PIN is broken (Steven J. Murdoch (Computer Laboratory, University of Cambridge)) 2010-05-17 14:00: Computer Science in Africa: Challenges and Opportunities (Gary Marsden (University of Cape Town)) 2010-05-19 14:15: Statistical problems in complex networks (Edoardo Airoldi - Harvard University, USA) 2010-05-25 16:00: From RPC to Web Apps: Trends in Client-Server Systems (George Coulouris (Computer Laboratory, University of Cambridge)) 2010-05-26 14:15: Dynamical Grammars for Galaxy Image Recognition (Wayne Hayes - UC Irvine, USA) 2010-05-28 16:00: Smart card detective: an EMV interceptor (Omar Choudary, Computer Laboratory) 2010-06-01 14:00: (Research) Energy-Efficient Location Tracking with Mobile Phones / (Research) Towards accurate dead-reckoning using optical sensors (Mattias Linnap and Agata Brajdic) 2010-06-02 14:15: EXAMS (Good luck to students with their exams!) 2010-06-04 16:00: Title to be confirmed (Jonathan Parris, Intercede) 2010-06-07 14:00: (Research) Data acquisition via compressive sensing in wireless sensor networks / (Skills) Best Papers Easter 2010 (Wei Chen and others) 2010-06-09 14:15: Executable Strategies for Cellular Decision Making (Jasmin Fisher, Microsoft Research Cambridge) 2010-07-01 16:15: Colour, usability and computer security (Jeff Yan, Newcastle University) 2010-07-02 16:00: MeLock (Peter Cowley) 2010-07-14 14:00: Exploiting Channel Diversity in White Spaces (Bozidar Radunovich, Microsoft Research Cambridge) 2010-07-30 16:00: Side-Channel Attack Resistant ROM-Based AES S-Box (Ken Mai, Carnegie-Mellon University) 2010-08-02 14:15: Some Uses of Hashing in Networking Problems (Michael Mitzenmacher, Harvard University) 2010-08-06 16:00: Trip report for PETS 2010 (Steven J. Murdoch (Computer Laboratory, University of Cambridge)) 2010-08-10 14:00: Efficient Relaying for Cognitive Radios (Wei Chen, Tsinghua University, China) 2010-08-27 16:00: Trip report for CHES and FDTC 2010 (Sergei Skorobogatov) 2010-09-24 14:00: Title to be confirmed (Yoshihiro Kawahara, University of Tokyo, Japan) 2010-10-06 14:15: Multi-Target Data-Parallel Programming with Accelerator for GPUs, Multicore Processors and FPGAs (Satnam Singh, Microsoft Research Cambridge) 2010-10-08 14:00: Extracting the Semantic Signature of Malware, Metamorphic Viruses and Worms (RK Shyamasundar; Tata Institute of Fundamental Research, Mumbai) 2010-10-11 14:00: Introductions (Speaker to be confirmed) 2010-10-12 16:15: Hierarchies, Lowerarchies, Anarchies, and Plutarchies: Historical Perspectives of Composably Layered High-Assurance Architectures (Peter Neumann, Principal Scientist, SRI International Computer Science Lab) 2010-10-12 16:15: Hierarchies, Lowerarchies, Anarchies, and Plutarchies: Historical Perspectives of Composably Layered High-Assurance Architectures (Peter Neumann, Principal Scientist, SRI International Computer Science Lab) 2010-10-13 14:15: Test Generation and Fault Localization for Web Applications (Frank Tip, IBM T.J. Watson Research Center) 2010-10-18 14:00: (Research) A Limited-Data Model Of Building Energy Consumption / (Research) Relay Node Placement for Wireless Sensor Networks Deployed in Tunnels (Simon Hay and Ruoshiu Liu) 2010-10-20 14:15: A Survey of Classical and Real-Time Verification (Joel Ouaknine, Oxford University Computing Laboratory) 2010-10-20 16:15: Across the Pond: An Update on Health Privacy and Health Data Security. How are American patients faring? (Deborah C. Peel, Founder and Chair, Patient Privacy Rights) 2010-10-25 15:00: Innovation in Emerging Markets (Jaideep Prabhu) 2010-10-25 16:00: Understanding Cyberattack as an Instrument of U.S. Policy (Herbert Lin (The National Academies, USA)) 2010-11-01 13:00: Skills: Online Surveys (Sören Preibusch) 2010-11-02 16:15: An investigation into Chinese cybercrime and the underground economy in comparison with the West (Michael Yip, University of Southampton) 2010-11-03 14:15: A Look Into Youtube - The World's Largest Video Site (Oliver Heckmann, Director of Engineering, Google Zurich) 2010-11-05 14:00: Using SAT Solvers for Cryptographic Problems (Mate Soos, Pierre and Marie Curie University) 2010-11-08 13:00: Inertial sensors for indoor localisation and tracking (Oliver Woodman (University of Cambridge)) 2010-11-09 16:15: Privacy preserving smart-metering (George Danezis, Microsoft Research) 2010-11-10 14:15: What is happening now? Finding events in Massive Message Streams (Miles Osborne, University of Edinburgh School of Informatics) 2010-11-15 13:00: Language Based Security for Functional Active Objects (Florian Kammueller, Middlesex University, London and Technische Universitaet, Berlin) 2010-11-16 16:15: The distribution of different sources of malware (Francis Turner, ThreatSTOP Inc.) 2010-11-17 14:15: Detecting Network Traffic Anomalies (Paul Barford, University of Wisconsin-Madison) 2010-11-19 16:00: Do you Skyhoo? or Inside a killer IMBot (Wei Ming Khoo, University of Cambridge) 2010-11-22 13:00: (Research) Device Analyzer: Uncovering mobile usage patterns / (Research) Energy Model for Modern Smartphone GPS Sensor (Daniel Wagner and Mattias Linnap) 2010-11-23 16:15: Physical Attacks on PIN Entry Devices (Matt Scott, ACI Worldwide) 2010-11-29 13:00: Title to be confirmed (Speaker to be confirmed) 2010-12-07 16:15: Bumping attacks: the affordable way of obtaining chip secrets (Sergei Skorobogatov - Computer Laboratory ( University of Cambridge)) 2010-12-09 14:15: Reverse Engineering Malware (Hassen Saidi, SRI International) 2011-01-19 14:15: Implementing a Distributed Event Processing Network (Alex Kozlenkov, Betfair Research) 2011-01-24 14:00: Wireless access schemes for challenging environments (Bogdan Roman (University of Cambridge)) 2011-01-26 14:15: Challenging Computer Science Problems at Ocado (Dr Vince Darley, Head of Analytics & Optimisation, Ocado) 2011-01-31 14:00: (Skills) Sniffing packets with Wireshark / (Research) Sprint Sensing: The development of a sensor system for sport (Andrew Rice and Robert Harle) 2011-02-01 13:00: A report on the IAB/W3C Internet Privacy Workshop (Dr. David Evans (Computer Laboratory)) 2011-02-02 14:15: Efficient Network-wide Flow Record Generation (Joel Sommers, Colgate University) 2011-02-07 14:00: (Research) Case Study on the Cost of Migration / (Skills) Introduction to Django (Sherif Akoush and Mattias Linnap) 2011-02-09 14:15: In the beginning God created tensor, ... then matter, ... then speech (Bob Coecke, Oxford University Computing Laboratory) 2011-02-14 14:00: (Research) Energy Efficient Signal Acquisition in Wireless Sensor Networks: A Compressive Sensing Framework / (Research) Particle filtering on GPU for indoor pedestrian localisation (Wei Chen and Agata Bradjic) 2011-02-21 14:00: (Skills) Getting Things Done - A Rough Guide to Productivity / (Research) "Am I doing it better?" : Conveying the message to athletes (Simon Fothergill and Daniel Wagner) 2011-02-23 14:15: Reasoning about Software Safety Integrity and Assurance (Tim Kelly, University of York) 2011-02-25 16:00: Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV (Omar Choudary ( Computer Laboratory)) 2011-02-28 14:00: (Research) Developing an Accurate Location System (MBOU EYOLE-MONONO (University of Cambridge)) 2011-03-02 14:15: Mobile Software Engineering - Characteristics and Challenges (Manfred Bortenschlager, Samsung) 2011-03-03 16:00: Promoting location privacy... one lie at a time (Daniele Quercia (University of Cambridge)) 2011-03-07 14:00: (Skills) Best Papers Lent 2011 (Speaker to be confirmed) 2011-03-09 14:00: Exhibition of Student Design Projects (Student Designers) 2011-03-15 14:00: Sensor Networks to Enhance Commercial Building Indoor Environments (Guy Newsham, National Research Council, Ottawa) 2011-03-15 16:15: Caveat coercitor: towards coercion-evident elections (Mark Ryan (University of Birmingham)) 2011-03-16 14:15: Quantum computing -- theoretical prospects and relations to classical computation (Richard Jozsa, Centre for Quantum Information and Foundations, DAMTP, University of Cambridge) 2011-03-18 16:00: Defragmentation of compressed bitstreams for H.264/AVC video evidence recovery (Andrew Lewis (University of Cambridge)) 2011-04-06 14:00: Netalyzr: Network Measurement as a Network Security Problem (Nicholas Weaver, ICSI and UC Berkeley) 2011-04-12 16:15: What is Software Assurance? (John Rushby, SRI International) 2011-04-13 16:00: Mobile Social Networks and Context-Awareness: Usage, Privacy and a Solution to Texting While Driving? (Janne Lindqvist (Carnegie Mellon University)) 2011-04-15 16:00: Title to be confirmed (Jie Han) 2011-04-27 14:15: Moose: an open platform for software analysis (Stephane Ducasse) 2011-04-28 13:15: Using the Cambridge ARM model to verify the concrete machine code of seL4 (Magnus Myreen (University of Cambridge)) 2011-05-03 14:00: MPhil Project Practice Talks (Khuong Nguyen, Duncan Roberts, Yordan Zaykov, James Snee) 2011-05-03 14:15: An overview of the DARPA CRASH research programme (Howie Shrobe, DARPA) 2011-05-03 14:30: Quantitative Computer Simulation as a Paradigm of Scientific Investigations (Prof Krzysztof Pawlikowski, University of Canterbury, NZ) 2011-05-03 14:45: CTSRD: Capability CPUs revisited (Peter Neumann, SRI International / Robert Watson, University of Cambridge) 2011-05-03 15:45: Architectures for Practical Client-Side Security (Virgil Gligor, Carnegie Mellon University) 2011-05-04 14:15: Reflection on Java Security and Its Practical Impacts (Li Gong) 2011-05-04 14:15: Reflection on Java Security and Its Practical Impacts (Li Gong) 2011-05-04 15:30: The Bluespec hardware definition language (Joe Stoy, Bluespec Inc.) 2011-05-05 14:15: Introduction to MILS and the LynuxWorks Separation Kernel (Rance DeLong, LynuxWorks Inc.) 2011-05-09 14:00: (Research) Influences of wind on radiowave propagation in foliated fixed wireless system / (Research) Information flow control for static enforcement of user-defined privacy policies (Sören Preibusch and Tien Han Chua) 2011-05-11 14:15: From deterministic finite automata to infinite games (Eryk Kopczynski) 2011-05-16 14:00: P2P Communications at Qualcomm (John Scott and Luke Turner, Qualcomm) 2011-05-17 16:15: Practical Linguistic Steganography using Synonym Substitution (Ching-Yun (Frannie) Chang & Stephen Clark, University of Cambridge) 2011-05-18 14:15: Kernel Methods: the Emergence of a Well-founded Machine Learning (John Shawe-Taylor, Professor and Director of the UCL Centre for Computational Statistics and Machine Learning) 2011-05-23 14:00: (Research) Towards an Optimal Digital Infrastructure / (Research) Web sites' differentiation on data collection (Sören Preibusch and Rip Sohan) 2011-05-25 14:15: The Duality of State and Observation (Prakash Panangaden, Computing Laboratory Oxford University; on leave from McGill University) 2011-05-31 14:00: (Research) Uncover the hidden spatial diversity potential in 2.4 GHz band for indoor Wireless Sensor Networks / (Research) Device Analyzer - Personal Analytics on a Global Scale (Ruoshui Liu and Daniel Wagner) 2011-06-01 14:15: Body Part Recognition: Making Kinect Robust (Jamie Shotton, MSR Cambridge) 2011-06-06 14:00: (Research) Wireless Sensor Networks In Vehicles (Steven Herbert) 2011-06-08 14:15: EXAMS - NO SEMINAR THIS WEEK (Speaker to be confirmed) 2011-06-13 14:00: Time-critical data delivery in wireless sensor networks (Utz Roedig, Lancaster University) 2011-06-15 14:15: Compiler Tools for MATLAB (Laurie Hendren, Professor, School of Computer Science, McGill University, Canada Leverhulme Visiting Professor, Oxford University Computing Laboratory) 2011-07-01 16:00: The world needs something stronger than passwords which we can all use (Jonathan Craymer, PinPlus Limited) 2011-07-08 16:00: Hardware security in nanometer CMOS (Wayne Burleson, University of Massachusetts, Amherst) 2011-07-19 16:15: Evolutionary Software Repair (Stephanie Forrest, University of New Mexico) 2011-08-02 16:15: The great censorship war of 2011: are we winning? (Mystery speaker) 2011-09-08 13:30: The IITM Model and its Application to the Analysis of Real-World Security Protocol (Ralf Küsters, University of Trier) 2011-09-23 16:00: The security cost of cheap user interaction (Rainer Böhme, University of Münster) 2011-09-29 16:00: Twitter bots (Miranda Mowbray (HP Labs Bristol)) 2011-10-06 14:15: Building Trusted