Florida State University Security Reading Group

Group Presentations

 

Linux as a Forensics Platform 

Jon Busey

May 7, 2003

Data Hiding and Recovery 

Jon Busey

April 26, 2003

Protocols for Protecting Mobile Agents

Anna Suen

April 9, 2003

Protocols for Protecting Mobile Agents

Anna Suen

April 7, 2003

Password Security   

Will Upchurch

April 7, 2003

Protocols for Protecting Mobile Agents

Anna Suen

March 24, 2003

Tools for Windows Forensics 

Jon Busey

March 26, 2003

Software Forensics

Yanet Manzano

March 26, 2003

Forensics and Active Protection

Yanet Manzano

March 24, 2003 

Protocols for Protecting Mobile Agents

Anna Suen

March 24, 2003

Protocols for Protecting Mobile Agents

Anna Suen

March 19, 2003

Tree-oriented Group Key Protocols   

Kristin Burke

March 17, 2003

Analyzing Wireless Protocols With CPAL-ES   

John Marshall

March 17, 2003

Intrusion Detection Lab Using SNORT   

Will Upchurch

March 12, 2003

Protecting Mobile Agents

Anna Suen

March 5, 2003

Secure Aggregation for Wireless Networks

Khandys Polite

March 3, 2003

Refining the Vigna Execution Tracing Protocol to Protect Mobile Agents

Anna Suen

February 24, 2003

Mobile Ad Hoc Networks and Secure Routing   

John Marshall

February 19, 2003

Mobile Ad Hoc Networks and Secure Routing   

John Marshall

February 13, 2003

IQNet

Yanet Manzano

February 24, 2003

Achieving Database Security Through Data Replication: The SINTRA Prototypes

Khandys Polite

February 19, 2003

Dynamic System Defense for Information Warfare

Yanet Manzano

February 5, 2003 

An Infrastructure for Secure Mobile Agents

Khandys Polite

January 27, 2003

Linux As a Forensics Plattform 

Jon Busey

January 24, 2003

Protecting Mobile Agents

Anna Suen

January 22, 2003

Group Key Distribution Using Mobility Vectors   

Kristin Burke

January 15, 2003

An Analysis of SRP for Mobile Ad Hoc Networks   

John Marshall

January 15, 2003

Quantum Cryptography

Kristin Burke

December 3, 2002

Public Key Protocols for Wireless Communications

Ilkay Cubukcu

December 3, 2002

Common Criteria

Yanet Manzano

December 3, 2002 

Securing Hosts in Mobile Agent Systems 

Will Upchurch

November 21, 2002

Common Criteria

Yanet Manzano

November 21, 2002 

Securing SSH (continued)

Khandys Polite

November 14, 2002

Secure Link State Routing

Karthik Narayan

November 12, 2002

Common Criteria

Yanet Manzano

November 12, 2002 

Secure File Deletion 

Jon Busey

November 7, 2002

Mobile Agents for Storage Jamming Protection 

Anna Suen

November 5, 2002

Using Broadcast Encryption

Karthik Narayan

October 29, 2002

Visual Cryptography in Light Waves

Kristin Burke

October 29, 2002

Mobile Agent Security

John Marshall

October 29, 2002 

Authentication in Ad hoc Wireless Networks

Vik Thakur

October 22, 2002

Securing SSH 

Khandys Polite

October 17, 2002

Detection Objects for Mobile Agents 

Anna Suen

October 17, 2002

Protocols  

Vik Thakur

October 17, 2002

IEEE 802.1x 

Ilkay Cubukcu

October 17, 2002

Broadcast Encryption, part II 

Ashutosh Chickerur

October 15, 2002

Common Criteria NSTISSP #11

Yanet Manzano

October 15, 2002 

Computational Sciences

Yanet Manzano

October 10, 2002 

Cryptographic Tracing

John Marshall

October 8, 2002 

Secure Position Aided Ad hoc Routing (part II)

Stephen Carter

October 8, 2002 

Common Criteria (part II)

Yanet Manzano

September 26, 2002 

Common Criteria (Part I)

Yanet Manzano

October 15, 2002 

Introduction to Broadcast Encryption 

Ashutosh Chickerur

September 10, 2002

Common Criteria (Introduction)

Yanet Manzano

September 10, 2002 

Common Criteria Overview

Yanet Manzano

September 5, 2002 

WAP and WTLS 

Ilkay Cubukcu

September 5, 2002

Defenses Against Storage Jamming 

Anna Suen

September 5, 2002

Visual Cryptography

Kristin Burke

September 24, 2002

Restricted Multicast Using Broadcast Encryption

Karthik Narayan

September 24, 2002

Secure Position Aided Ad hoc Routing (part I)

