Alumni

Thursday, October 24, 2019 8:30 am - Saturday, October 26, 2019 4:00 pm EDT (GMT -04:00)

11th Biennial Symposium on Information Integrity and Information Systems Assurance

The Centre for Information Integrity and Information Systems Assurance at the University of Waterloo (UW CISA) will be holding its 11th biennial symposium held in Toronto, Canada. Our symposia are recognized for the extensive interaction between practitioners and academics. Papers and panels from academe and practice will address risks, controls and assurance issues associated with the following topics:

Monday, May 13, 2019 2:30 pm - 2:30 pm EDT (GMT -04:00)

CrySP Speaker Series on Privacy: Sarah Roberts, UCLA

Doing the Internet's Dirty Work: Commercial Content Moderators as Social Media's Gatekeepers

Faced with mounting pressures and repeated, very public crises, social media firms have taken a new tack since 2017: to respond to criticism of all kinds and from numerous quarters (regulators, civil society advocates, journalists, academics and others) by acknowledging their long-obfuscated human gatekeeping workforce of commercial content moderators.

Nolen Scaife, PhD candidate
Florida Institute for Cybersecurity, University of Florida

Credit, debit, and prepaid cards have dominated the payment landscape for decades, empowering the economy. Unfortunately, these legacy systems were not designed for today's adversarial environment, and deployment of new technologies is slow, expensive, and difficult to adopt. 

Friday, November 2, 2018 2:30 pm - 2:30 pm EDT (GMT -04:00)

CrySP Speaker Series on Privacy - Fantastically Bad Laws and Where to Find Them

Nate Cardozo, Electronic Frontier Foundation

Encryption is legal in the Five Eyes countries, thanks to our victory in what’s come to be known as the Crypto Wars of the 1990s. Computer security research is increasingly viewed as a boon rather than a scourge. But time is a circle and once again, law enforcement and policy makers around the world are calling for all that to change. In this presentation, I will discuss in brief the history of the first Crypto Wars, and the state of the law in 2018.
Monday, October 22, 2018 2:00 pm - 2:00 pm EDT (GMT -04:00)

Anonymization with Differential Privacy / Secure Data Structures with Intel SGX

Text Anonymization with Differential Privacy

Ben Weggenmann, SAP Security Research 

Huge amounts of textual data are processed every day using text mining and information retrieval techniques to assist us with analyzing, organizing and retrieving text documents. In many cases, it is desirable that the authors of such documents remain anonymous: They can reveal sensitive information about its authors, and critical news articles or customer feedback could cause retaliation or worsening business relations.

Bringing together researchers from across Waterloo’s six faculties.

On Friday, September 27, Waterloo celebrated the launch of the Cybersecurity and Privacy Institute (CPI) with 100 attendees including security leaders from the private and public sectors. CPI was formed to uncover new approaches to security and privacy and educating Canada’s future leaders to be able to understand and respond to emerging online threats.

Aiman Erbad, Qatar University

With the rapid increase of threats on the Internet, people are continuously seeking privacy and anonymity. Services such as Bitcoin and Tor were introduced to provide anonymity for online transactions and Web browsing. Due to its pseudonymity model, Bitcoin lacks retroactive operational security, which means historical pieces of information could be used to identify a certain user.

Tuesday, July 31, 2018 11:00 am - 11:00 am EDT (GMT -04:00)

CrySP Speaker Series on Privacy - Finding Very Damaging Needles in Very Large Haystacks

Vern Paxson, University of California, Berkeley / Corelight, Inc. / International Computer Science Institute

Many of the most costly security compromises that enterprises suffer manifest as tiny trickles of behavior hidden within oceans of other site activity. This talk will examine the problem of developing robust detectors for particular forms of such activity. The process is in some ways a dual to that of adversaries who seek to design algorithms to identify users who employ particular approaches for keeping their network activity private.