Systems with Protected Modules (Bryan Parno (Microsoft Research)) 2011-10-10 13:00: Introductions (Speaker to be confirmed) 2011-10-12 14:15: Probabilistic Graphical Models in Microsoft's Online Services: TrueSkill, AdPredictor, and Matchbox (Thore Graepel, MSR Cambridge) 2011-10-25 16:15: Facial Analysis for Lie Detection (Hassan Ugail (University of Bradford)) 2011-10-26 14:15: TIME: Transport Information Monitoring Environment (Dr Ken Moody (University of Cambridge)) 2011-10-31 13:00: Web mining and privacy: foes or friends? (Bettina Berendt) 2011-11-02 14:15: Notes on the Synthesis of Music (Sam Aaron) 2011-11-09 14:15: Algebraic theories and computational effects (Sam Staton (Computer Laboratory, University of Cambridge)) 2011-11-16 14:15: Search Based Software Engineering (Prof. Mark Harman, UCL Dept of Computer Science) 2011-11-17 16:00: Quantifying Location Privacy (George Theodorakopoulos (EPFL, University of Derby)) 2011-11-21 13:00: Real-time Collaboration in Resource-constrained Environments (MBOU EYOLE-MONONO (University of Cambridge)) 2011-11-21 15:00: Real-Time and Real Trustworthiness: Timing Analysis of a Protected OS Kernel (Bernard Blackham (NICTA)) 2011-11-23 14:15: Automatic Discovery of Patterns in Media Content (Nello Cristianini, Professor of Artificial Intelligence, Departments of Engineering Mathematics and Computer Science, University of Bristol) 2011-11-28 13:00: KinectFusion (David Kim) 2011-12-09 16:00: Trends in sophisticated hacking (Richard Clayton (University of Cambridge)) 2012-01-10 10:00: Homomorphic Encryption from Ring Learning with Errors (Michael Naehrig, Technische Universiteit Eindhoven) 2012-01-18 14:15: Speech Synthesis at Google (Matt Stuttle, Google) 2012-01-23 14:00: Passive RFID Real-Time Tracking/Sensing System for Intelligent Infrastructure (Sithamparanathan Sabesan) 2012-01-24 16:15: User choice of PINs and passphrases (Joseph Bonneau (University of Cambridge)) 2012-01-25 14:15: Inclusive Design (Professor John Clarkson (University of Cambridge)) 2012-01-30 14:00: Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown Fixed Messages and Returning no Results (David Naccache (ENS)) 2012-01-30 16:15: Statistical Attack on RC4: Distinguishing WPA (Serge Vaudenay (EPFL)) 2012-01-31 12:45: The Yin and Yang Sides of Embedded Security (Christof Paar (Ruhr University Bochum)) 2012-02-03 16:00: Encoding D-Bus protocol state machines for testing client implementations (Philip Withnall (University of Cambridge)) 2012-02-08 14:15: A Communications Medium for the 21st Century : Towards Open Public Display Networks (Nigel Davies, University of Lancaster) 2012-02-15 16:00: C++11 Style (Bjarne Stroustrup, Distinguished University Professor, Texas A&M University; Visiting Professor, Cambridge University) 2012-02-17 16:00: Linguistic properties of multi-word passphrases (Joseph Bonneau) 2012-02-24 14:00: Don't kill my ads! Balancing Privacy in an Ad-Supported Mobile Application Market (Ilias Leontiadis (University of Cambridge)) 2012-02-28 13:00: A Proposed Framework for Analysing Security Ceremonies (Jean Martina (Federal University of Santa Catarina / Brazil)) 2012-03-02 16:00: Automatic generation of the kernel integrity monitor and how to protect the integrity monitor itself (Yuki Kinebuchi and Hiromasa Shimada (Waseda University)) 2012-03-12 14:00: Trip report (Sören Preibusch) 2012-03-14 10:00: Malleability in Modern Cryptography (Markulf Kohlweiss, MSRC) 2012-03-20 14:00: Insecurity Engineering in Locks (Marc Weber Tobias) 2012-03-20 16:15: Trustworthy Medical Device Software (Kevin Fu (University of Massachusetts Amherst)) 2012-03-28 14:00: Non-Interactive Verifiable Computation (Bryan Parno, Microsoft Research) 2012-03-30 16:00: Malware analysis with multiple features (Najmi Zabidi) 2012-04-02 16:00: Towards Statistical Queries over Distributed Private User Data (Paul Francis (MPI-SWS)) 2012-04-05 09:30: The science of guessing (Joseph Bonneau (Cambridge University)) 2012-04-17 16:00: Efficient Cryptography for the Next Generation Secure Cloud (Alptekin Küpçü, Koç University) 2012-04-18 10:30: Confining the Ghost in the Machine: Using Types to Secure JavaScript Sandboxing (Shriram Krishnamurthi, Brown University) 2012-04-23 14:00: Rekeyable Ideal Cipher from a Few Random Oracles (Elena Andreeva, K.U. Leuven) 2012-05-01 16:15: New evidence on consumers’ willingness to pay for privacy (Sören Preibusch (University of Cambridge)) 2012-05-02 14:15: Content delivery in the Internet: an infrastructure-oriented perspective. (Steve Uhlig, Professor of Networks, School of electronic engineering and computer science, Queen Mary, University of London) 2012-05-08 16:15: Building Bankomat: Cash dispensers and the development of on-line, real-time networks in Britain and Sweden, c.1965-1985 (Bernardo Batiz-Lazo (Bangor University)) 2012-05-09 14:15: CANCELLED: Structural executable comparison, malware classification, and collaborative binary analysis - the formerly-zynamics tools at Google ( Thomas Dullien, Google) 2012-05-16 14:15: Energy efficiency and the design of brains ( Professor Simon Laughlin, Department of Zoology, University of Cambridge) 2012-05-17 16:00: Facebook and Privacy: The Balancing Act of Personality, Gender, and Relationship Currency (Daniele Quercia (University of Cambridge)) 2012-05-18 16:00: Title to be confirmed (Jonathan Millican (University of Cambridge)) 2012-05-23 14:15: Alan Turing as a computer designer (Prof. Brian Carpenter, University of Auckland Computer Science) 2012-05-29 16:15: Some recent results on TLS and DTLS (Kenny Paterson (Royal Holloway)) 2012-05-30 14:15: A Bayesian Approach to Learning the Structure of Human Languages (Phil Blunsom, Department of Computer Science, Oxford University) 2012-05-31 16:00: Attacks and defenses in decentralised botnets (Shishir Nagaraja (University of Birmingham)) 2012-06-01 16:00: BGP security and where BGPSEC is heading (Dongting Yu) 2012-06-07 16:00: Lock Inference in the Presence of Large Libraries (Khilan Gudka (University of Cambridge)) 2012-06-08 16:00: Polymorphic attacks against sequence-based software birthmarks (Wei Ming Khoo (University of Cambridge)) 2012-06-13 14:15: Behavioural Nudge or Technological Fudge? (Yvonne Rogers, Professor of Interaction Design, UCL) 2012-06-15 16:00: Title to be confirmed (José Manuel Liñares-Zegarra & Bernardo Batiz-Lazo) 2012-06-22 11:00: Towards Trustworthy Embedded Systems (Gernot Heiser (University of New South Wales/NICTA)) 2012-06-22 16:00: Perky "Canada" Has Own Privacy Governance, Laws (Tara Whalen, Office of the Privacy Commissioner of Canada) 2012-06-25 13:00: The Great Indoors: The Next Frontier in Location-Based Services (Ravi Palanki, Qualcomm) 2012-06-27 11:00: Code-Level Formal Verification for Large Real Systems (Mark Staples (NICTA)) 2012-06-29 10:00: Human Mobility Characterization from Cellular Network Data (Ramón Cáceres, AT&T Labs) 2012-07-10 16:15: Security Analysis of Industrial Control Systems (Arthur Gervais (Aalto University)) 2012-07-20 16:00: Observation skill and personal safety – workshop (Ellis Weinberger) 2012-07-31 16:15: Bromium: Task isolation through hardware-assisted virtualization (Ian Pratt, Bromium) 2012-08-24 16:00: Weightless: a new standard for M2M communication (Steven Wenham (neul.com)) 2012-08-31 11:00: What do Real Life Hadoop Workloads Look Like? (Yanpei Chen, Cloudera) 2012-09-07 16:00: Title to be confirmed (Yuto Nakano) 2012-09-07 16:45: Summary of ECRYPT II summer school (Omar Choudary ( Computer Laboratory)) 2012-09-14 16:00: crypt@b-it, ECRYPT Summer School, CHES 2012 (Omar, Markus, Sergei) 2012-09-27 16:15: Protecting Distributed Applications Through Software Diversity and Renewability (Christian Collberg, University of Arizona) 2012-10-01 15:00: Explorations of Science in Cyber Security (Greg Shannon (CERT and Carnegie Mellon University)) 2012-10-04 17:00: Technology Risk Management - Achilles Heels, Myths and Mirages (Tony Chew (Monetary Authority of Singapore)) 2012-10-05 16:00: Technology Risk Management Guidelines and Regulations for the Safety & Soundness of the Financial Industry in Singapore (Tony Chew (Monetary Authority of Singapore)) 2012-10-08 13:30: "My other computer is a data center" - The warehouse-scale computing infrastructure at Google (Christoph Best, Software Engineer, Google) 2012-10-09 16:15: Aurasium: Practical Policy Enforcement for Android Applications (Rubin Xu (University of Cambridge)) 2012-10-10 14:15: Dart: A Platform for Building Large Web Applications (Mads Ager, Google) 2012-10-12 10:00: Dynamically Enforcing Knowledge-based Security Policies (Michael Hicks, University of Maryland) 2012-10-15 14:00: Introductions (Speaker to be confirmed) 2012-10-16 16:15: Analysis of FileVault 2: Apple's full disk encryption scheme (Omar Choudary (University of Cambridge)) 2012-10-17 14:15: Machine Learning Methods for the Detection and Prediction of Transmembrane Beta-Barrel Proteins in Prokariotes (Dr Piero Fariselli, Biocomputing Group and Department of Computer Science, University of Bologna) 2012-10-18 16:00: From geek-dream to mass-market: Will privacy-preserving technologies ever be adopted? (Hamed Haddadi (Queen Mary, University of London)) 2012-10-22 14:00: uvNIC: Rapid Prototyping Network Interface Controllers (Matthew Grosvenor (University of Cambridge)) 2012-10-23 16:15: Exploring compartmentalisation hypotheses with SOAAP (Khilan Gudka (University of Cambridge)) 2012-10-24 14:15: Challenges and approaches to improving the accuracy of indoor positioning systems (Niki Trigoni, Oxford University Department of Computer Science) 2012-10-31 14:15: Semi-local string comparison (Alexander Tiskin, Department of Computer Science, University of Warwick) 2012-11-05 14:00: Programs in context (Dominic Orchard (University of Cambridge)) 2012-11-07 14:15: Sentiment Analysis (Prof. Stephen Pulman, Oxford University Department of Computer Science) 2012-11-14 14:15: Structural executable comparison, malware classification, and collaborative binary analysis - the formerly-zynamics tools at Google (Thomas Dullien, Google) 2012-11-19 14:00: Reducing Latency in Tor (Steven Herbert (University of Cambridge)) 2012-11-20 16:15: An Updated Threat Model for Security Ceremonies (Jean Martina (Federal University of Santa Catarina / Brazil)) 2012-11-21 14:15: Every tweet counts: How statistical content analysis of social networks can improve our knowledge of citizens' preferences. An application to France and US presidential elections and EU leaders' popularity (Prof. Stefano Iacus, Dipartimento di Economia, Management e Metodi Quantitativi Universita' di Milano) 2012-11-27 16:15: Who's next? Identifying risk factors for subjects of targeted attacks (Martin Lee (Symantec)) 2012-11-28 14:15: One Bit is Not Enough: The Benefit of Reference Analysis in Virtual Memory Management (Frank Bellosa, Karlsruhe Institute of Techology) 2012-12-04 16:15: Protecting websites from social engineering attacks against your users (Christopher Palow, Facebook) 2013-01-15 16:15: Protecting your website from hackers (Ben Mathews, Facebook) 2013-01-21 13:00: HUMANS DON'T SCALE: The Future of the Internet of Things (Pilgrim Beart) 2013-01-22 16:15: CERB Banking: How to secure online banking and keep the users happy? (Pawel Jakub Dawidek) 2013-01-23 14:15: Computing at School: Tackling the ICT Education Crisis in UK Schools (Simon Peyton-Jones, Microsoft Research) 2013-01-30 14:15: Replacing lectures with videos in the Computer Science Tripos (Andy Rice, Alastair Beresford, Computer Lab) 2013-02-04 14:00: Getting by without GPS: Random adventures in the Defence Industry (Ramsey Faragher) 2013-02-05 16:15: A novel, efficient, scalable and easy-to-use cryptographic key management solution for wireless sensor networks (Dr Michael Healy, University of Limerick ) 2013-02-06 14:15: Adaptive Runtime Verification (Prof Ezio Bartocci, University of Wien) 2013-02-13 14:15: Privacy Challenges and Solutions for Data Sharing (Dr Aris Gkoulalas-Divanis, IBM Research, Dublin) 2013-02-20 14:15: Challenges in Computer Graphics Modeling (Prof. Oliver Deussen, University of Konstanz, Germany) 2013-02-27 14:15: High-Assurance Algorithmic Trading (Dr. Hasan Amjad, Cantab Capital Partners) 2013-03-06 14:00: Student Design Project Presentations (Student design teams) 2013-03-27 