Future students

Nolen Scaife, PhD candidate
Florida Institute for Cybersecurity, University of Florida

Credit, debit, and prepaid cards have dominated the payment landscape for decades, empowering the economy. Unfortunately, these legacy systems were not designed for today's adversarial environment, and deployment of new technologies is slow, expensive, and difficult to adopt. 

Computer scientists at the David R. Cheriton School of Computer Science have found a novel method to help travellers protect sensitive information from border control agents.

The system is being developed into an app called “Shatter Secrets” by Erinn Atwater, who is the research director of the not-for-profit Open Privacy, an organization dedicated to understanding, researching and serving the privacy needs of marginalized and highly targeted at-risk communities. 

Friday, November 2, 2018 2:30 pm - 2:30 pm EDT (GMT -04:00)

CrySP Speaker Series on Privacy - Fantastically Bad Laws and Where to Find Them

Nate Cardozo, Electronic Frontier Foundation

Encryption is legal in the Five Eyes countries, thanks to our victory in what’s come to be known as the Crypto Wars of the 1990s. Computer security research is increasingly viewed as a boon rather than a scourge. But time is a circle and once again, law enforcement and policy makers around the world are calling for all that to change. In this presentation, I will discuss in brief the history of the first Crypto Wars, and the state of the law in 2018.
Monday, October 22, 2018 2:00 pm - 2:00 pm EDT (GMT -04:00)

Anonymization with Differential Privacy / Secure Data Structures with Intel SGX

Text Anonymization with Differential Privacy

Ben Weggenmann, SAP Security Research 

Huge amounts of textual data are processed every day using text mining and information retrieval techniques to assist us with analyzing, organizing and retrieving text documents. In many cases, it is desirable that the authors of such documents remain anonymous: They can reveal sensitive information about its authors, and critical news articles or customer feedback could cause retaliation or worsening business relations.

Bringing together researchers from across Waterloo’s six faculties.

On Friday, September 27, Waterloo celebrated the launch of the Cybersecurity and Privacy Institute (CPI) with 100 attendees including security leaders from the private and public sectors. CPI was formed to uncover new approaches to security and privacy and educating Canada’s future leaders to be able to understand and respond to emerging online threats.

Tuesday, September 25, 2018 3:00 pm - 3:00 pm EDT (GMT -04:00)

Evaluating the Australian Government’s Legislative Response to the Encryption Debate

Adam Molnar, Deakin University

Abstract

The Australian Government released a proposed draft of legislation that would expand national security and law enforcement agencies’ access to encrypted communications on August 15, 2018. The draft, entitled the ‘Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018’ follows after several months of consultations.