Marvins Underground Lectures
Welcome
Login / Register


Security Technologies


  • 26:49 DIGITAL AGE - How Ready Are We For A Cyber-War?- Adam Segal.  Feb. 28, 2010

    DIGITAL AGE - How Ready Are We For A Cyber-War?- Adam Segal. Feb. 28, 2010

    by Admin Added 49 Views / 0 Likes

    Chinese hackers recently attacked Google, but no one knows for sure who did it. Cyber- warfare represents a real threat to the Nations interests. What are the attackers motives? Must we heighten our state of readiness? National Security expert and China h

  • 1:14:42 Explore the Cyber Threat Evolution

    Explore the Cyber Threat Evolution

    by Admin Added 42 Views / 0 Likes

    Solera Networks Luncheon Event with General Michael V. Hayden

  • 36:11 The Page-Fault Weird Machine: Lessons in Instruction-less Computation

    The Page-Fault Weird Machine: Lessons in Instruction-less Computation

    by Admin Added 49 Views / 0 Likes

    Julian Bangert, Sergey Bratus, Rebecca Shapiro, and Sean W. Smith, Dartmouth CollegePresented at the 7th USENIX Workshop on Offensive Technologies (WOOT '13)Trust Analysis, i.e. determining that a system will not execute some class of computations, typica

  • 26:03 "Weird Machines" in ELF: A Spotlight on the Underappreciated Metadata

    "Weird Machines" in ELF: A Spotlight on the Underappreciated Metadata

    by Admin Added 39 Views / 0 Likes

    Rebecca Shapiro, Sergey Bratus, and Sean W. Smith, Dartmouth CollegePresented at the 7th USENIX Workshop on Offensive Technologies (WOOT '13)Although software exploitation historically started as an exercise in coaxing the target's execution into attacker

  • 21:35 Capability Exchange: Improving Access Control Usability in Health IT

    Capability Exchange: Improving Access Control Usability in Health IT

    by Admin Added 46 Views / 0 Likes

    Chen Qin, Emily Freebairn, and Sean Smith, Dartmouth CollegePresented at the 2013 USENIX Workshop on Health Information TechnologiesClinicians report usability problems in modern health IT systems in part because the strictness of computerization eliminat

  • 25:55 Electronic Prescription for Controlled Substances: A Cybersecurity Perspective

    Electronic Prescription for Controlled Substances: A Cybersecurity Perspective

    by Admin Added 52 Views / 0 Likes

    Samuel Tan, Rebecca Shapiro, and Sean W. Smith, Dartmouth CollegePresented at the 2013 USENIX Workshop on Health Information TechnologiesThe Electronic Prescription for Controlled Substances (EPCS) is a set of rules published by the Drug Enforcement Admin

  • 48:12 SITH3 - Keynote Patty Mechael

    SITH3 - Keynote Patty Mechael

    by Admin Added 39 Views / 0 Likes

    Securing IT in Healthcare: Part IIIKEYNOTE- May 16, 2013Patricia MechaelPatty MechaelDr. Patricia Mechael is the Executive Director of the mHealth Alliance, which is hosted by the United Nations Foundation. Patty has been actively involved in global healt

  • 53:33 SITH3 - Keynote Wendy Nilsen

    SITH3 - Keynote Wendy Nilsen

    by Admin Added 43 Views / 0 Likes

    Securing IT in Healthcare: Part IIIKEYNOTE- May 17, 2013Wendy NilsenWendy Nilsen, Ph.D. is a Health Scientist Administrator at the NIH Office of Behavioral and Social Sciences Research (OBSSR). Wendy's scientific focus is on the science of human behavior

  • 1:20:17 SITH3 - Panel 1: Intersection of mHealth and Behavioral Health

    SITH3 - Panel 1: Intersection of mHealth and Behavioral Health

    by Admin Added 43 Views / 0 Likes

    Securing IT in Healthcare: Part IIIMay 17, 2013Panel 1: Intersection of mHealth and Behavioral HealthPanel AbstractThis panel discussed the potential for mHealth in an evolving healthcare context in the U.S., with a particular focus on the role that mHeal

  • 1:25:44 SITH3 - Panel 2: Evolving Business Models in mHealth

    SITH3 - Panel 2: Evolving Business Models in mHealth

    by Admin Added 44 Views / 0 Likes

    Securing IT in Healthcare: Part IIIMay 17, 2013Panel 2: Evolving Business Models in mHealthPanel AbstractHow are device manufacturers, new service providers, and existing EHR players building business models for mHealth? What are the opportunities for hom

  • 1:27:33 SITH3 - Panel 3: Opportunities for mHealth in the Developing World

    SITH3 - Panel 3: Opportunities for mHealth in the Developing World

    by Admin Added 49 Views / 0 Likes

    Securing IT in Healthcare: Part IIIMay 17, 2013Panel 3: Opportunities for mHealth in the Developing WorldPanel AbstractMobile technology provides tremendous opportunities to make health and wellness more accessible to billions of people in developing coun

  • 1:24:05 SITH3 - Panel 4: Challenges in Securing mHealth Infrastructure

    SITH3 - Panel 4: Challenges in Securing mHealth Infrastructure

    by Admin Added 45 Views / 0 Likes

    Securing IT in Healthcare: Part IIIMay 17, 2013Panel 4: Challenges in Securing mHealth InfrastructurePanel AbstractWhen developing mobile health technology, who is the adversary? What are the most important concerns in developing mHealth technology that c