16:00: Facebook and privacy (Michael Kosinski) 2013-03-29 16:00: Facebook and privacy (Michal Kosinski) 2013-04-12 16:00: The great cyberscare (Thomas Rid) 2013-04-24 14:30: Could Computers Understand Their Own Programs (Prof Sir Tony Hoare - Microsoft Research & Computer Laboratory) 2013-04-26 14:00: Sensing Human Activity (Mik Lamming) 2013-04-29 14:00: Measuring with a smartphone: precision 3D tracking using a phone's built-in inertial sensors (Ian Sheret) 2013-05-01 14:15: CANCELLED: Compressed Sensing and the Art of Subsampling (Anders Hansen - University of Cambridge Computer Laboratory) 2013-05-08 14:15: Mind the Map - Modelling Sustainability of Urban Crowd-Sourcing (Dr Licia Capra - University College London) 2013-05-08 16:15: Pins, Tacks, and Slinks: Proposals for patching PKI on the web (Joseph Bonneau, Google) 2013-05-14 16:15: Rendezvous: A search engine for binary code (Wei Ming Khoo, Computer Laboratory, University of Cambridge) 2013-05-15 14:15: Strongly-Typed Language Support for Internet-Scale Information Sources (Don Syme - Microsoft Research) 2013-05-22 14:15: Digging into (Historical) Data: Tracking global commodity trading in the nineteenth century (Prof Ewan Klein - University of Edinburgh) 2013-05-24 14:00: Distributed Electronic Rights in JavaScript (Mark S. Miller, Google) 2013-05-29 14:15: The Domain Name System in 2013 – The political and technical landscape ( Simon McCalla - CTO, Nominet UK) 2013-06-11 16:15: PHANTOM: A Parallel Architecture for Practical Oblivious Computation (Martin Maas, UC Berkeley) 2013-06-12 14:15: Errors, Exploits, and Espionage - A tour of software vulnerabilities and their real-world impact (Tim Pullen - Detica / BAE Systems) 2013-06-19 14:15: Humans + Automation: Greater than the sum of the parts (Missy Cummings - MIT) 2013-06-21 16:00: Security informed safety (Robin Bloomfield) 2013-06-26 14:00: Overview of Research: Green Radio and the Science of Cities (Weisi Guo) 2013-07-05 16:00: De-anonymizing D4D datasets (Kumar Sharad, Computer Laboratory) 2013-07-12 16:00: Meeting with CL System Administration (Graham Titmus, Computer Laboratory) 2013-08-12 14:00: An introduction to 3G core network architecture: The open architecture of the WCDMA Core Network. (Lela Mirtskhulava, Tbilisi State University, Georgia.) 2013-08-19 14:00: An introduction to 3G core network architecture: Power control (Lela Mirtskhulava, Tbilisi State University, Georgia) 2013-08-23 16:00: GPU-mediated direct-memory-access attacks in a smart phone (Marta Piekarska, Technische Universität Berlin) 2013-08-26 14:00: Packet data mobility management in Wireless Cellular Networks (Lela Mirtskhulava, Tbilisi State University, Georgia.) 2013-08-29 14:00: Tools for helping supervisors: Presentations from summer students (Speaker to be confirmed) 2013-08-30 16:00: Selective Disclosure in Datalog-based Trust Management (Nik Sultana, University of Cambridge Computer Laboratory) 2013-10-04 14:00: Title to be confirmed (James Snee (University of Cambridge)) 2013-10-11 11:30: Weightless (William Webb) 2013-10-14 13:00: Introductions (Speaker to be confirmed) 2013-10-15 16:15: TLS Security - Where Do We Stand? (Kenny Paterson, Royal Holloway) 2013-10-16 14:15: Towards Position-based Routing for Mobile Environments ( Dr Marwan Fayad - Univ Stiling) 2013-10-18 16:00: Effect of Internet censorship on user behavior (Sheharbano Khattak, University of Cambridge Computer Laboratory) 2013-10-21 13:00: Upgrading Fortran source code using automatic refactoring (Dominic Orchard (University of Cambridge)) 2013-10-22 16:15: Psychology of scams (David Modic, University of Cambridge) 2013-10-23 14:15: Disciplined Approximate Computing: From Language to Hardware and Beyond (Luis Ceze - University of Washington.) 2013-10-25 14:00: In-depth crypto attacks: "It always takes two bugs" (Karsten Nohl, Security Research Labs) 2013-10-30 14:15: Understanding Video and Audio at Google ( Tom Walters - Google Zurich Labs) 2013-11-05 16:15: Animals as Mobile Social Users (Tanya Berger-Wolf) 2013-11-06 14:15: Pico: no more passwords! ( Dr Frank Stajano - University of Cambridge Computer Laboratory) 2013-11-12 16:15: A day in the life of government cybersecurity (Ian Levy) 2013-11-13 14:15: Towards Do-It-Yourself Networking ( Joerg Ott - Aalto University, Finland) 2013-11-18 14:00: SCION: Scalability, Control, and Isolation On Next-Generation Networks (Prof. Adrian Perrig, Department of Computer Science at the Swiss Federal Institute of Technology (ETH)) 2013-11-20 14:15: Research Issues in Computer Support for Collaborative Problem Solving ( Steve Tanimoto - University of Washington, Seattle.) 2013-11-22 16:00: Efficient Template Attacks (Omar Choudary ( Computer Laboratory)) 2013-11-26 16:15: TESLA: Temporally-enhanced security logic assertions (Jonathan Anderson, University of Cambridge) 2013-11-27 14:15: Compressed sensing and the art of subsampling (Anders Hansen - DAMTP, Centre for Mathematical Sciences, University of Cambridge) 2013-12-02 13:00: Julia: A Fast Dynamic Language for Technical Computing (Stefan Karpinski, MIT) 2013-12-03 16:15: Reviewing Cybercrime; Epistemology, Political Economy and Models (Dr Michael McGuire, University of Surrey) 2013-12-04 14:15: MirageOS: compiling a functional cloud (Anil Madhavapeddy - University of Cambridge Computer Laboratory) 2013-12-23 16:15: Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet. (Prof. Steven M. Bellovin, Columbia University) 2014-01-14 15:00: Privacy/Proxy/Perfidy – what criminals (and others) put in domain whois (Dr Richard Clayton, University of Cambridge) 2014-01-21 15:00: Eavesdropping near field contactless payments: A quantitative analysis (Thomas P. Diakos, University of Surrey) 2014-01-22 14:00: Evaluation Metrics and Learning to Rank for Information Retrieval (Emine Yilmaz - University College London) 2014-01-29 14:00: Randomised Load Balancing For Networks (Thomas Sauerwald - University of Cambridge, Computer Laboratory) 2014-02-04 15:00: The effect of decentralized behavioral decision making on system-level risk (Kim Kaivanto, Lancaster University) 2014-02-05 14:00: Talking About Shapes (MALCOLM SABIN ) 2014-02-11 15:00: On the (in)security of widely-used RFID access control systems (Dr. Flavio D. Garcia, University of Birmingham) 2014-02-12 14:00: Safer Healthcare by Better Computer Science (Prof. Harold Thimbleby - Swansea University, Wales.) 2014-02-19 14:00: Interactive Configuration Problems (Henrik Reif Andersen - Configit.Com, Copenhagen.) 2014-02-21 16:00: Discussion on AG's recent Opinion concerning the Data Retention Directive (Nora Ni Loideain, PhD Candidate in Law, Magdalene College, University of Cambridge) 2014-02-25 15:00: Introduction to DNSSEC (Tony Finch, University of Cambridge Computing Service) 2014-02-26 14:00: What We Talk About When We Talk About Types ( Dr Nick Benton - Microsoft Research Cambridge) 2014-03-05 14:00: Part Ib Group Project Presentations (Computer Laboratory Part Ib Students) 2014-03-10 14:00: Wireless communication in electromagnetic cavities (Steven Herbert (University of Cambridge)) 2014-03-12 14:00: Competitive Contagion in Networks (Moez Draief - Imperial College London) 2014-03-17 14:00: Better authentication: password revolution by evolution (Daniel Thomas (University of Cambridge)) 2014-03-18 15:00: Bitcoin: A Full Employment Act for security engineers? (Joseph Bonneau, Center For Information Technology Policy, Princeton) 2014-04-02 11:00: Test event (Martin Kleppmann (Ept Computing)) 2014-04-18 16:00: (How) can we secure Internet routing? (Michael Schapira (Hebrew University of Jerusalem)) 2014-04-22 15:00: Website Fingerprinting (Nikita Borisov, University of Illinois) 2014-04-23 14:00: *** The Weight of Gravity *** (Hills, Graham and Blain - Framestore Visual Effects, London) 2014-04-29 15:00: Protecting Programs During Resource Retrieval (Professor Trent Jaeger, CSE Department, Pennsylvania State University) 2014-04-30 14:00: Computing Cancer ( Jasmin Fisher - Microsoft Research & Department of Biochemistry, Cambridge) 2014-05-02 16:00: Building a Cyber eco-system (John Dale, handling partnering and M&A for Raytheon UK) 2014-05-06 15:00: Psychology of malware warnings (David Modic, Cambridge University) 2014-05-07 14:00: Multitask Learning (Prof Massimiliano Pontil - University College London) 2014-05-09 16:00: Chip and Skim: cloning EMV cards with the pre-play attack (Omar Choudary (Computer Laboratory)) 2014-05-13 15:00: Security, Reliability and Backdoors (Dr Sergei Skorobogatov, Security Group, University of Cambridge Computer Laboratory) 2014-05-14 14:00: No Babbage Seminar today owing to the Wheeler Lecture (Speaker to be confirmed) 2014-05-14 16:00: Computational Thinking (Prof Jeannette M. Wing - Microsoft Research & Carnegie Mellon University) 2014-05-21 14:00: Theory into Practice: the story of Incremental (Yaron Minsky - Jane Street) 2014-05-28 14:00: No Fixed Abode: Avoiding IP Address Blocking to Circumvent Censorship (Professor Nikita Borisov - University of Illinois at Urbana-Champaign) 2014-05-30 16:00: Oakland 2014 summary ( Steven Murdoch) 2014-06-02 14:00: A computational science agenda for programming language research (Dominic Orchard (University of Cambridge)) 2014-06-03 15:00: Trust, Religion, and Tribalism: Reflections on the Sociological Data from the Balkans (Gorazd Andrejč, Junior Research Fellow, Woolf Institute, Cambridge) 2014-06-30 14:00: Title to be confirmed (Tom Bytheway, Nikilesh Balakrishnan, Sherif Akoush) 2014-07-11 16:00: Orchestrated crime: the high yield investment fraud ecosystem (Jens Neisius, TU Munich) 2014-07-29 15:15: Safe Shell Scripting with Capabilities and Contracts (Scott Moore, PhD student, Harvard) 2014-08-01 16:00: Who by sound and who by ground, who by pin and who by skin: side-channel key extraction from PCs (Eran Tromer, Tel Aviv University) 2014-09-05 14:00: Using digital tools to foster learning (Dr Sanjoy Mahajan, MIT Director of Digital Residential Learning ) 2014-09-09 14:00: From TLS to secure websites: the HTTPS landmine (Antoine Delignat-Lavaud, Inria Paris, team Prosecco (Programming Securely with Cryptography) 2014-09-10 13:00: Micro-Policies: A Framework for Tag-Based Security Monitors (Benjamin C. Pierce, University of Pennsylvania) 2014-09-23 14:00: DP5: Privacy-preserving Presence Protocols (Ian Goldberg, University of Waterloo [currently on sabbatical at the University of Cambridge]) 2014-09-30 14:00: Bitcoin as a source of verifiable public randomness (Joseph Bonneau, Center For Information Technology Policy, Princeton) 2014-10-15 14:00: Fuzzy Optimisation of Reverse Logistics Networks (Prof Dobrila Petrovic - Coventry University) 2014-10-20 15:00: Introductions (Speaker to be confirmed) 2014-10-22 14:00: Science Data Processor for the Square Kilometre Array Telescope (Bojan Nikolic - University of Cambridge MRAO) 2014-10-24 16:00: A Look at the Consequences of Internet Censorship Through an ISP Lens (Sheharbano Khattak, Cambridge University) 2014-10-29 14:00: Structure and Dynamics of Mutlilayer Networks (Ginestra Bianconi - Queen Mary University London) 2014-11-05 14:00: Payment System Security - Attacks and Defences (Dr Steven Murdoch - University College London) 2014-11-12 14:00: Kafka and Samza: distributed stream processing in practice (Martin Kleppmann - LinkedIn) 2014-11-19 14:00: Scientific Data Management (Dr Thomas Heinis - Imperial College London) 2014-11-19 15:05: Hacking is not random: a case-control study of webserver-compromise risk (Marie Vasek, PhD student in the Computer Science and Engineering department, Southern Methodist University (SMU)) 2014-11-21 12:00: Exploring Traffic and QoS Management Mechanisms to Support Mobile Cloud Computing using Server Localisation in Heterogeneous Environments (Fragkiskos Sardis) 2014-11-26 14:00: Text Analysis of Social Media Beyond Twitterdome (Prof Tim Baldwin - Melbourne University) 2014-11-27 11:00: Cloud-centric assured information sharing ( Dr. Bhavani Thuraisingham, Executive Director of the Cyber Security Research Institute, The University of Texas at Dallas) 2014-11-28 16:00: Applying game theory to cybersecurity problems (Nicola Dimitri, Professor of Economics, University of Siena) 2014-12-01 13:05: *POSTPONED* Resourceful: Fine-grained, Always-on Resource Accounting for The Operating System (Oliver Chick (University of Cambridge)) 2014-12-03 14:00: Transitive leap frogging: how to avoid queuing up for work (Dr Karl-Filip Faxén - SICS, Sweden.) 