Stephen Carter

September 17, 2002 

Visual Cryptography

Kristin Burke

September 12, 2002

Storage Jamming 

Anna Suen

September 5, 2002

Data Hiding in Images 

Kristin Burke

September 5, 2002

Baysian Metrics for SEADS 

Tysen Leckie

September 3, 2002

Mobile Agents for ad hoc Network Security 

John Marshall

September 3, 2002

Common Criteria

Yanet Manzano

Aug 29, 2002

Jamming: Detecting Attacks on Databases 

Anna Suen

August 5, 2002

Security Aware Routing

Stephen Carter

May 20, 2002 

VMWare as a HoneyTrap

Yanet Manzano

April 10, 2002

Secure Remote Password Protocol

Ilkay Cubukcu

April 9, 2002

Profile Building

Tysen Leckie

April 9, 2002

Secure Routing Protocol for Manet

Stephen Carter

April 2, 2002 

Database Forensics

Anna Suen

April 2, 2002

Solaris Security Lab Sandbox and Tools

Jennifer Frazier 

March 26, 2002 

Bluetooth

Stephen Carter

March 19, 2002

Anomaly Detection

Tysen Leckie

March 6, 2002

Mobile Agent Security Issues

John Marshall

February 26, 2002

Anomaly Detection

Tysen Leckie

February 26, 2002

Multicast & 802.11 Issues

Stephen Carter

February 18, 2002

Forensics

Anna Suen

January 30, 2002

More on HoneyTraps

Yanet Manzano

January 18, 2002

NIDES IDS Metrics

Sonya Harley

February 5, 2002

The WEP Vulnerability (expanded)

Stephen Carter

February 5, 2002

Security Lab Environment and Tools

Jennifer Frazier

February 5, 2002

The WEP Vulnerability

Ilkay Cubukcu

January 29, 2002

HoneyTraps and Forensics

Yanet Manzano

January 29, 2002

EMERALD IDS Project

Tysen Leckie

January 29, 2002

Ad hoc Tactical Networks

Alec Yasinsac

January 24, 2002

Research Overview

Alec Yasinsac

January 16, 2002

STAT IDS Tool Kit

Sonya Harley

January 22, 2002

SEADS Monitor

Alex Melendez

CPAL Development Environment

Slide

March 22, 2000

LEX, YACC, and WINCVS

Michael Runy

Slides

March 1, 2000

Security Protocols

Justin Childs

Slides

February 23, 1999

Presenter: Yanet Manzano

Hacking, Learning to Prevent it by Knowing More About it

by Yanet Manzano

Slide Presentation

February 2, 2000

Research in Network Security

Dr. Alec Yasinsac

Slides

January 19, 2000

Cryptography and the Internet

Justin Childs

Referencd Publication: in Proceedings of CRYPTO '98, August 1998

Slide Show

Papers by Steve Bellovin

December 14, 1999

Presenter: Michael Runy

Syntax-Directed Editing

December 14, 1999

Presenter: Yanet Manzano

Steganalysis: The Investigation of Hidden InformationAnatomy of a Hack

by Neil F. Johnson and Sushil Jajodia

Slide Presentation

December 7, 1999

Presenter: Justin Childs

Weakest Precondition Reasoning

E. Dijkstra

Publication: A Discipline of Programming

Power Point Slides

Thesis Prospectus by Justin Childs

Presentation of Project by Michael Runy

November 30, 1999

Presenter: Michael Runy

CPAL, LEX, and YACC

November 30, 1999

Presenter: Yanet Manzano

Malicious Software and Hacking

Anatomy of a Hack

by David Ferbrache and Stuart Mort

Slide Presentation

November 18, 1999

Presenter: Justin Childs

Tales of the Inaugural CERIAS ColloqiumInvitation

Written summary

Presenter: Yanet Manzano

Network Forensics and Computer Monitoring

by Marcus J. Ranum

Slide Presentation

Presenter: Justin Childs

Prudent Engineering Practice for Cryptographic Protocols

M. Abadi & R Needham

Publication: SRC Research Reports

Power Point Slides

October 25, 1999

Presenter: Mike Runy

The Interrogator: Protocol Security Analysis

Jonathan K. Millen, Sidney C. Clark, and Sheryl B. Freedman

Publication: ?

Power Point Slide Presentation

October 25, 1999

Presenter: Yanet Manzano

American Criminal Law Review Summer 1999

*397 Computer Crimes

by Michael Hatcher, Jay MacDannell, Stacy Ostfield

Slide Presentation

October 7 & 14, 1999

Presenter: Justin Childs

The Use of Logic in the Analysis of Cryptographic Protocols

Paul Syverson

Publication: Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991, p. 156-170

Written Notes

A Critique of the BAN Logic - Notes

D. M. Nesset

Publication: Operating Systems Review, v. 20, n. 2, Apr 1990, pp 35-38

Notes in written format, to be translated shortly.

September 30, 1999

Presenter: Mike Runy

Authentication: A Practical Study in Belief and Action

by Michael Burrows, Martin Abadi, and Roger Needham

Publication: ?

Power Point Slide Presentation

September 24, 1999

Presenter: Yanet Manzano

Overview of Computer Forensic

by Judd Robbins

http://knock- knock.com/expert/forensic.htm

Slide Presentation

September 24, 1999

Presenter: Justin Childs

Using Encryption for Authentication in Large Networks of Computers

by Roger M. Needham, Michael D. Schroeder

Communications of the ACM December 1978 vol. 21 # 12

Power Point Slide Presentation

Authentication Revisited

by Roger M. Needham, Michael D. Schroeder

Publication: Operating Systems Review 21(1): 7 (1987)

September 17, 1999

Presenter: Mike Runy

Security Mechanisms in High-Level Network Protocols

Victor L. Voydock and Stephen T. Kent

Computing Surveys, Vol. 15, No. 2, June 1983

Power Point Slide Presentation

September 10, 1999

Presenter: Justin Childs

Netork Security: The Parts of the Sum

by Stephen T. Walker

Power Point Slide Presentation

Outline of Paper by Justin Childs