security /cybersecurity-privacy-institute/ en The Weaponization of Disinformation in Canada /cybersecurity-privacy-institute/events/weaponization-disinformation-canada <span class="field field--name-title field--type-string field--label-hidden">The Weaponization of Disinformation in Canada</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/cybersecurity-privacy-institute/users/hs2phull" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Harminder Phull</span></span> <span class="field field--name-created field--type-created field--label-hidden">Mon, 04/10/2023 - 14:27</span> <section class="uw-contained-width uw-section-spacing--default uw-section-separator--none uw-column-separator--none layout layout--uw-1-col"><div class="layout__region layout__region--first"> <div class="block block-uw-custom-blocks block-uw-cbl-image"> <div class="uw-image"> <figure class="uw-image__figure uw-image__full-width"><picture class="uw-picture"><!--[if IE 9]><video style="display: none;"><![endif]--><source srcset="/cybersecurity-privacy-institute/sites/default/files/styles/uw_is_media_x_large/public/uploads/images/misinformation_conference_apr2023_wcms-banner.png?itok=9YKUhmOo 1x" media="all and (min-width: 63.19em)" type="image/png"></source><source srcset="/cybersecurity-privacy-institute/sites/default/files/styles/uw_is_media_large/public/uploads/images/misinformation_conference_apr2023_wcms-banner.png?itok=lj74Ehz6 1x" media="all and (min-width: 49.81em)" type="image/png"></source><source srcset="/cybersecurity-privacy-institute/sites/default/files/styles/uw_is_media_medium/public/uploads/images/misinformation_conference_apr2023_wcms-banner.png?itok=0im3RZed 1x" media="all and (min-width: 30em)" type="image/png"></source><source srcset="/cybersecurity-privacy-institute/sites/default/files/styles/uw_is_media_small/public/uploads/images/misinformation_conference_apr2023_wcms-banner.png?itok=sm1vRlKE 1x" media="all and (min-width: 25em)" type="image/png"></source><source srcset="/cybersecurity-privacy-institute/sites/default/files/styles/uw_is_media_x_small/public/uploads/images/misinformation_conference_apr2023_wcms-banner.png?itok=Mjo339rn 1x" media="all and (min-width: 15em)" type="image/png"></source><source srcset="/cybersecurity-privacy-institute/sites/default/files/styles/uw_is_portrait/public/uploads/images/misinformation_conference_apr2023_wcms-banner.png?itok=lImR6Xi8 1x" media="all and (min-width: 1em)" type="image/png"></source><!--[if IE 9]></video><![endif]--><img class="uw-picture__fallback" src="/cybersecurity-privacy-institute/sites/default/files/styles/large/public/uploads/images/misinformation_conference_apr2023_wcms-banner.png?itok=KlHTXPzE" alt="The weaponization of misinformation in Canada conference image" /></picture></figure></div> </div> <div class="block block-layout-builder block-inline-blockuw-cbl-copy-text"> <h2>The Weaponization of Disinformation in Canada - April 27 - 28, 2023</h2> <div class="uw-copy-text"> <div class="uw-copy-text__wrapper "> <p>Digital disinformation presents a mounting threat to, and challenge for, liberal democracies. Global events like Brexit, electoral interference, Russia’s invasion of Ukraine, and the ongoing COVID-19 pandemic, have made the abstract threat of digital disinformation into a distinct reality. The shifting global balance of power, characterized by growing multipolarity, is unfolding alongside the expansion of tools, strategies, and spaces for adversarial states and non-state actors to expand their influence, disrupt multilateral diplomacy, threaten liberal democratic norms and values, and de-legitimize a rules-based global order. </p> <p>This interdisciplinary workshop will help to bring together awareness among the academic community, industry, civil society, and government, outlining and assessing the evolving threat of digital disinformation while also providing direction and guidance on how to protect liberal democracies like Canada from weaponized digital disinformation. </p> </div> </div> </div> </div> </section> Mon, 10 Apr 2023 18:27:04 +0000 Harminder Phull 275 at /cybersecurity-privacy-institute Seminar • Cryptography, Security, and Privacy (CrySP) — Securing Cloud-assisted Services /cybersecurity-privacy-institute/events/seminar-cryptography-security-and-privacy-crysp-securing <span class="field field--name-title field--type-string field--label-hidden">Seminar • Cryptography, Security, and Privacy (CrySP) — Securing Cloud-assisted Services</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/cybersecurity-privacy-institute/users/jszimans" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Jodi Szimanski</span></span> <span class="field field--name-created field--type-created field--label-hidden">Tue, 11/20/2018 - 13:14</span> <section class="uw-section-spacing--default uw-section-separator--none uw-column-separator--none layout layout--uw-1-col uw-contained-width"><div class="layout__region layout__region--first"> <div class="block block-layout-builder block-inline-blockuw-cbl-copy-text"> <div class="uw-copy-text"> <div class="uw-copy-text__wrapper "> <div class="field body field-label-hidden clearfix"> <div class="field-data "> <div class="field-item-switch"> <div class="field-item"> <p><strong>N. Asokan, Department of Computer Science</strong><br /><em>Aalto University, Finland</em></p> <p>All kinds of previously local services are being moved to cloud settings. While this is justified by the scalability and efficiency benefits of cloud-based services, it also raises new security and privacy challenges. Solving them by naive application of standard security/privacy techniques can conflict with other functional requirements. In this talk, I will outline some cloud-assisted services and the conflicts that arise while trying to secure these services.