2015-01-12 14:05: Resourceful: Fine-grained, kernel resource accounting (Oliver Chick (University of Cambridge)) 2015-01-13 14:00: Single Password Authentication (Alptekin Küpçü, Assistant Professor, Cryptography, Security & Privacy Research Group, Koç University) 2015-01-19 14:00: Group discussion: New machine age (Speaker to be confirmed) 2015-01-21 14:00: The UK National Cyber Security Programme ( Natalie Black - UK National Office of Cyber Security) 2015-01-28 14:00: Interacting with Infrastructure: Home Networking and Beyond (Dr Richard Mortier - University of Cambridge Computer Laboratory) 2015-02-04 14:00: Non-Photorealistic Rendering of Images ( Prof. Paul Rosin - Cardiff University) 2015-02-05 14:00: Human factors and missed solutions to WWII Enigma design weaknesses (Prof. Harold Thimbleby CEng FIET FRCPE FLSW HonFRSA HonFRCP) 2015-02-09 14:05: Debugging Distributed Systems: A worked example (George Neville-Neil ) 2015-02-11 14:00: Compressed sensing in the real world - Why and what actually works (Dr Bogdan Roman - DAMPT, University of Cambridge) 2015-02-18 14:15: The Evolution of Sophos (Dr Jan Hruska - Sophos Ltd.) 2015-02-25 14:00: Digital by Default - A Paradigm Shift in Government (Stephen Allott - Crown Representative for Small and Medium Enterprises in the Cabinet Office) 2015-03-04 14:00: Group Project Presentations (Computer Laboratory 2nd Year Undergraduates) 2015-03-10 14:00: Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation (Nathan Dautenhahn, University of Illinois at Urbana-Champaign) 2015-03-11 14:00: The Automatic Statistician - an AI for Data Science (Zoubin Ghahramani - Department of Engineering, University of Cambridge) 2015-03-30 14:05: The Lifetime of Android API vulnerabilities: case study on the JavaScript-to-Java interface (Daniel Thomas (University of Cambridge)) 2015-03-31 14:00: Chupja--PHY Covert Channels: Can you see the Idles? (Hakim Weatherspoon, assistant professor, Department of Computer Science, Cornell University) 2015-04-13 14:00: Deep Learning of Natural Language Semantics (Prof Yoshua Bengio - Université de Montréal) 2015-04-21 14:00: Understanding and Fighting Malicious Activity on Online Social Networks (Gianluca Stringhini, Assistant Professor, University College London) 2015-04-24 16:00: John Ioannidis visits (Speaker to be confirmed) 2015-04-28 14:00: Captchas - the state of play (Dr Jeff Yan, Newcastle University) 2015-04-29 14:00: Toward Causal Machine Learning (Prof. Dr. Bernhard Schölkopf - Max Planck Institute for Intelligent Systems) 2015-05-04 14:00: The Dutch electronic patient record system and beyond - towards physician-controlled decentralized medical record exchange. (Guido van 't Noordende, University of Amsterdam) 2015-05-12 14:00: On the power of techniques for defeating code reuse attacks + some retrospective reflection on the DARPA CRASH program (Prof Howie Shrobe (MIT)) 2015-05-13 14:00: Cellular Systems Biology of Chromosome Dynamics (Dr Karen Lipkow - Barbraham Institute) 2015-05-14 12:00: Why isn't IoT here yet? (Pilgrim Beart ) 2015-05-18 14:05: Captain Buzz: An all-smartphone autonomous delta-wing drone (Oliver R. A. Chick (University of Cambridge)) 2015-05-19 14:00: Information-flow tracking for web technologies (Luciano Bello) 2015-05-20 14:00: Cancelled : Full reduction in the face of absurdity. (Didier Remy - Inria) 2015-05-26 16:15: Hints and Principles for Computer System Design (Butler Lampson - Microsoft Research + MIT) 2015-05-27 14:00: Probabilistic Programming; Ways Forward (Dr Frank Wood - Dept Engineering Science, Oxford) 2015-05-28 14:00: Massively Parallel Hardware Security Platform (Petr Svenda, Masaryk University, Czech Republic) 2015-06-01 14:05: POSTPONED: Group discussion on paper authorship policy (Speaker to be confirmed) 2015-06-02 14:30: Insecure processing of cookies in modern web applications and browsers (Dawid Czagan, Silesia Security Lab) 2015-06-05 16:00: Informal talk about Wassenaar and/or work at our lab (Sergey Bratus, Dartmouth College) 2015-06-15 14:05: OPUS - tracking research data (practice talk) (Speaker to be confirmed) 2015-06-26 14:00: Making Better Privacy Decisions in Ubiquitous Computing Environments (Serge Egelman, International Computer Science Institute (ICSI) and Department of Electrical Engineering and Computer Sciences (EECS) at the University of California, Berkeley) 2015-06-30 14:05: Soroban: Attributing latency in virtualized environments (Lucian Carata (University of Cambridge)) 2015-07-13 14:05: Completing the Cent Cols Challenge (for the third time) (William Webb) 2015-07-20 09:30: Interaction + Graphics: Four Lectures By Computer Laboratory Visitors ((Four Guest Lecturers)) 2015-07-28 14:00: Massively Parallel Hardware Security Platform (Petr Svenda, Masaryk University, Czech Republic) 2015-08-17 14:05: Dynamic Causal Monitoring for Distributed Systems (Rodrigo Fonseca) 2015-08-27 16:05: Device Analyzer: 3500 years of handset usage data (Andrew Rice (University of Cambridge)) 2015-09-04 16:00: Pico: user authentication for Internet of Things (Alex Dalgleish and Agnes Cameron, University of Cambridge) 2015-09-11 16:00: Pico prototype (Fin Brown, University of Cambridge) 2015-10-05 14:05: Security metrics for the Android ecosystem (Daniel Thomas (University of Cambridge)) 2015-10-08 13:00: Unweaving The Lexical Rainbow: Grounding Linguistic Creativity in Perceptual Semantics (Tony Veale, University College Dublin) 2015-10-12 11:05: Introductions (Speaker to be confirmed) 2015-10-13 14:00: Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer (Flavio Garcia, University of Birmingham) 2015-10-14 14:00: Clouds, Things and Robots: the need for innovation in Architecture and Software (Prof David May - University of Bristol) 2015-10-20 16:00: Behavioral Decision Making in Interdependent Security Games (Ashish R. Hota, PhD Student, School of Electrical and Computer Engineering Purdue University) 2015-10-21 14:00: Cluster Management with Kubernetes (Dr Satnam Singh - Facebook) 2015-10-26 13:00: nShield HSMs (Richard Kettlewell, Thales) 2015-10-28 14:00: Today’s and Tomorrow’s Camera Processing Pipelines (Prof Graham Finlayson - University of East Anglia) 2015-10-28 16:00: Decertifying the Worst Voting Machine in the US: Lessons Learned and Looking Forward (Jeremy Epstein, SRI International) 2015-10-30 16:00: About the (in)security of CAPTCHAs (Carlos Javier Hernández-Castro, Complutense University, Madrid, Spain) 2015-10-30 16:20: Raven – attacks and countermeasures (Graham Rymer, University of Cambridge) 2015-11-03 14:00: Identification and Investigation of Cyber Risk Hotspots in a Large Computer Network (Shahzad Awan, Cardiff University) 2015-11-04 14:00: Image-triage, Brain Computer Interaction and Deception Detection using EEG (Prof Howard Bowman - Univs Kent & Birmingham) 2015-11-11 14:00: Unpatchable: Living with a Vulnerable Implanted Device (Marie Moe - SINTEF Norway) 2015-11-18 14:00: Talk Cancelled (was 'Synthetic Biology') (Dr. Jim Haseloff - Department of Plant Sciences, University of Cambridge) 2015-11-24 14:00: Android security: Protecting users, a billion at a time (Adrian Ludwig, Android Security Team) 2015-11-25 14:00: Communication Technologies Research at the NPL (Dr Tian-Hong LOH - National Physical Laboratory UK) 2015-11-27 16:20: Secure multipath communications (Marios O. Chaudary) 2015-12-02 14:00: Understanding and Verifying Javascript Programs. ( Prof Philippa Gardner - Imperial College London) 2016-01-20 14:00: Finding what is invisible through computation ( Dr Rafal Mantiuk - University of Cambridge, Computer Laboratory) 2016-01-27 14:00: Synthetic Biology ( Dr. Jim Haseloff - Department of Plant Sciences, University of Cambridge) 2016-02-03 14:00: The Supercloud: Opportunities and Challenges (Prof Hakim Weatherspoon - Cornell University) 2016-02-08 14:05: Physics inspired multi-agent models: application to sensor data fusion and cyber-physical systems control. (Franck Gechter) 2016-02-09 14:00: The Unfalsifiability of security claims (Cormac Herley, Microsoft Research, Redmond) 2016-02-10 14:00: Predicting Psychology from Social Media Data (Dr David Stillwell - Judge Management School, University of Cambridge) 2016-02-16 14:00: Do You See What I See? Differential Treatment of Anonymous Users (Sheharbano Khattak, University of Cambridge) 2016-02-17 14:00: Communication with Artificial Intelligences (Prof. Ann Copestake - University of Cambridge, Computer Laboratory.) 2016-02-24 15:00: Data Science at The Guardian (Felix Sanchez-Garcia, The Guardian) 2016-02-29 14:30: Are smartphone messaging apps and traditional telecommunication services substitute goods? (Nicolas Karsten, Duesseldorf Institute for Competition Economics (DICE)) 2016-03-02 16:15: CST Part Ib, Group Project Presentations (Part Ib students of the Computer Laboratory) 2016-03-09 14:00: Freedom to Innovate: Addressing Student Legal Risks at MIT and Queen Mary's Entrepreneurship and Cyberlaw Clinics (Nathan Matias - MIT Media Laboratory Centre For Civic Media) 2016-03-11 16:00: A new packet filtering technique (Nik Sultana (University of Cambridge)) 2016-03-22 14:00: Understanding, Characterizing, and Detecting Facebook Like Farms (Dr. Emiliano De Cristofaro, Senior Lecturer (Associate Professor), University College London) 2016-04-25 14:05: Anvil: building web apps in a browser using Python (Ian Davies and Meredydd Luff) 2016-04-27 14:00: From Human Affect and Personality to Social Robots: Affective and Social Signal Processing (Dr Hatice Gunes - University of Cambridge, Computer Laboratory) 2016-05-04 14:00: Android: Mobile, Wearable and IoT devices - Designing Global, Scalable Systems (Dr Grant Allen - Google) 2016-05-11 14:00: Imaginary Engines: Lovelace, Babbage and the Analytical Engine. (Sydney Padua) 2016-05-13 16:15: No Littering! (Bjarne Stroustrup - Morgan Stanley and Columbia University) 2016-05-18 14:00: What does the operating system ever do for me? - Systems Challenges in Graph Analytics ( Dr Tim Harris - Oracle Research Laboratories (Cambridge)) 2016-05-25 14:30: A History of Virtualisation in Operating Systems. (Dr Andrew Herbert OBE, FREng..) 2016-06-21 14:00: Cyberinsurance: good for your company, bad for your country? (Fabio Massacci - University of Trento) 2016-07-12 13:30: From EDA to NDA: Treating Networks like Hardware Circuits (George Varghese - Microsoft Research) 2016-08-02 14:45: Design for Security Test against Fault Injection Attack, and Fast Test with Compressive Sensing (Prof Huiyun Li, Shenzhen Institutes of Advanced Technology) 2016-10-11 14:00: Semantics derived automatically from language corpora necessarily contain human biases (Arvind Narayanan, Princeton University) 2016-10-12 16:15: Rethinking Auto-Parallelisation (Prof Michael O'Boyle - School of Informatics, Edinburgh) 2016-10-18 14:00: The Million-Key Question : Investigating the Origins of RSA Public Keys (Best Paper Award @ USENIX Security 2016) (Petr Svenda, Masaryk University, Brno, Czech Republic) 2016-10-19 16:15: From Idea to Startup (David Chan - Entrepreneur-in-Residence, CyLon Accelerator) 2016-10-21 14:00: Putting wireless signal security in a system security context (Wade Trappe, Rutgers University) 2016-10-26 16:15: End-to-end encryption: Behind the scenes (D Vasile, M Kleppmann & D Thomas - University of Cambridge Computer Laboratory) 2016-10-28 16:00: AXIOM Beyond Encryption (Irwin Olian, ACME Cold Storage Inc.) 2016-11-02 16:15: Graduate Studies Open Day (Speaker to be confirmed) 2016-11-04 13:15: Drammer: Deterministic Rowhammer Attacks on Mobile Platforms (Kaveh Razavi, Vrije Universiteit Amsterdam) 2016-11-09 16:15: Web search in an AI world: small, cute, distributed. (Dr Aurelie Herbelot - University of Trento) 2016-11-16 16:15: PYNQ - Enabling Software Engineers to Program Heterogeneous, Reconfigurable SoCs ( Peter Ogden - Xilinx Inc) 2016-11-23 16:15: Making Reactive Programs Function (Dr Neel Krishnaswami - University of Cambridge, Computer Laboratory) 2016-11-25 16:00: The human factor in software updates (Kami Vaniea, University of Edinburgh) 2016-11-29 14:00: Reversing chip design for hardware security characterization (Franck Courbon, Security group, University of Cambridge) 2016-11-30 16:15: Architectural Impacts of the Silicon Performance Wall (Dr Gavin Stark - Netronome and Visiting Industrial Fellow, Computer Laboratory.) 