Computer Security and Cryptography Seminar April 2002 Events
Date & Location |
Event |
Apr. 8, 2002
4 - 5 PM
2310 CS
|
CANCELLED
Vinod Ganapathy
<vg@cs.wisc.edu>
University of Wisconsin, Madison
Detecting Buffer Overflows in C Programs
|
Apr. 22, 2002
2 - 3 PM
1304 CS
|
Christian Collberg
<collberg@cs.arizona.edu>
University of Arizona, Tucson
Security Through Obscurity
In this talk I will discuss three types
of attack on the intellectual property
contained in software, and three
corresponding technical defenses. A
defense against malicious reverse
engineering is obfuscation, a process
that renders software unintelligible but
still functional. A defense against
software piracy is watermarking, a
process that makes it possible to
determine the origin of software. A
defense against tampering is
tamper-proofing, so that unauthorized
modifications to software (for example
to remove a watermark) will result in
non-functional code.
I will also discuss the design of
SandMark, our framework for studying the
obfuscation, watermarking, and
tamper-proofing of Java bytecode.
Slides: PDF (14.92 MB)
|
Apr. 29, 2002
1:30 - 2:30 PM
2310 CS
|
Vicki M. Bier
<bier@engr.wisc.edu>
University of Wisconsin, Madison
Interdependent Security: The Case of Identical Agents
I will present a game-theoretic model of
interdependent security developed by
Howard Kunreuther (Wharton School of
Management) and Geoff Heal (Columbia
University Business School). This model
has the feature that lack of investment
in security by some players can reduce
or eliminate the incentive for others to
invest, because they may still be
affected by "contamination" from
unprotected players even if they do
invest in security themselves. The
presentation will be informal, and my
purpose is as much to gain input from
computer scientists on the situations
where this type of model might be
applicable as to present the results of
the research. The papers on which my
presentation are based are available on
the web at http://www.ldeo.columbia.edu/CHRR/Roundtable/Kunreuther_white.pdf
and http://www.nber.org/~confer/2002/insw02/kunreuther.pdf
Slides: PPT (78.50 kB)
|
|
< Back to the Sec & Crypto seminar schedule
|