Date: Monday, October 5, 2009 Time: 11:45am – 1:15pm Place: Maxwell Dworkin 2nd Floor Lounge Area
Speaker: Eran Tromer, MIT
Title: Side Channels and Vulnerabilities in Cloud Computing
Abstract: Today’s computers typically run numerous processes of varying sensitivity and trustworthiness. The platform purports to protect these from each other, but side channels arise from lower architectural layers (such as contention for shared hardware resources), and create...
Title: Spamalytics: Exploring the Technical and Economic Underpinnings of Bulk E-mail Scams
Abstract: When asked why he robbed banks, Willie Sutton famously responded, “Because that’s where the money is”. Today, the same sentiment is widely applied to the Internet as well. The tremendous growth of on-line commerce has made Internet users, their computers and their data a...
Title: Its The Hackers’ World, and We Just Live Here: The Pragmatics of Network Defense
Abstract: In 2002, several colleagues and I wanted to get a couple weeks of network traffic traces in order to study user behaviors in react to public holidays. That research effort led to the CENTAUR capability, used by the DoD to monitor its internal networks to this day.