2017-01-17 14:00: Trends in Online Payment Security (Mohammed Aamir Ali, Newcastle University) 2017-01-25 16:15: Sequencing DNA Using Biological Nanopores (Tim Massingham - Oxford Nanopore Technologies) 2017-01-30 14:05: The Next-Generation Vector Architecture for HPC (Mbou Eyole, ARM) 2017-02-01 16:15: GLOBULAR: A PROOF ASSISTANT FOR DIAGRAMMATIC SCIENCE (Jamie Vicary - Department of Computer Science, University of Oxford) 2017-02-08 16:15: Data Science for the World of Moving Things (Dr Damon Wischik - Computer Laboratory, University of Cambridge) 2017-02-15 16:15: Challenges in Human-Robot Interaction (Prof. Kerstin Dautenhahn - University of Hertfordshire) 2017-02-21 14:00: On the Privacy and Security of the Ultrasound Ecosystem (Vasilios Mavroudis, University College London) 2017-02-22 16:15: CHERI - Architectural support for software memory protection and compartmentalisation (Robert N. M. Watson - University of Cambridge, Computer Laboratory) 2017-03-01 16:15: AI Meets Cancer (Dr Jasmin Fisher - Department of Biochemistry, University of Cambridge & Microsoft Research) 2017-03-08 14:00: Part Ib Computer Science Group Project Presentations (Part Ib CST Group Leaders) 2017-03-15 16:15: Are Sensor Networks a first step towards the Diamond Age? (Prof Julie McCann - Imperial College London) 2017-03-24 16:00: Verifyable random bit generation (Joseph Bonneau, Stanford University) 2017-03-28 14:00: Free-Form Gesture Passwords: Security, Memorability, Usability (Janne Lindqvist, assistant professor of electrical and computer engineering, Rutgers University) 2017-03-31 11:00: Security and Privacy in Machine Learning (Nicolas Papernot, Pennsylvania State University) 2017-04-21 16:00: 1000 days of UDP amplification DDoS attacks (Daniel Thomas (University of Cambridge)) 2017-04-24 14:05: Solving Reproducibility: Cross-pollination between Biochemical sciences and Computer Sciences (Clayton Rabideau, University of Cambridge) 2017-05-03 16:15: Morphologically Computing Soft Robots toward Self-Organizing Machines (Dr Fumiya Iida - Department of Engineering, University of Cambridge) 2017-05-10 16:15: Pervasive Sensing for Lifestyle Monitoring and Urban Applications (Prof Archan Misra - SMU Singapore) 2017-05-17 16:15: Ubiquitous Sensing with Light (Xia Zhou - Dept of Computer Science Dartmouth College ) 2017-05-18 14:15: Building an Intelligent Transportation System: Unveiling the Challenges (without the Hype!) (Glenford Mapp, Middlesex University) 2017-05-23 14:00: Improving the Impact of Smartphone Apps (Vincent Taylor, University of Oxford) 2017-05-24 16:15: Can we make people value IT security? (M. Angela Sasse - UCL London.) 2017-05-31 16:15: Reigniting Innovation in the Hardware Industry (Krste Asanovic - UC Berkeley) 2017-06-09 16:00: Building a secure bank from the ground up (Priyesh Patel, Daniel Chatfield, Monzo) 2017-06-13 14:00: What could we actually do about radicalisation, both online and offline? (Lydia Wilson, University of Oxford) 2017-06-20 14:00: Anti-surveillance: Can Applied Cryptography, Law Enforcement, and Formal Methods be Friends? (Dr. Markulf Kohlweiss, Microsoft Research, Cambridge) 2017-06-27 14:00: abraCARDabra: understanding carding forums (Jeremiah Onaolapo, University College London) 2017-08-11 16:00: SECURE project (embecosm) 2017-09-28 14:00: Protecting Analog Sensor Security (Kevin Fu, Associate Professor in Electrical Engineering and Computer Science, University of Michigan) 2017-10-04 14:00: Conditional Linear Cryptanalysis (Eli Biham, Computer Science Department, Technion - Israel Institute of Technology) 2017-10-10 14:00: Analysis and Classification of Android Malware (Lorenzo Cavallaro, Information Security Group (ISG), Royal Holloway, University of London) 2017-10-11 16:15: Wireless community mesh networks: fresh connectivity for 7 billion people (Prof Leandro Navarro - Universitat Politècnica de Catalunya) 2017-10-17 14:00: Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing (Changyu Dong, School of Computing, Newcastle University) 2017-10-18 16:15: (No Seminar Today) (Mr Nobody) 2017-10-25 16:15: What if Computers Understood Physics? (Dr Phillip Stanley-Marbell - University of Cambridge, Dept Engineering.) 2017-11-01 16:15: Programming Computers Without Processors (Dr Satnam Singh - X, The Moonshot Factory) 2017-11-08 16:15: Open source – 19th C. capitalism re-invented ? (Dr Lee Smith - ARM ) 2017-11-15 16:15: When Robots Hit the Road: New Challenges in Multi-Vehicle Coordination and Control (Dr Amanda Prorok - University of Cambridge, Computer Laboratory.) 2017-11-22 16:15: Using Modern C++ - stepping up to C++14/17 (Dr Bjarne Stroustrup) 2017-11-28 14:00: Bayes, not Naive: Security Bounds on Website Fingerprinting Defenses (Giovanni Cherubin, Information Security Group (ISG), Royal Holloway, University of London) 2017-11-29 16:15: Hands-on Generative Programming: Write an Interpreter, Build a Compiler. (Dr Nada Amin - University of Cambridge, Computer Laboratory.) 2017-12-15 16:00: Antikernel: a decentralized secure hardware-software operating system architecture (Andrew D. Zonenberg, IOActive) 2018-01-23 14:00: The impact of cybercrime on businesses: A new conceptual framework and its application to Belgium (Letizia Paoli, Faculty of Law, University of Leuven) 2018-01-24 16:15: THEMIS: Fairness in Federated Stream Processing under Overload (Dr Eva Kalyvianaki - The Computer Laboratory, Cambridge.) 2018-01-30 14:00: Anonymity in Cryptocurrencies (Sarah Meiklejohn, Information Security Group, University College London (UCL)) 2018-01-31 16:15: Amazon Alexa (Dr Craig Saunders - Amazon ) 2018-02-06 15:00: Psychological predictors of risky online behaviour: The cases of online piracy and privacy (Piers Fleming, School of Psychology, University of East Anglia) 2018-02-07 16:15: Private Statistics and Their Applications to Distributed Learning: Tools and Challenges (Dr Emiliano De Cristofaro - University College London) 2018-02-14 16:15: Kiwi Scientific Acceleration on FPGA (Dr David J Greaves - University of Cambridge, Computer Laboratory.) 2018-02-20 14:00: Large Scale Ubiquitous Data Sources for Crime Prediction (Cristina Kadar, ETH Zurich) 2018-02-21 16:15: Exploring the mechanisms of haematopoietic lineage progression at the single-cell level (Dr Ana Cvejic - The Sanger Centre & Dept of Haematology, Cambridge.) 2018-02-28 16:15: The Exposome in Epidemiological Practice (Prof. Paolo Vineis - School of Public Health, Imperial College London) 2018-03-07 14:00: Part Ib Group Project Presentations (Computer Science Tripos 2nd Year Students) 2018-03-14 16:15: Embedding Musical Codes into an Interactive Piano Composition (Prof Steve Benford - University of Nottingham, Mixed Reality Laboratory) 2018-03-27 14:00: Wireless Physical-layer Security: Fundamentals and Jamming with Coding for Secrecy (João P. Vilela, Informatics Engineering, University of Coimbra) 2018-05-02 16:15: No Seminar Today (Speaker to be confirmed) 2018-05-08 14:00: Data science approaches to understanding key actors on online hacking forums (Sergio Pastrana/Andrew Caines, Computer Laboratory, University of Cambridge) 2018-05-09 16:15: Latent Variable Model, Matrix Estimation and Collaborative Filtering (Prof Devavrat Shah - MIT) 2018-05-15 14:00: Ethical Issues in Network Measurement (Shehar Bano, Dept. of Computer Science, University College London (UCL)) 2018-05-16 16:15: A New Era of Open-Source System-on-Chip Design (Prof Christopher Batten - Cornell University) 2018-05-22 14:00: Detecting Spies in Sensor-Rich Environments using Cyber-Physical Correlation (Brent Lagesse, University of Washington Bothell (visiting Cambridge as a Fulbright Scholar)) 2018-05-23 16:15: Rule Control Of Teleo-Reactive, Multi-Tasking, Communicating Robotic Agents ( Keith Clark - Imperial College London) 2018-05-30 16:15: The Wheeler Lecture In Computer Science: Language, Learning, and Creativity (Professor Stephen Pulman - Department of Computer Science, University of Oxford.) 2018-07-16 15:00: Combating a hydra: Islamic State's digital jihad as a threat to international security (Miron Lakomy, Department of International Relations, University of Silesia) 2018-10-10 16:15: Machine learning for medicine: Predicting, pre-empting and treating disease (Professor Mihaela van der Schaar - John Humphrey Plummer Professor, University of Cambridge) 2018-10-17 16:15: A journey into interdisciplinary research (Derek McAuley - Professor of Digital Economy, University of Nottingham) 2018-10-30 14:00: The Guardian Council: Using many-core architectures to support programmable hardware security (Sam Ainsworth, Computer Laboratory, University of Cambridge) 2018-10-31 16:15: Stylus input and the benefits of a standard (Mark Hayter - Sr Engineering Director in the Chrome OS Hardware team at Google, and is currently a visitor from industry with the Computer Architecture team in the Computer Lab ) 2018-11-06 14:00: You think you're not a target? A tale of three developers (Chris Lamb, Debian Project Leader) 2018-11-07 16:15: Scalable Intelligent Systems by 2025 (Carl Hewitt - Emeritus Professor at MIT) 2018-11-09 16:00: Bribery, cryptocurrencies and smart contracts (Joseph Bonneau, New York University) 2018-11-13 14:00: Displacing big data: How cybercriminals cheat the system (Alice Hutchings, Computer Laboratory, University of Cambridge) 2018-11-14 16:15: Failing with Style: Why and How we Should Encourage Humans to Fail with Highly Capable Systems (Professor Steve Benford, Mixed Reality Laboratory, School of Computer Science, The University of Nottingham) 2018-11-21 16:15: Computational Imaging for Realistic Appearance Modelling (Abhijeet Ghosh, Imperial College London) 2018-11-27 14:00: The ideal versus the real: A brief history of secure isolation in virtual machines and containers (Allison Randal, Computer Laboratory, University of Cambridge) 2018-11-28 16:15: From molecules to recurrent visual hallucinations: multimodal imaging and computational modelling of Dementia with Lewy bodies (Dr Li Su - Alzheimer’s Research UK Senior Research Fellow) 2018-12-04 16:00: Function-Based Access Control (Yvo G. Desmedt, Department of Computer Science, University of Texas at Dallas) 2019-01-15 14:00: Trustworthy and Accountable Function-as-a-Service using Intel SGX (Andrew Paverd, Microsoft Research Cambridge) 2019-01-22 14:00: Evil on the Internet (Richard Clayton, Computer Laboratory, University of Cambridge) 2019-01-23 16:15: Imitation learning for structured prediction (Dr Andreas Vlachos) 2019-01-29 14:00: Keeping authorities honest with verifiable append-only logs, and making backdoored software updates detectable (Mustafa Al Bassam, Department of Computer Science, University College London (UCL)) 2019-01-30 16:15: The Magic of Machine Learning and Classifier ensembles (Ludmila Kuncheva,Bangor University) 2019-02-06 16:15: Perpetual Computing: Technologies for Banishing Batteries (Joshua R. Smith - Zeutschel Professor, Allen School of Computer Science and Engineering, University of Washington) 2019-02-13 16:15: Make Switches Simple Again! (Dr Noa Zilberman) 2019-02-19 14:00: Thunderclap: Exploring Vulnerabilities Operating System IOMMU Protection via DMA from Untrustworthy Peripherals (Theo Markettos, Computer Laboratory, University of Cambridge) 2019-02-20 16:15: Verified Probabilistic Reachability in Parametric Hybrid Systems: Theory and Tool Implementation (Dr Paolo Zuliani - School of Computing, Newcastle University) 2019-02-27 16:15: DevOps and Cloud Native development in the University of Cambridge (Dr Abraham Martin - Head of DevOps, University of Cambridge Information Services ) 2019-03-12 14:00: “Doing more” to keep children safe online – why the tech sector can only do so much (Andy Phippen, University of Plymouth) 2019-03-20 16:15: Representation Learning on Graphs (Jure Leskovec - Associate Professor of Computer Science at Stanford University, Chief Scientist at Pinterest, and investigator at Chan Zuckerberg Biohub) 2019-03-21 14:00: Securing Systems with Insecure Hardware (Kaveh Razavi, Systems and Network Security Group, Vrije Universiteit Amsterdam) 2019-03-22 16:00: Issues with using CVEs, CWE classification, and associated resources to perform system security evaluations (Brett Gutstein) 2019-04-24 16:15: Hand Tracking on HoloLens 2 (Dr Erroll Wood) 2019-04-30 14:00: A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions (Alisa Frik, International Computer Science Institute (ICSI), University of California Berkeley) 2019-05-01 16:15: How to design a programming language (Professor Alan Blackwell) 2019-05-07 14:00: Firecracker microVMs - How to Securely Run Thousands of Workloads on a Single Host (Diana Popa, Amazon) 2019-05-07 15:00: rust-vmm: Building the Virtualization Stack of the Future (Andreea Florescu, Amazon) 2019-05-22 15:15: Combining Formal Methods and Machine Learning (Professor Jane Hillston, University of Edinburgh) 2019-05-29 16:15: The Principle of Least Cognitive Action (Professor Marco Gori) 2019-06-12 16:15: Security and Privacy in a World of Safety: Analysing Avionic Data Links and NextGen ATC Networks (Professor Ivan Martinovic - Computer Science Department, University of Oxford) 2019-07-23 14:00: Deploying Differential Privacy for the 2020 Census of Population and Housing (Simson L. Garfinkel, Senior Computer Scientist for Confidentiality and Data Access, U.S. Census Bureau) 2019-09-12 14:00: An analysis of the threats of the consumer spyware industry (Diarmaid Harkin, Alfred Deakin Institute, Deakin University) 2019-10-01 11:05: An Overview of C++20 (Bjarne Stroustrup) 2019-10-15 14:00: Reducing Metadata Leakage from Encrypted Files and Communication (Nikitin Kirill, Decentralized/Distributed Systems Lab, EPFL) 2019-10-29 14:00: Automatically Dismantling Online Dating Fraud (Matthew Edwards, Faculty of Engineering, University of Bristol) 2019-10-30 15:05: StructureNet: Hierarchical Graph Networks for 3D Shape Generation (Professor Niloy Mitra - Professor of Geometry Processing in the Department of Computer Science, University College London (UCL)) 2019-11-06 15:05: Deep learning on graphs and manifolds: going beyond Euclidean data (Professor Michael Bronstein (Imperial College / Twitter)) 2019-11-11 13:00: Realistic Adversarial Machine Learning (Nicholas Carlini, Google Brain) 2019-11-13 15:05: The Digital Architecture of Future Cities (Dr Ian Lewis - Director, Infrastructure Investment - Computer Laboratory) 2019-11-19 14:00: Radio Protocol Vulnerabilities in 5G Networks (Ravishankar Borgaonkar, SINTEF Digital) 2019-11-20 15:05: Earphones: The Next Significant Platform after Smartphones (Romit Roy Choudhury (University of Illinois at Urbana Champaign)) 2020-01-21 14:00: It's Damn Hard to Decentralise the Web (Gareth Tyson, School of Electronic Engineering and Computer Science, Queen Mary University of London) 2020-01-22 15:05: Digital Modeling of Reality with Machine Learning (Dr Cengiz Oztireli, Graphics Lecturer, Department of Computer Science and Technology, University of Cambridge) 2020-01-28 14:00: Security economics to inform behaviour change support (Simon Parkin, Information Security Group, University College London) 2020-02-05 15:05: Machine Learning at the Extreme Edge - an Open Platform Approach (Prof. Dr. Luca Benini, ETH Zürich) 2020-02-12 15:05: Climate, Carbon, and Computer Science (Professor Keshav - Robert Sansom Professor, Department of Computer Science and Technology, University of Cambridge) 2020-02-17 13:00: On the Effectiveness of Generating Adversarial Examples for Evading Blackbox Malware Classifiers (Dr Sadia Afroz, ICSI, UC Berkeley, Avast) 2020-02-18 14:00: Measuring Cryptocurrency Fraud (Marie Vasek, Department of Computer Science, UCL) 2020-02-19 15:05: Soft Aerial Robotics for Digital Infrastructure Systems (Dr Mirko Kovac - Director, Aerial Robotics Laboratory, Imperial College) 2020-02-25 14:00: Product Design, Liability, and Insecurity Engineering (Marc Weber Tobias, School of Engineering, University of Pittsburgh) 2020-02-28 13:15: Software architectures for neural interfaces (Lucian Carata (University of Cambridge)) 2020-04-21 14:00: Trustable Hardware as a TOCTOU Problem: Overview and Potential Remedies (Dr. Andrew 'bunnie' Huang, Independent Researcher) 2020-04-28 14:00: SEAL: sealed-bid auction without auctioneers (Feng Hao, Department of Computer Science, University of Warwick) 2020-05-05 14:00: Tech Abuse in the Intimate Partner Violence Setting: Issues, Challenges, and Mitigations (Damon McCoy, New York University) 2020-05-12 14:00: The politics of data-driven governance (Lina Dencik, Data Justice Lab, Cardiff University) 2020-05-19 14:00: Understanding Privacy-Related Questions on Stack Overflow (Kami Vaniea, University of Edinburgh) 2020-05-20 14:00: Wheeler Lecture 2020: The Future of Microprocessors (Dr Sophie Wilson) 2020-05-26 14:00: Collaborative Deanonymization (Rainer Böhme, University of Innsbruck) 2020-06-02 14:00: TRRespass: Exploiting the Many Sides of Target Row Refresh (Kaveh Razavi, ETH Zurich) 2020-06-17 15:00: Addressing Imbalance in Object Detection (Dr Sinan Kalkan - Assoc. Prof Middle East Technical University and Visiting Researcher, Cambridge University) 2020-10-20 14:00: Sponge Examples: Energy-Latency Attacks on Neural Networks (Ilia Shumailov, University of Cambridge) 2020-10-23 16:00: Turning Up the Dial: the Evolution of a Cybercrime Market Through Set-up, Stable, and Covid-19 Eras (Anh V. Vu, University of Cambridge) 2020-10-27 14:00: Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble (Kit Murdock, University of Birmingham) 2020-10-28 15:00: Haar Graph Pooling (Dr Yu Guang Wang - University of New South Wales) 2020-11-03 14:00: Eavesdropping at Scale: Shifting the Threat Model in Satellite Broadband (James Pavur, University of Oxford) 2020-11-05 14:00: SHB Seminar (Multiple Speakers) 2020-11-10 13:00: Hardware and Software Fingerprinting of Mobile Devices (Jiexin (Stan) Zhang, University of Cambridge) 2020-11-17 14:00: Cultural Convergence in the time of COVID (Alicia Bargar and Erin McAweeney, Graphika) 2020-11-24 14:00: Alternative sanctions for juvenile criminal hackers: The evaluation of the Dutch “Hack_Right” intervention (Rutger Leukfeldt, NSCR) 2020-11-25 15:00: Graph Neural Networks for Biomedical Data (Marinka Zitnik, Harvard University) 2020-11-30 14:00: The Android Platform Security Model (and the security status of actual devices) (René Mayrhofer (Johannes Kepler University Linz)) 2020-12-01 13:00: User Privacy Concerns and Preferences in Smart Buildings (Maryam Mehrnezhad, Newcastle University) 2021-01-26 16:00: Towards Provable Physical Safety Against False Actuation Attacks in CPS (Alvaro Cardenas, University of California, Santa Cruz) 2021-01-27 15:00: Reconciling Temporalities in Relating Different Worlds (Professor Nicola Bidwell - International University of Management, Namibia) 2021-02-03 15:00: The Compelling World of Augmented Perception - A Perspective on Sensory Wearables (Dr Fahim Kawsar - Nokia Bell Labs) 2021-02-09 14:00: Cybersecurity Risk to Hospitals from Building Services (Sheryn Gillin, University of Cambridge) 2021-02-16 14:00: A Liar and a Copycat: Nonverbal Coordination Increases with Lie Difficulty (Sophie van der Zee, Erasmus University Rotterdam) 2021-02-17 15:00: Theoretical Foundations of Graph Neural Networks (Dr Petar Veličković - DeepMind) 2021-02-23 14:00: Dmitry goes to Hollywood: Criminal Excellence in (Cyber) La La Land (Luca Allodi, Eindhoven University of Technology) 2021-02-24 15:00: Data driven design for sustainable future cities: incorporating the intangible (Dr Ronita Bardhan - University Lecturer of Sustainability in Built Environment, Department of Architecture, University of Cambridge) 2021-03-02 14:00: Crowdsourcing Security Research: A case study of AdObserver (Laura Edelson and Damon McCoy, New York University) 2021-03-09 14:00: Deep Learning Assisted Side-Channel Attacks (Elena Dubrova, KTH Royal Institute of Technology) 2021-03-10 15:00: Modelling syntactico-semantic composition for natural language understanding and generation (Dr Weiwei Sun - Department of Computer Science and Technology, University of Cambridge) 2021-03-16 14:00: Understanding Modern Phishing (Brad Wardman and Adam Oest, PayPal) 2021-03-23 14:00: Dark web marketplaces and COVID-19: Flexible and resilient (Andrea Baronchelli, City University of London and The Alan Turing Institute) 2021-04-27 14:00: Mix-net cryptoeconomics: Rebooting privacy-preserving communications as incentive-driven collaborative projects (Aggelos Kiayias, University of Edinburgh) 2021-05-04 14:00: FastPay: High-Performance Byzantine Fault Tolerant Settlement (Alberto Sonnino, UCL) 2021-05-05 15:00: Programming languages for humans (Dr Jeremy Yallop - Department of Computer Science and Technology, University of Cambridge) 2021-05-12 15:30: Wheeler Lecture 2021: Reimagining Robots (Professor Daniela Rus - Director of the Computer Science and Artificial Intelligence Laboratory (CSAIL) at MIT) 2021-05-18 14:00: Apple, App Tracking Transparency, and the Hidden Costs of More Privacy (Sam Gilbert, University of Cambridge) 2021-05-26 15:00: Computation, Composition (Dr Jamie Vicary - Department of Computer Science and Technology, University of Cambridge) 2021-06-02 15:00: Morello - Arm's research prototype using Capabilities (Richard Grisenthwaite - SVP, Chief Architect & Fellow, Arm) 2021-06-09 15:00: The Statistical Finite Element Method (Professor Mark Girolami - Department of Engineering, University of Cambridge) 2021-06-16 15:00: A Retrospective on the 2014 NeurIPS Experiment (Professor Neil Lawrence - Department of Computer Science and Technology, University of Cambridge) 2021-07-20 14:00: It's not only the dark web: Distributed surface web marketplaces (Constantinos Patsakis, University of Piraeus) 2021-10-12 14:00: Super-Posters in Extremist Forums (Stephane Baele, University of Exeter ) 2021-10-20 15:05: CO2 Monitoring in the Department (Ian Lewis - Department of Computer Science and Technology, University of Cambridge) 2021-10-26 14:00: Resilient Machine Learning: A Systems-Security Perspective (Roei Schuster, Cornell Tech) 2021-10-27 15:05: Remote sensing and computer vision – just analysis of images from different sensors? (Professor Clement Atzberger - BOKU University, Austria & Mantle Labs Ltd., UK) 2021-11-01 14:00: Computational Methods to Measure and Mitigate Weaponized Online Information (Gianluca Stringhini, Boston University) 2021-11-03 15:05: Self-Organization of Lifelike Behaviors (Dr Jeremy England - Georgia Institute of Technology, School of Physics ) 2021-11-09 14:00: Blind Backdoors in Deep Learning (Eugene Bagdasaryan, Cornell Tech) 2021-11-16 14:00: Cybersecurity for Democracy: Providing Independent Auditing Frameworks for Platform Accountability (Damon McCoy, New York University) 2021-11-23 14:00: Teardown of encrypted USB Flash drives (Sergei Skorobogatov, University of Cambridge) 2021-11-30 14:00: Securing the Future: Futures Literacy in Cyber Security (Genevieve Liveley, University of Bristol) 2021-12-07 15:00: Why Johnny doesn’t write secure software? (Awais Rashid, University of Bristol) 2022-01-14 15:00: Hansa Market, Cyberbunker, and Encrochat: The Security Practices of Organized Crime (Erik van de Sandt, Dutch National Police and University of Bristol) 2022-01-18 14:00: Transcending Transcend: Revisiting Malware Classification with Conformal Evaluation (Federico Barbero, University of Cambridge) 2022-01-25 14:00: Incident Response as a Lawyers' Service (Daniel Woods, University of Innsbruck, Austria) 2022-01-26 15:05: The Quarks of Attention (Professor Pierre Baldi - Distinguished Professor, Department of Computer Science Director, Institute for Genomics and Bioinformatics Associate Director, Center for Machine Learning and Intelligent Systems, University of California, Irvine) 2022-02-02 15:05: Improving Quality of Experience for Video Users in Cellular Networks (Professor Cormac J. Sreenan - Professor of Computer Science at University College Cork) 2022-02-08 14:00: Trojan Source: Invisible Vulnerabilities (Nicholas Boucher, University of Cambridge) 2022-02-15 14:00: Machine Learning in context of Computer Security (Ilia Shumailov, University of Cambridge) 2022-02-23 15:05: AI x Mathematics (Dr Alex Davies - DeepMind and Dr Petar Veličković - DeepMind / University of Cambridge) 2022-03-02 15:05: Intelligent Systems of the People, by the People, for the People (Xiaofan (Fred) Jiang - Associate Professor of Electrical Engineering and Computer Engineering, Columbia University) 2022-03-08 10:00: Sex, money, and the mating market: How big data helps us understand sexual politics (Khandis Blake, University of Melbourne) 2022-03-09 15:05: Graph Neural Networks through the lens of algebraic topology, differential geometry, and PDEs (Professor Michael Bronstein - Department of Computer Science, University of Oxford) 2022-03-18 16:00: Design rules and Maxims for insecurity engineering for lock designs (Marc Weber Tobias, School of Engineering, University of Pittsburgh) 2022-03-22 14:00: Risk and Resilience: Promoting Adolescent Online Safety and Privacy through Human-Centered Computing (Pamela Wisniewski, University of Central Florida) 2022-04-26 14:00: Attacking and Fixing the Bitcoin Network (Muoi Tran, National University of Singapore) 2022-05-03 14:00: The gap between research and practice in authentication (Arvind Narayanan, Princeton University) 2022-05-04 15:05: Safe and accurate satellite navigation with non-Gaussian models (Dr Ian Sheret - Polymath Insight Limited) 2022-05-10 14:00: “You’re never left alone:” the use of digital technologies in domestic abuse (Lisa Sugiura, Jason R.C. Nurse, Jacki Tapley and Chloe Hawkins) 2022-05-17 14:00: VerLoc: Verifiable Localization in Decentralized Systems (Katharina Kohls, Radboud University) 2022-05-18 15:15: CANCELLED: Wheeler Lecture 2022 (David Silver, Principal Research Scientist at DeepMind) 2022-05-24 14:00: Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps (Kassem Fawaz, University of Wisconsin-Madison) 2022-05-25 15:05: AI Hardware and Real-World AI (Andrew Fitzgibbon - Distinguished Engineer, Graphcore) 2022-05-27 16:00: PostCog: A “Search Engine” Enabling Interdisciplinary Research into Underground Forums at Scale (Anh V. Vu, University of Cambridge) 2022-06-01 15:05: Balanced Allocations: The Power of Choice versus Noise (Dr Thomas Sauerwald - Department of Computer Science and Technology) 2022-06-07 14:00: Reward Sharing for Mixnets (Claudia Diaz, KU Leuven) 2022-06-08 15:05: Computational Inverse Design of Deployable Structures (Professor Mark Pauly - Geometric Computing Laboratory, EPFL Swiss Federal Institute of Technology, Lausanne) 2022-06-10 16:00: Exploring Internet services mis-configuration at scale (Danny Willems and Gregory Boddin, LeakIX; Raphael Proust, Nomadic Labs) 2022-06-14 14:00: No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis (Arwa Al Alsadi, Delft University of Technology) 2022-07-15 16:00: Mapping the Geography of Cybercrime - findings from an expert survey (Miranda Bruce, University of Oxford) 2022-08-19 16:00: Analog vs. Digital Epsilons: Implementation Considerations for Differential Privacy (Olya Ohrimenko, University of Melbourne) 2022-10-11 14:00: Generative Language Model, Deepfake, and Fake News 2.0: Scenarios and Implications (Dongwon Lee, Penn State University) 2022-10-12 15:05: Would you trust a cybercriminal? (Dr Alice Hutchings - Department of Computer Science and Technology) 2022-10-18 14:00: Technology-Facilitated Abuse: The Role of Tech in the Context of Intimate Partner Violence (Leonie Tanczer, University College London) 2022-10-19 15:05: Developing an artificial heart (Dr Mark Goldberg - Camp Lowell Cardiology) 2022-10-25 14:00: Secure and efficient networks (Oleh Stupak, University of Cambridge) 2022-11-09 15:05: CANCELLED: Turning the metaverse from myth to reality (Herman Narula - CEO of Improbable) 2022-11-11 16:00: Picking on locks: early security, cybersecurity, and the sophisticated criminal trope. (Yanna Papadodimitraki, University of Cambridge) 2022-11-15 14:00: Towards Meaningful Stochastic Defences in Machine Learning (Ilia Shumailov, University of Oxford) 2022-11-16 15:05: Financing Forests: A Credible Approach towards Halting Tropical Deforestation (Professor Anil Madhavapeddy - Department of Computer Science and Technology) 2022-11-22 14:00: Bad men, good men, and loving women: Gender Constructions in the UK’s Online Action Counters Terrorism (ACT) Campaign (Harmonie Toros, University of Kent) 2022-11-23 15:05: Formalised Mathematics: Obstacles and Achievements (Professor Lawrence Paulson - Department of Computer Science and Technology) 2022-11-29 14:00: The Security of Post-Quantum Telco Networks, or changing 10 billion door-locks in 197 countries (Zygmunt A Lozinski, IBM) 2022-11-30 15:30: Using Everyday Routines as a Resource for Understanding Behaviors and Making Recommendations (Professor Anind Dey - Dean and Professor of the Information School at the University of Washington) 2022-12-13 16:00: A Sociotechnical Audit: Assessing Police use of Facial Recognition (Evani Radiya-Dixit, Minderoo Centre for Tech & Democracy) 2023-01-31 16:00: Influence Policing: Mapping the Rise of Strategic Communications and Digital Behaviour Change within UK Law Enforcement and Security Services (Ben Collier, University Of Edinburgh) 2023-02-14 14:00: Binary Stars: How Crime Shapes Insurance and Insurance Shapes Crime (Anja Shortland, King's College London) 2023-02-15 16:00: Memorial Event for Alexander 'Sandy' Fraser (Various) 2023-02-21 14:00: No One to Blame, but... : Fear and Failure in Securing Large Organisations (Ahana Datta, University College London) 2023-02-22 15:05: Data Science and Machine Learning in Context (Dr. Alfred Z. Spector Visiting Scholar, MIT EECS) 2023-02-28 14:00: On the motivations and challenges of affiliates involved in cybercrime (Masarah Paquet-Clouston, Université de Montréal) 2023-03-01 15:05: Backdoors in Machine Learning Models (Dr Ilia Shumailov - Christ Church, University of Oxford) 2023-03-07 14:00: Algorithms and the criminal justice system: promises and challenges in deployment and research (Miri Zilka, University of Cambridge) 2023-03-15 15:05: TALK CANCELLED: Explicit Weakening (A Functional Pearl) (Professor Philip Wadler - Professor of Theoretical Computer Science, Laboratory for Foundations of Computer Science, School of Informatics, University of Edinburgh) 2023-05-03 15:05: From the GUI to ChatGPT: a historical sketch of HCI research agendas and their applicability today (Professor Richard Harper - Lancaster University) 2023-05-09 14:00: Testing the Effectiveness of Targeted Financial Sanctions on Russia: Law or War? (Jason Sharman, University of Cambridge) 2023-05-10 15:05: Learning the topology of complex systems from their dynamics (Professor Ginestra Bianconi - Queen Mary University of London) 2023-05-16 14:00: The INCEL Movement: A New Form of Technology-Facilitated Abuse (Melissa Hamilton, University of Surrey) 2023-05-24 15:05: Bayes in the age of intelligent machines (Professor Tom Griffiths - Princeton University) 2023-05-31 15:05: Privacy in mobility measurements (Professor Jörg Ott - Technische Universität München) 2023-06-06 14:00: The Nym mixnet: Design and Evaluation (Harry Halpin & Ania Piotrowska, Nym Technologies) 2023-06-20 14:00: The Unlearning Problem(s) (Anvith Thudi, University of Toronto) 2023-06-27 14:00: A View of the Dark Web through the Lens of NLP and Language Modeling (Youngjin Jin, Korea Advanced Institute of Science & Technology (KAIST)) 2023-07-21 16:00: EviHunter: Identifying Digital Forensic Artifacts from Android Apps/Devices via Static & Dynamic Analysis + Android™ App Forensic Artifacts Database (Yong Guan, Iowa State University) 2023-09-19 14:00: On the Insecurity of PLC Systems (Eli Biham, Technion) 2023-10-10 14:00: A Tale of Two Internet (In)Security Problems (Michael Schapira, Hebrew University of Jerusalem) 2023-10-11 15:05: How can we make trustworthy AI? (Professor Mateja Jamnik - Department of Computer Science and Technology, University of Cambridge) 2023-10-17 14:00: CIA to AIC: Why Cyber Must Enable the Business (Keith A Price, Chief Security Officer, National Highways) 2023-10-25 15:05: An invitation to univalent foundations of mathematics (Dr Jon Sterling - Department of Computer Science and Technology, University of Cambridge) 2023-10-31 14:00: Data, Identity and Governance: Evolution and Trajectory of Digital Public Infrastructure in India (Aakansha Natani, IIIT Hyderabad, India) 2023-11-01 15:05: Pathfinding for 10k agents (Dr Keisuke Okumura - Visiting scholar at the Department of Computer Science and Technology, University of Cambridge) 2023-11-08 15:05: Coherence Attacks and Defenses in 2.5D Integrated Systems (Professor Paul Gratz - Professor in the Department of Electrical and Computer Engineering, Texas A&M University. Visiting academic at the Department of Computer Science and Technology, University of Cambridge ) 2023-11-14 14:00: Red teaming privacy-preserving systems using AI (Yves-Alexandre de Montjoye, Imperial College London) 2023-11-15 15:00: Wheeler Lecture 2023: Beyond functional programming: a taste of Verse (Professor Simon Peyton Jones - Honorary Distinguished Fellow of the Department of Computer Science and Technology, University of Cambridge) 2023-11-22 15:05: Cross-lingual transfer learning with multilingual masked language models (Professor Mamoru Komachi - Research Professor, Tokyo Metropolitan University. Visiting academic at the Department of Computer Science and Technology, University of Cambridge) 2023-11-24 16:00: Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks (Pranav Dahiya, University of Cambridge) 2023-11-28 14:00: Human-producible Adversarial Examples (David Khachaturov, University of Cambridge) 2023-11-29 15:05: A brief introduction to causal inference (Dr Apinan Hasthanasombat - Visiting academic at the Department of Computer Science and Technology, University of Cambridge) 2023-11-30 16:00: 25 years of crypto wars and privacy tussles – where next? (Ross Anderson, Duncan Campbell, Ben Collier, Ahana Datta, Merlin Erroll, Gus Hosein, Julian Huppert, Jim Killock, Jen Persson, Sam Smith and Martyn Thomas) 2023-12-05 14:00: Securing Supply Chains with Compilers (Nicholas Boucher, University of Cambridge) 2023-12-18 14:00: Differential Privacy: Theory to Practice for the 2020 US Census (Simson Garfinkel) 2024-01-19 16:00: Two Sides of the Same Crime (Michael Dewar, Vice President for Data Science at Mastercard) 2024-01-23 14:00: A Comprehensive Study of the Extremist Narratives and the Role of Alternative Social Networks that Facilitate Radical Discourse (Antonis Papasavva, University College London) 2024-01-24 15:05: Quantum computing via the lens of additive combinatorics (Dr Tom Gur - Department of Computer Science and Technology, University of Cambridge) 2024-01-26 16:00: One Protocol to Rule Them All? On Securing Interoperable Messaging (Jenny Blessing (University of Cambridge)) 2024-02-06 14:00: Dead Code Removal at Meta: Automatically Deleting Millions of Lines of Code and Petabytes of Deprecated Data (Will Shackleton, Meta) 2024-02-07 15:05: The Compilation Game: Unifying AI, Hardware Design, Quantum, Climate Modelling, and Verification (Dr Tobias Grosser - Department of Computer Science and Technology, University of Cambridge) 2024-02-13 14:00: Securing the WebPKI in Practice: A tour of the technologies, politics and open problems (Dennis Jackson, Mozilla) 2024-02-14 15:05: Graph Neural Networks for skillful weather forecasting (Dr Ferran Alet - Research Scientist, Google DeepMind) 2024-02-20 14:00: Owl - an augmented password-authenticated key exchange protocol (Feng Hao, University of Warwick) 2024-02-21 15:05: Making Large Language Models Safe: A Case Study of Llama2 (Pushkar Mishra - Lead AI Research Engineer, Meta and Computer Science Part 1B Supervisor, University of Cambridge) 2024-02-28 15:05: A Data-Free, Universal Prior Distribution for Syntactic Structures (Dr Fermin Moscoso del Prado Martin - Department of Computer Science and Technology, University of Cambridge) 2024-02-29 14:00: Characterizing Machine Unlearning through Definitions and Implementations (Nicolas Papernot, University of Toronto and Vector Institute) 2024-03-05 14:00: How to Catch an AI Liar: Lie Detection in Black-Box LLMs by Asking Unrelated Questions (Lorenzo Pacchiardi, University of Cambridge) 2024-03-06 15:05: Distribution Shifts in Human-Centered Representation Learning (Dr Ali Etemad - Associate Professor at Queen’s University, Canada. Visiting academic at the Department of Computer Science and Technology, University of Cambridge) 2024-03-12 14:00: Mysticeti: Low-Latency DAG Consensus with Fast Commit Path (Alberto Sonnino, Mysten Labs) 2024-03-13 15:05: Private Data Analysis over Large Populations (Professor Graham Cormode - Research Scientist, Facebook and professor in the Department of Computer Science, University of Warwick) 2024-03-19 14:00: Data Poisoning and Fakes in Mobile, Web and Cyber Physical Systems (Soteris Demetriou, Imperial College London) 2024-04-02 14:00: Legal Concepts in Cybersecurity and Privacy for Digital & Smart Environments (Raj Sachdev, Cornell University & Plymouth State) 2024-04-23 14:00: Applications of proofs to network security (Joseph Bonneau, New York University) 2024-04-26 17:00: A biography of Tor - a cultural and technological history of power, privacy, and global politics at the internet's core (Ben Collier, University of Edinburgh) 2024-05-01 15:05: Exploring novel (bio)molecular spaces by design – a dialogue between representation and generation (Professor Bruno Correia - Laboratory of Protein Design and Immunoengineering, EPFL Swiss Federal Institute of Technology, Lausanne.) 