UW Comp Sci Header
Useful InformationUW CS PeopleUW CS Graduate ProgramUW CS Undergraduate ProgramResearch at UW CSUseful Resources

Computer Security and Cryptography
Seminar
April 2002 Events

Date &
Location
Event
Apr. 8, 2002
4 - 5 PM
2310 CS

CANCELLED

Vinod Ganapathy <vg@cs.wisc.edu>
University of Wisconsin, Madison

Detecting Buffer Overflows in C Programs
Apr. 22, 2002
2 - 3 PM
1304 CS
Christian Collberg <collberg@cs.arizona.edu>
University of Arizona, Tucson

Security Through Obscurity

In this talk I will discuss three types of attack on the intellectual property contained in software, and three corresponding technical defenses. A defense against malicious reverse engineering is obfuscation, a process that renders software unintelligible but still functional. A defense against software piracy is watermarking, a process that makes it possible to determine the origin of software. A defense against tampering is tamper-proofing, so that unauthorized modifications to software (for example to remove a watermark) will result in non-functional code.

I will also discuss the design of SandMark, our framework for studying the obfuscation, watermarking, and tamper-proofing of Java bytecode.

Slides: PDF (14.92 MB)
Apr. 29, 2002
1:30 - 2:30 PM
2310 CS
Vicki M. Bier <bier@engr.wisc.edu>
University of Wisconsin, Madison

Interdependent Security: The Case of Identical Agents

I will present a game-theoretic model of interdependent security developed by Howard Kunreuther (Wharton School of Management) and Geoff Heal (Columbia University Business School). This model has the feature that lack of investment in security by some players can reduce or eliminate the incentive for others to invest, because they may still be affected by "contamination" from unprotected players even if they do invest in security themselves. The presentation will be informal, and my purpose is as much to gain input from computer scientists on the situations where this type of model might be applicable as to present the results of the research. The papers on which my presentation are based are available on the web at http://www.ldeo.columbia.edu/CHRR/Roundtable/Kunreuther_white.pdf and http://www.nber.org/~confer/2002/insw02/kunreuther.pdf

Slides: PPT (78.50 kB)

< Back to the Sec & Crypto seminar schedule

Computer Sciences Department, University of Wisconsin - Madison
5355a Computer Sciences and Statistics | 1210 West Dayton Street, Madison, WI 53706
cs@cs.wisc.edu / voice: 608-262-1204 / fax: 608-262-9777