  • 1:05:45 C10M: Defending the Internet at scale by Robert David Graham

    C10M: Defending the Internet at scale by Robert David Graham

    by Admin Added 46 Views / 0 Likes

    C10M: Defending the Internet at scale. At talk given at Dartmouth College by Robert David Graham. March 4, 2013

  • 57:49 Cryptography is a systems problem (or) 'Should we deploy TLS'

    Cryptography is a systems problem (or) 'Should we deploy TLS'

    by Admin Added 36 Views / 0 Likes

    Cryptography is a systems problem (or) 'Should we deploy TLS'Given by Matthew Green, Johns Hopkins University

  • 1:13:47 Maintaining Grid Resilience with the Adoption of Smart Grid Technologies

    Maintaining Grid Resilience with the Adoption of Smart Grid Technologies

    by Admin Added 54 Views / 0 Likes

    A talk given at Dartmouth College by Jeff Dagle of Pacific Northwest National Laboratory Wednesday January 23, 2013Co-sponsored by the Institute for Security, Technology, and Society and the CS ColloquiumAbstract:The interconnected electric power grid was

  • 59:36 Sam Gustman - "Cloud Archives" at the University of Southern California

    Sam Gustman - "Cloud Archives" at the University of Southern California

    by Admin Added 36 Views / 0 Likes

    "Cloud Archives" at the University of Southern California: The USC Shoah Foundation and the USC Digital Repository.Friday, October 26, 2012 at 4:00pmThe Loew Auditorium - Black Family Visual Arts CenterSam GustmanCTO Shoah FoundationAssociate Dean, Univer

  • 1:29:27 Christena Nippert-Eng  "Privacy:  how we do it and when it matters most"

    Christena Nippert-Eng "Privacy: how we do it and when it matters most"

    by Admin Added 50 Views / 0 Likes

    How do we think about privacy? How do we actually do it? What, exactly, is the anatomy of a privacy violation and how does technology give us a useful entry point to understanding when privacy really matters? Dr. Nippert-Eng will address these issues and

  • 1:03:05 Mobile Measurement of Behavioral and Social Health at Population Scale

    Mobile Measurement of Behavioral and Social Health at Population Scale

    by Admin Added 61 Views / 0 Likes

    Given by Santosh Kumar, University of MemphisCo-Sponsored by ISTS, the CS Colloquium, and the Psychiatric Research Center's (PRC) Center for Technology and Behavioral Health (CTBH)Wednesday May 23, 2012 Dartmouth College

  • 1:19:31 Gary McGraw: Cyber War, Cyber Peace, Stones, and Glass Houses

    Gary McGraw: Cyber War, Cyber Peace, Stones, and Glass Houses

    by Admin Added 50 Views / 0 Likes

    Co-sponsored by ISTS and the Dickey Center at Dartmouth CollegeWashington has become transfixed by cyber security and with good reason. Cyber threats cost Americans billions of dollars each year and put U.S. troops at risk. Yet, too much of the discussion

  • 1:06:45 Real-Time Crowd Support for People with Disabilities - Jeffrey Bigham

    Real-Time Crowd Support for People with Disabilities - Jeffrey Bigham

    by Admin Added 46 Views / 0 Likes

    Real-Time Crowd Support for People with DisabilitiesTuesday, November 15, 2011Jeffrey BighamUniversity of RochesterCo-sponsored by the CS Colloquium and ISTS AbstractJeffrey BighamUniversity of Rochester The past few decades have seen the development of w

  • 49:10 Exploiting the hard-working DWARF

    Exploiting the hard-working DWARF

    by Admin Added 55 Views / 0 Likes

    Speakers: James Oakley and Sergey BratusDate: January 29, 2011Event: Shmoocon 2011, hacker/infosec conference in Washington, DC,keynoted this year by Peiter 'Mudge' Zatko, a senior DARPAproject manager.Sponsors: Many software and security companies such a

  • 1:00:23 Adventures in SCADA

    Adventures in SCADA

    by Admin Added 37 Views / 0 Likes

    Speakers: Sergey Bratus (Dartmouth College) and Edmond Rogers (University of Illinois at Urbana-Champaign). Both are associated with the Trustworthy Cyber Infrastructure for the Power Grid (TCIP-G, http://tcipg.org) project.Date: April 30, 2011Event: TROO

  • 1:28:16 Cyber Operations and National Security: A Panel Discussion

    Cyber Operations and National Security: A Panel Discussion

    by Admin Added 37 Views / 0 Likes

    Cyber Operations and National SecurityThursday, October 20th at 4:30pmRockefeller 002 Operation Shady RAT. Stuxnet. Conficker. International and National Strategies for Cybersecurity. Cyber Czars and Cyber Commands. Digital Pearl Harbors and Cyber Maginot

  • 1:19:18 Providing Security with Insecure Systems

    Providing Security with Insecure Systems

    by Admin Added 32 Views / 0 Likes

    Presented by Professor Andrew OdlyzkoSchool of Mathematics, University of MinnesotaWednesday, April 13, 2011, Dartmouth CollegeCo-sponsored by ISTS and the Computer Science Department

Categories