2024-05-07 14:00: Automated detection of cryptocurrency investment scams at scale (Jose Gilberto Atondo Siu (University of Cambridge)) 2024-05-15 15:05: Iterative active learning for the rapid discovery of best-in-class multispecific antibody therapeutics (Dr Leonard Wossnig - CTO at LabGenius and Honorary Research Fellow in Computer Science at UCL) 2024-06-07 13:00: The end of world as we know it (Arturo Bejar) 2024-06-11 14:00: How Misinformation Creators (Ab)use Generative AI Tools (Amelia (Mia) Hassoun, University of Cambridge) 2024-06-21 14:00: New time for Security Group Friday meetings (Speaker to be confirmed) 2024-07-16 14:00: Data-Agnostic Model Poisoning to Manipulating Federated Learning (Kai (Lukas) Li, CISTER research centre, Portugal) 2024-09-20 14:00: Latency-aware routing in mix networks (Mahdi Rahimi, KU Leuven) 2024-10-08 14:00: The Curious Case of Big Phishes in The Netherlands (Hugo Bijmans, TNO & TU Delft) 2024-10-23 15:00: Wheeler Lecture 2024: Supercharging the Human Mind With AI (Professor Yvonne Rogers - Professor of Interaction Design, Director of UCL Interaction Centre, Deputy Head of the Computer Science Department UCL) 2024-10-29 14:00: Developing Technical Interventions for Technical Abuse (Kieron Ivy Turk, University of Cambridge) 2024-11-05 14:00: Decision-making in cybercriminal underground spaces. Where to go, and why? (Luca Allodi, Eindhoven University of Technology) 2024-11-06 15:05: Lean Learning: Applying Lean and Agile Techniques to Software Engineering Education (Dr Robert Chatley - Director, Software Engineering Practice and Director, DoC EdTech Lab, Imperial College London) 2024-11-08 14:00: Tracking the Takes and Trajectories of News Narratives from Trustworthy and Worrisome Websites (Hans Hanley, Stanford University) 2024-11-12 14:00: Federated Deep Learning for Intrusion Detection in Smart Critical Infrastructure (Segun Popoola, Anglia Ruskin University) 2024-11-13 15:05: Computing for Climate Science and Programming for the Planet (Dr Dominic Orchard - Department of Computer Science and Technology, University of Cambridge. Co-director of the Institute of Computing for Climate Science (ICCS)) 2024-11-15 14:00: Design and Verification of Byzantine Fault Tolerant CRDTs (Liangrun Da, Technical University of Munich) 2024-11-19 14:00: On the critical path to implant backdoors and the effectiveness of potential mitigation techniques: Learnings from XZ (Mario Lins, Johannes Kepler University Linz) 2024-11-20 15:05: Sensing human activities: from the lab to the home of the elderly (Professor Claudio Bettini - Department of Computer Science, University of Milan, Italy) 2024-11-22 14:00: Bluesky and the AT Protocol: Usable Decentralized Social Media (Martin Kleppmann (University of Cambridge)) 2024-11-26 14:00: Cyber security and privacy issues raised by mobile data extraction for evidential purposes.  (Anna-Maria Piskopani, Chris Hargreaves) 2024-11-27 15:05: The first AGI will be Federated (Professor Nic Lane - Department of Computer Science and Technology, University of Cambridge) 2024-12-03 14:00: Beyond Whack-A-Mole: Disrupting Online Crime and Harms through Law Enforcement and Industry Efforts (Anh V. Vu, University of Cambridge) 2024-12-06 14:00: Side-channel security requirements for electronic voting equipment (Markus Kuhn) 2024-12-13 14:00: A detailed analysis of how locks and physical security become vulnerable to attack (Marc Weber Tobias, Investigative Law Offices) 2025-01-29 15:05: Green Algorithms, Green DiSC and GREENER principles: making computational science more environmentally sustainable (Dr Loïc Lannelongue - Department of Public Health and Primary Care, University of Cambridge) 2025-01-31 14:00: Police responses to young people’s experiences of cyberstalking (Tahreem Tahir, University of Central Lancashire) 2025-02-04 14:00: Researchers‘ experiences with vulnerability disclosures (Yasemin Acar, Paderborn University) 2025-02-05 15:05: EU AI Act: A firsthand perspective (Dr Gabriele Mazzini - Research Affiliate, MIT Media Lab. Architect & lead author of the EU AI Act) 2025-02-11 14:00: Designing Counter Strategies against Online Harms (Stefanie Ullmann, University of Cambridge) 2025-02-12 15:05: Hardware Datapath: For Machine Learning and Beyond (Professor George A. Constantinides - Professor of Digital Computation, Department of Electrical and Electronic Engineering, Imperial College London) 2025-02-18 14:00: Physical-Layer Security of Satellite Communications Links (Simon Birnbach, University of Oxford) 2025-02-19 15:05: Probabilistic weather forecasting with machine learning (Dr Ilan Price - Senior Research Scientist, Google DeepMind) 2025-02-25 14:00: Downvoted to Oblivion: Censorship in Online, LGBTQ+ Communities (Kyle Beadle, UCL) 2025-02-26 15:05: Digital Money and Decentralised Finance (Professor Frank Stajano and Dr Ferdinando Samaria - Department of Computer Science and Technology, University of Cambridge.) 2025-02-28 14:00: Challenges and tensions around online safety, security and privacy (Dan Sexton, Internet Watch Foundation) 2025-03-04 14:00: Towards a Faster Finality Protocol for Ethereum (Luca Zanolini, Ethereum Foundation) 2025-03-05 15:05: Generative modelling for de novo design of therapeutics (Dr Joe Watson - Co-founder, Xaira Therapeutics and Dr Emile Mathieu) 2025-03-14 14:00: ‘To Report or Not to Report: is that the Question?’ Exploring Young People's Reporting Practices of Illicit Drug Ads on Social Media (Ashly Fuller, University College London) 2025-03-18 14:00: Fighting cancer and fake news: A battle against misinformation (Alice Hutchings (University of Cambridge)) 2025-03-19 14:05: Which Faculty Diversity Programs Work? Evidence from 600 U.S. Colleges and Universities (Professor Frank Dobbin - Henry Ford II Professor of the Social Sciences at Harvard) 2025-05-06 14:00: Kintsugi: A Decentralized E2EE Key Recovery Protocol (Emilie Ma) 2025-05-07 15:05: The TPTP World - Infrastructure for Automated Reasoning (Dr Geoff Sutcliffe - Department of Computer Science, University of Miami, USA) 2025-05-13 14:00: Harnessing the Power, Managing the Risk: The Future of AI, Data, and Cybersecurity (Evan Kotsovinos, Vice President Privacy, Safety, Security, Google) 2025-05-14 15:05: Type-driven Development with Idris 2 (Dr Edwin Brady - School of Computer Science, University of St Andrews) 2025-05-20 14:00: Two Tales of End-to-End Encryption (Sunoo Park, NYU) 2025-05-21 15:05: Recreating the Physical Natural World from Images (Dr Elliott Wu - Department of Engineering, University of Cambridge) 2025-05-27 14:00: 007: End-to-End Encrypted Audio Calls via Blind Audio Mixing (Emad Heydari Beni and Lode Hoste, Nokia Bell Labs) 2025-05-28 15:05: Hard and soft equivariance priors via Steerable CNNs (Dr Gabriele Cesa - Qualcomm AI Research, Amsterdam) 2025-06-03 14:00: Safer (cyber)spaces: Reconfiguring Digital Security Towards Solidarity (Dr Julia Slupska, Ofcom) 2025-06-17 14:00: Systems & Cryptography Research in Defense of Democracy (Michael A. Specter, Georgia Tech) 2025-07-15 14:00: "Please Verify": How Human Behavior Undermines Blockchain Security (Taro Tsuchiya, Carnegie Mellon University) 2025-08-04 13:00: Trio of talks: actionable security and privacy, security and privacy perceptions in South Asia, and reproductive security and privacy on TikTok in the post-Roe era (Anna Lena Rotthaler (Paderborn University), Deepthi Munagara (Paderborn University), and Rachel Rodriguez Gonzalez (Paderborn University and The George Washington University)) 2025-08-08 14:00: Modelling the language of extremist communities (Christine de Kock, University of Melbourne) 2025-10-21 14:00: Scalable and Verifiable Carbon Accounting in Supply Chains: Towards an Integrated Framework (Jonathan Heiss (TU Berlin)) 2025-10-22 15:00: Wheeler Lecture 2025: Efficiency, Resilience, and Artificial Intelligence (Professor Moshe Vardi - Rice University) 2025-10-29 15:05: Standing on the Shoulders of Giants (Dr Greg Lavender - Former CTO of Intel and VMware Trustee, American School of Classical Studies at Athens) 2025-10-31 14:00: Catch Me If You Scan: A Longitudinal Analysis of Stalkerware Evasion Tactics (Anahitha Vijay (University of Cambridge)) 2025-11-12 15:05: From research lab to newsroom: deploying secure whistleblower technology in practice (Dr Daniel Hugenroth and Professor Alastair Beresford - Department of Computer Science and Technology, University of Cambridge) 2025-11-18 14:00: Examining Shocks to Ransomware Groups: The Effects of Law Enforcement Interventions and Internal Disputes on Leak Site Uptime (Tom Meurs, Dutch Police) 2025-11-19 15:05: AI for Math: The Future of Collaborative Discovery (Professor Mateja Jamnik - Department of Computer Science and Technology, University of Cambridge.) 2025-11-26 15:05: Physical Inductive Biases for World Models (Dr Ayush Tewari - Department of Engineering, University of Cambridge) 2025-12-03 15:05: Resource estimation and optimization to accelerate progress towards quantum advantage (Dr Prakash Murali - Department of Computer Science and Technology, University of Cambridge) 2026-01-28 15:05: What is HoTT? (Professor Steve Awodey - Departments of Philosophy and Mathematics, Carnegie Mellon University ) 2026-02-04 15:05: 15 years of the CHERI Research Project: Reflections, Current Work, and Next Directions (Professor Robert N. M. Watson - Department of Computer Science and Technology, University of Cambridge) 2026-02-10 14:00: Abusability of Automation Apps in Intimate Partner Violence (Shirley Zhang, University of Wisconsin-Madison) 2026-02-11 15:05: A Gentle Introduction to Quantum Computational ElectroMagnetics (Professor Gabriele Gradoni - Institute for Communication Systems, University of Surrey) 2026-02-18 15:05: Geometric Gaussian Processes (Dr Viacheslav Borovitskiy - School of Informatics Institute for Adaptive and Neural Computation, University of Edinburgh ) 2026-02-24 14:00: Digital platforms and health disinformation (Marco Zenone, University of Ottawa) 2026-02-25 15:00: The Cybersecurity Awareness Experience: A Masterclass in Social Engineering, Behavioral Psychology, and Digital Self-Defense (Paul Draper) 2026-03-03 14:00: Self-Auditable Key Transparency at Scale (Hossein Hafezi, New York University (NYU)) 2026-03-04 15:05: Automated Translation of Real-World Codebases: How Far Are We? (Dr Cristina David - School of Computer Science, University of Bristol) 2026-04-14 14:00: The Epstein Files vs ExtremeBB (Lydia Wilson) 2026-04-21 14:00: Am I a Member? Auditing Private Machine Learning (Nicolas Papernot, University of Toronto) 2026-05-06 15:05: Title to be confirmed (Professor Tomas Petricek - Department of Distributed and Dependable Systems, Faculty of Mathematics and Physics, Charles University, Czech Republic) 2026-05-13 15:05: Title to be confirmed (Professor Simon Moore - Department of Computer Science and Technology, University of Cambridge) 2026-05-20 15:05: Title to be confirmed (Professor Tom Stafford - School of Psychology, Universitry of Sheffield) 2026-05-27 15:00: Title to be confirmed (Professor David Kotz - Department of Computer Science, Dartmouth College) 2026-06-03 15:05: Title to be confirmed (Dr Hana Aliee - Cancer Research UK, University of Cambridge)