Reading Group :: Pre-May 2009 Meeting Archive
The Computer Security Reading Group (CSRG) is an informal group of staff and PhD students, with the goal of broadening our knowledge and improving our understanding of computer security-related concepts and techniques. This page archives meetings prior to May 2009. Details on our current seminar series are also available.
2009 Spring Session
2008 Winter Session
| Date | Session chair | Title | |
| 10th Oct | Andy Brown | Specification-based Monitoring of Third-party Software on Mobile Devices | |
| 16th Oct | Myrto Arapinis | From one Session to many: Dynamic Tags for Security Protocols | |
| 17th Oct | Peng Ning | Security Research at NC State University | |
| 20th-22nd Oct ICICS'08, Hyatt Hotel, Birmingham | |||
|---|---|---|---|
| 23rd Oct | Mark Ryan | Attack and fix for the Trusted Platform Module Departmental Series (UG40) |
|
| 24th Oct | Joshua Guttman | Cryptographic Protocol Composition via the Authentication Tests Theory Seminar (UG40) |
|
| 24th Oct | Mark Ryan | Group discussion: Privacy - a compromise? Speakers: Tom Chothia, Joshua Guttman, Mark Ryan, Matt Smart |
|
| 31st Oct | Anongporn Salaiwarakul | Analysis of a Biometric Authentication Protocol for Signature Creation Application | |
| 6th Nov | Mounira Kourjieh | On the decidability of reachability problems for cryptographic protocols | |
| 14th Nov | Guilin Wang | One-Round ID-Based Blind Signature Scheme without ROS Assumption | |
| 3rd Dec | Toshiaki Tanaka | Guest speaker | |
2008 Summer Session
| Date | Session chair | Title | Materials |
| 4th Aug | Dr Bao Fang | Security can only be measured by attacks | Speaker profile Slides: pdf, ppt Photos |
2008 Spring Session
| Date | Session chair | Title | Materials |
| 18th Jan | Ben Smyth | Discussion about the new research group and its website | |
| 25th Jan | Whole group | Informal meeting | |
| 8th Feb | Derrick Newton | Applied fusion calculus - modelling communicating processes with dynamic global constraints | Abstract |
| 18th Feb | Ben Smyth | Formalising zero knowledge proofs in the applied pi calculus | |
| 25th Feb | Andrew Brown | Synthesising monitors from high-level policies for the safe execution of untrusted software | Abstract |
| 14th Mar | Horia Corclaciuc | Enforcing Security in Programming Languages using Separation Logic | Abstract |
| 28th Mar | Annie Salaiwarakul | Verification of integrity and secrecy properties of a biometric authentication protocol | Abstract |
2007 Winter Session
| Date | Session chair | Title | Materials |
| 22nd Oct | Mark Ryan | Verifying e-voting protocols in the applied pi calculus | Abstract, Slides |
| 29th Oct | Ben Smyth | Automatic verification of privacy properties in the applied pi calculus | Abstract, Slides |
| 5th Nov | Eike Ritter | Towards characterising observational equivalence in the Applied Pi-Calculus | Abstract, Slides |
| 12th Nov | Aybek Mukhamedov | Anonymity Protocol with Identity Escrow and Analysis in the Applied pi-calculus | Abstract, Slides |
| 15th Nov | Mark Ryan | Departmental seminar (Thursday, 16:00, UG40) Verifying security of electronic voting systems |
Abstract |
| 19th Nov | Eike Ritter | Towards characterising observational equivalence in the Applied Pi-Calculus (...continued from 05/11/2007) |
Abstract, Slides |
| 26th Nov | Guilin Wang | Nominative Signatures: Concepts, Applications, Attacks, and Constructions | Abstract, Slides |
| 6th Dec | Moritz Becker | Departmental seminar (Thursday, 16:00, UG40) Usable authorization policy languages and tools |
Abstract |
2007 Spring Session
| Date | Session chair | Title | Materials |
| 30th Jan | Mark Ryan | Breaking WEP: the attack by Stubblefield, Ioannidis, Rubin, Fluhrer, Mantin, and Shamir. | Notes |
| 6th Feb | Whole group | CSRG poster development session | Andy will provide materials and digital camera. Board photo available here. Draft poster available here. |
| 20th Feb | Derrick Newton | RBAC and beyond... | Slides |
| 27th Feb | Derrick Newton | RBAC and beyond... | Slides |
| 6th Mar | Matt Smart | Fair digital cash and revocable anonymity | Slides |
| 13th Mar | Horia Corcalciuc | Cryptography and its analysis | Abstract, Slides, Alph (source code and binaries) |
| 20th Mar | Hasan Qunoo | Generating verified access control policies through model-checking | Abstract, Slides, Slides (2-up) |
| 27th Mar | Ben Smyth | Protocol verification using the applied pi calculus | Objective: To introduce the applied pi calculus as a tool and demonstrate its practicality |
2006 Winter Session
| Date | Session chair | Title | Materials |
| 16th Oct | Ben Smyth | Direct anonymous attestation | IBM Research - DAA; Slides |
| 23rd Oct | Aybek Mukhamedov and Mark Ryan | Resolve impossibility for a contract signing protocol | Paper; Slides |
| 30th Oct | Stephanie Delaune | Security via constraint solving | Slides |
| 6th Nov | Annie Salaiwarakul | Verification of the security properties of a biometric authentication protocol | Slides |
| 13th Nov | Andy Brown | Controlling the execution of untrusted programs using high-level policies | Slides |
| 20th Nov | Eerke Boiten | A zero-knowledge interactive proof Note: 21st Nov at 16:00 in room 245 |
Abstract; Slides |
| 27th Nov | Adedayo Adetoye | Enforceable secure information flow policies | Abstract; Slides |
| 4th Dec | Tien Tuan Anh Dinh | Peer-to-peer security | Slides |