enigma 2017 Jan. 30, 2017 to Jan. 1, 2017, california,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Human Computation with an Application to Passwords Manuel Blum Never memorize passwords. Compute them in your head instead, using secure humanly computable functions from ...
Moving Account Recovery Beyond Email and the "Secret" Question Brad Hill Managing a lost password or other credential is a problem every application must contend with, ...
Secrets at Scale: Automated Bootstrapping of Secrets & Identity in the Cloud Ian Haken Almost any web service needs secrets to operate. Whether it’s encryption keys for storing credit ...
Inside "MOAR TLS:" How We Think about Encouraging External HTTPS Adoption on the Web Emily Schechter HTTPS has been around for over 20 years, but adoption has only slowly increased recently. ...
Ghost in the Machine: Challenges in Embedded Binary Security Jos Wetzels Embedded systems are everywhere, from consumer electronics to critical infrastructure, vehicles, airplanes and military equipment. ...
LLC Cache Attacks: Applicability and Countermeasures Gorka Irazoqui Cache attacks have been demonstrated to be a big concern for security code designers by ...
IoT, a Cybercriminal’s Paradise Attila Marosi Over 90% of the unprotected devices were found to be infected with at least one ...
Hacking Sensors Yongdae Kim Sensors are designed to measure sensor inputs (e.g., physical quantities) and transfer sensor outputs (e.g. ...
Test Driven Security in Continuous Integration Julien Vehent Mozilla runs services for millions of Firefox users that must be operated at reasonable cost ...
Leveraging the Power of Automated Reasoning in Security Analysis of Web Applications and Beyond Nestan Tsiskaridze The modern world critically depends on the security and safety of software. We seek to ...
As We May Code David Molnar Advances in automatic reasoning, combined with the shift to cloud services, have changed the software ...
Startups + Industry: How Everyone Can Win Hudson Thrift Companies need better, not more, security products. The usual choices when looking for a new ...
Behaviors and Patterns of Bulletproof and Anonymous Hosting Providers Dhia Mahjoub Bulletproof and anonymous hosting providers are key enabling factors of ransomware, phishing, and other cybercrime ...
StreamAlert: A Serverless, Real-time Intrusion Detection Engine Jack Naglieri StreamAlert is a serverless, real-time intrusion detection engine. By building upon technologies such as AWS ...
Neural and Behavioral Insights on Trust Uma R. Karmarkar Trust is a psychological factor that can gate channels of communication, persuasion, and collaboration. Here, ...
What Does the Brain Tell Us about Usable Security? Anthony Vance A popular saying in information security is, “Given a choice between dancing pigs and security, ...
Brains Can be Hacked. Why Should You Care? Tamara Bonaci What happens if a surgical robot, used to perform a life-saving medical procedure, gets compromised ...
Security in the Wild for Low-Profile Activists Zeynep Tufekci Why are many activists more worried about what their mom knows then being tortured? And ...
Won't Somebody Please Think of the Journalists? Tom Lowenthal When researching security/privacy and developing tools, it is tempting to focus on the abstract technical ...
Why Philanthropy is Critical for Cybersecurity Eli Sugarman Philanthropy has a critical role to play in improving cybersecurity worldwide. As new technologies affect ...
Security for Vulnerable Populations—On the Interplay of Weapons of Influence and Life Domains in Predicting Older Adults Susceptibility to Spear-Phishing Emails Daniela Oliveira Older adults constitute a vulnerable population for online social engineering attacks because of their cognition ...
Beyond Warm & Fuzzy: Ethics as a Value Prop Erin Kenneally Industry is grappling, arguably unsuccessfully, with core sociotechnical tensions between individual and collective rights and ...
Legislative Engineering: Design Privacy Laws, Don't Just Draft Them Chris Conley Law is code, but too much of it is bad code. And just like bad ...
A Decade of Online Elections with Helios Ben Adida Helios Voting is the first and the only publicly available online voting system with end-to-end ...
President Trump and the Intelligence Community Susan Hennessey Susan Hennessey is Fellow in National Security in Governance Studies at the Brookings Institution. She ...
How WhatsApp Reduced Spam While Launching End-to-End Encryption Matt Jones End-to-end encryption, which protects message content so that only the sender and recipient can access ...
Drawing the Foul: Operation of a DDoS Honeypot Damian Menscher Botnet growth allows DDoS attacks to outpace Moore's Law, and novel attack styles create additional ...
Putting Privacy Notices to the Test Lorrie Faith Cranor We all know that hardly anybody ever reads privacy notices or security warnings, and when ...
Understanding and Designing for End Users' Security Expectations Franziska Roesner As technology designers, we must do two things to build systems that are both usable ...
Privacy and Security Practices of Individuals Coping with Intimate Partner Abuse Sunny Consolvo This talk will present results of a qualitative study of the digital privacy and security ...
Deviation from the Norms: The Necessity and Challenges of a Norms-based Approach to Digital Offense Andrea Little Limbago One of the few areas in which the tech and policy communities generally agree is ...
FeatureSmith: Learning to Detect Malware by Mining the Security Literature Tudor Dumitras Companies facing rampant attacks and data breaches have started turning to artificial intelligence techniques, such ...
Classifiers Under Attack David Evans Machine learning classifiers are widely used in security applications, and often achieve outstanding performance in ...
Adversarial Examples in Machine Learning Nicolas Papernot Machine learning models, including deep neural networks, were shown to be vulnerable to adversarial examples—subtly ...
National Scale Cyber Security Ian Levy In October 2016, the UK National Cyber Security Centre was formally launched, charged with better ...
The Defense Innovation Unit Experimental (DIUx) Vishaal Hariprasad The Defense Innovation Unit Experimental (DIUx) serves as a bridge between DoD customers (the Services ...