fbpx
Loading Events

Past Events

Events Search and Views Navigation

Event Views Navigation

July 2019

Advanced Research Workshop on System Security & Privacy

July 6, 2019

In an untrusted computing environment, assurance of computing systems plays a vital role. Assurance is evidence that a computer system is secure, i.e., obeys its security specification, usually called a security policy. To assure the security of a system, it is important that all of its Trusted Computing Base (TCB) components work as mandated/specified. From the plethora of computing systems for which assurance is in demand, Operating Systems are a special class of systems for which security is vital as…

Find out more »

August 2019

Programmable Hardware Monitors for Software Security

August 9, 2019 @ 10:30 - 11:30 IST

Speaker: Prof. Ajay Joshi Time: Friday, 09 August 2019, 10:30am Venue: Conference Room, 01st Floor, KRESIT, IIT Bombay Abstract: Today, all computing systems, from Internet-of-Things (IoT)-embedded devices to large-scale distributed cloud servers remain vulnerable to exploitation. To reduce the overhead of software-level security solutions against various exploitations, recently, leading processor companies have introduced several hardware-level security extensions. Unfortunately, implementing new security extensions in processors is a lengthy and costly process. To overcome the shortcomings of this process, researchers endeavor to use…

Find out more »

November 2019

A Short course on Blockchain/DLT (Distributed Ledger Technology)

November 18, 2019 @ 15:00 - November 23, 2019 @ 17:00 IST

There will be a short course on Blockchain/DLT (Distributed Ledger Technology). Prof. Vallipuram Muthukkumarasamy, Griffith University will deliver the course from Nov 18 to Nov 23. The course will be delivered in 6 modules, each module of duration 2 hours. The course is open to everyone. Time: 3 pm to 5 pm Venue: SIC 205, 2nd Floor, KReSIT Building. Course Title: Understanding DLTs End-to-End Module 1: Fundamentals of DLT - Core Concepts and Mechanisms Module 2: Architecture and Consensus Mechanisms…

Find out more »

Is Hardware the Next Frontier in Cybersecurity?

November 21, 2019 @ 16:00 - 17:00 IST

Speaker: Prof. Ramesh Karri Time: Thursday, 21 November 2019, 4:00 pm Venue: Department of Computer Science and Engineering, Room No. 109, 01st Floor, New CSE/CC Building Abstract: Designers use third-party intellectual property (IP) cores and outsource various steps in the integrated circuit (IC) design and manufacturing flow. As a result, security vulnerabilities have been rising. This is forcing IC designers and end-users to re-evaluate their trust in ICs. If an attacker gets hold of an unprotected IC, he can reverse…

Find out more »

Winter School on Blockchain

November 25, 2019 - November 27, 2019
FC Kohli Auditorium, IIT Bombay
Mumbai, Maharashtra 400076 India
+ Google Map

We are organizing a 3-day winter school on blockchain technologies during the month of November 2019. Website: https://isrdc.in/blockchain-school/

Find out more »

June 2023

APT Threat Landscape and Predictions

June 14, 2023 @ 17:00 - 18:00 IST
109, New CSE Building, IIT Bombay
Mumbai, Maharashtra 400076 India
+ Google Map

Advanced Persistent Threats (APTs) pose significant cybersecurity challenges as they are sophisticated, well-resourced, and persistent adversaries. The APT threat landscape is dynamic and continuously evolving. APT groups, often associated with nation-states or well-funded organizations, employ advanced tactics, techniques, and procedures to infiltrate target networks, maintain persistence, and exfiltrate sensitive data. Their primary objectives include espionage, intellectual property theft, disruption of critical infrastructure, and geopolitical influence. Several high-profile APT incidents have highlighted the severity of the threat. Notable examples include the…

Find out more »

August 2023

Malware Hunt: Demystifying the Invisible Threats (Module 1/3)

August 12, 2023 - August 13, 2023
109, New CSE Building, IIT Bombay
Mumbai, Maharashtra 400076 India
+ Google Map

Understanding how malware operates and how to detect it is crucial in today's cybersecurity landscape. In this module, we will be covering an end-to-end attack chain, which is a common method used by cybercriminals to infect systems.

Find out more »

October 2023

Introducing KasperskyOS — New Operating System for building Cyber Immune Systems

October 26, 2023 @ 18:30 IST
109, New CSE Building, IIT Bombay
Mumbai, Maharashtra 400076 India
+ Google Map

Venue : CC-109, New CSE/CC Building Time   : 6:30 pm to 7:30 pm Date   : October 26, 2023 (Thursday) Abstract: In this talk, we provide a view of Cyber Immunity and KasperskyOS both in theory and practice. We have built KasperskyOS from scratch with its own microkernel which is not based on any already existing project (Linux or otherwise). It has a code base of 1.3m lines as compared to 27.8m lines of code in Linux OS. It is specifically developed for industrial systems that are routinely under attack - therefore…

Find out more »

Malware Hunt: Demystifying the Invisible Threats (Module 2/3)

October 28, 2023 - October 29, 2023
109, New CSE Building, IIT Bombay
Mumbai, Maharashtra 400076 India
+ Google Map

During dynamic analysis, the malware is executed, and its actions are monitored and recorded. This approach allows one to observe the malware's behaviour in real-time and gather valuable information about its capabilities, such as process disguising, persistence mechanisms, communication with command and control servers, and downloading additional modules.

Find out more »

December 2023

Malware Hunt: Demystifying the Invisible Threats (Module 3/3)

December 23, 2023 - December 24, 2023

As you have learned how to demystify the behaviour of the malware in the first two modules of this course, you may want to write signatures to hunt similar malware on other hosts or want to detect/block malware command-and-control traffic at the firewall level. This module of the course will cover popular tools used for signature-based intrusion detection, but they have slightly different purposes and approaches

Find out more »
+ Export Events