Guest Seminar Series
2019/20 Guest Seminar Series:
Title: Reframing Digital Security Inquiry: Unknotting Some of the Paradoxes of Digital Technology Use
Abstract: The use of digital technology is often described as paradoxical; for example, whilst there might be a desire for privacy, people routinely use digital technology to disclose personal information without privacy protection. This talk presents a creative security approach that is designed to critically examine lived experiences of digital technology and, in so doing, unknot technology practices that might seem paradoxical. The theoretical framing of this approach, together with their use, is explained through a presentation of a case study that examines the use of smart technology in the home.
Title: Anonymisation Debate with Prof. Mark Elliot
Title: Finding Bugs and Security Vulnerabilities with Dynamic Symbolic Execution
Abstract: Software systems are affected on a regular basis by bugs and security vulnerabilities. In this talk, I will present dynamic symbolic execution, a technique that can help detect many of these problems before they make it into production. Dynamic symbolic execution has already started to make a positive impact on the reliability and security of software, with several high-profile companies using it on a regular basis to analyse their software.
The talk will focus on recent advances and ongoing challenges in the area of dynamic symbolic execution, drawing upon our experience developing several symbolic execution tools for many different scenarios, such as high-coverage test input generation, bug detection, patch testing and bounded verification.
Title: Keeping Secrets Online:
Abstract: What strategies do people deploy in keeping secrets online? And how can these strategies be repurposed to (i) enhance the capacity of UK security agencies to detect & mitigate threats generated via online channels, and (ii) support those who keep secrets as parts of their jobs in countering UK & International security threats.
We reviewed over 7500 research papers, uncovering a range of strategies, barriers and enablers involved in keeping secrets online. Three example contexts were used: supply and purchase of illegal drugs, escaping from intimate partner violence, and infidelity. We then condensed our findings, producing a short graphic novel - the “Illustrated Guide to Keeping secrets Online” – for use with security and law enforcement stakeholders in a series of well-received interactive workshops.
This talk describes the approach taken, key findings, development of the Guide and subsequent impact workshops with stakeholders.
Title: Responses to Cyber-Enabled Scams and Fears of Cybercrime: Rethinking the Standard Models
Abstract: Government strategies have involved adapting counter-terrorism models to all serious and organised crime, including cyber-enabled crimes. Based on research over the last decade, the aim is to re-examine public policing and public-private partnership policing to consider what may be required to ‘satisfice’ victimisation, repeat victimisation, and fear of cyber scams.
Wednesday 29th April - Emily Overton (Records Management Girl Consultancy)
Wednesday 6th May - Delaram Kahrobaei (University of York)
Title: Post Quantum Algebraic Cryptography