</p> <p>I will then take the case of cloud-assisted malware scanning as an example scenario to discuss the privacy concerns that arise. I will discuss possible solutions these concerns by casting them as an instance of the private membership test problem. I will briefly describe hardware-assisted trusted execution environments (TEEs) which are widely available now and describe a solution to private membership test using TEEs. In the process, I will also point out several other recent advances in using and building TEEs and my work in this area over the last decade and a half.</p> <p>Finally, I will discuss the more general setting of using cloud-hosted machine learning models in a privacy-preserving manner. I will describe MiniONN, a solution to transform any existing neural network into an oblivious variant. Oblivious neural networks (ONNs), hosted in a cloud server, can be used by clients without the server learning any information about the inputs clients send to the ONN or the results sent back to them. I will mention the pros and cons of this approach and briefly speculate on how hardware-assisted trusted execution may help address the cons.</p> <hr /><p><b>Bio</b>: N. Asokan is a professor of computer science at Aalto University in Finland where he co-leads the <a href="http://ssg.aalto.fi/">Secure Systems Group</a> and directs the <a href="https://haic.fi/">Helsinki-Aalto Center for Information Security HAIC</a>. He is a PI for the<a href="http://www.icri-cars.org/"> Intel Collaborative Research Center</a>. He is an IEEE Fellow (2017) and an ACM Distinguished Scientist (2015).</p> <p>Asokan was a staff member at UW (MFCF) in the 1990s and subsequently earned his doctorate in computer science from UW. Visit <a href="https://asokan.org/asokan/">his web page</a> or <a href="https://twitter.com/nasokan?lang=en">his Twitter profile</a> for more on his work.</p> </div> </div> </div> </div> </div> </div> </div> </div> </section> Tue, 20 Nov 2018 18:14:33 +0000 Jodi Szimanski 106 at /cybersecurity-privacy-institute CrySP Speaker Series on Privacy - Finding Very Damaging Needles in Very Large Haystacks /cybersecurity-privacy-institute/events/crysp-speaker-series-privacy-finding-very-damaging-needles <span class="field field--name-title field--type-string field--label-hidden">CrySP Speaker Series on Privacy - Finding Very Damaging Needles in Very Large Haystacks</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/cybersecurity-privacy-institute/users/jszimans" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Jodi Szimanski</span></span> <span class="field field--name-created field--type-created field--label-hidden">Mon, 07/16/2018 - 11:12</span> <section class="uw-section-spacing--default uw-section-separator--none uw-column-separator--none layout layout--uw-1-col uw-contained-width"><div class="layout__region layout__region--first"> <div class="block block-layout-builder block-inline-blockuw-cbl-copy-text"> <div class="uw-copy-text"> <div class="uw-copy-text__wrapper "> <h2>Vern Paxson, University of California, Berkeley / Corelight, Inc. / International Computer Science Institute</h2> <p>Many of the most costly security compromises that enterprises suffer manifest as tiny trickles of behavior hidden within oceans of other site activity. This talk will examine the problem of developing robust detectors for particular forms of such activity. The process is in some ways a dual to that of adversaries who seek to design algorithms to identify users who employ particular approaches for keeping their network activity private. The themes include research pitfalls, the crucial need to leverage domain knowledge in an apt fashion, and why machine learning is difficult to effectively apply to such problems.</p> <div> <h3>Bio</h3> <p>Vern Paxson is a Professor of EECS at UC Berkeley, and co-founder and Chief Scientist of Corelight, a company based on the network monitoring technology he has developed for many years. He also leads the Networking and Security Group at the International Computer Science Institute in Berkeley. His research focuses heavily on measurement-based analysis of network activity and Internet attacks. He works extensively on high performance network monitoring, detection algorithms, cybercrime, and countering censorship and abusive surveillance. He was inducted in 2006 as a Fellow of the ACM, and in 2011 he received ACM's SIGCOMM Award "for his seminal contributions to the fields of Internet measurement and Internet security, and for distinguished leadership and service to the Internet community." His measurement work has also been recognized by ACM's Grace Murray Hopper Award and by the 2015 IEEE Internet Award.</p> </div> </div> </div> </div> </div> </section> Mon, 16 Jul 2018 15:12:03 +0000 Jodi Szimanski 94 at /cybersecurity-privacy-institute