Events Search and Views Navigation
July 2019
Advanced Research Workshop on System Security & Privacy
In an untrusted computing environment, assurance of computing systems plays a vital role. Assurance is evidence that a computer system is secure, i.e., obeys its security specification, usually called a security policy. To assure the security of a system, it is important that all of its Trusted Computing Base (TCB) components work as mandated/specified. From the plethora of computing systems for which assurance is in demand, Operating Systems are a special class of systems for which security is vital as…
Find out more »August 2019
Programmable Hardware Monitors for Software Security
Speaker: Prof. Ajay Joshi Time: Friday, 09 August 2019, 10:30am Venue: Conference Room, 01st Floor, KRESIT, IIT Bombay Abstract: Today, all computing systems, from Internet-of-Things (IoT)-embedded devices to large-scale distributed cloud servers remain vulnerable to exploitation. To reduce the overhead of software-level security solutions against various exploitations, recently, leading processor companies have introduced several hardware-level security extensions. Unfortunately, implementing new security extensions in processors is a lengthy and costly process. To overcome the shortcomings of this process, researchers endeavor to use…
Find out more »November 2019
A Short course on Blockchain/DLT (Distributed Ledger Technology)
There will be a short course on Blockchain/DLT (Distributed Ledger Technology). Prof. Vallipuram Muthukkumarasamy, Griffith University will deliver the course from Nov 18 to Nov 23. The course will be delivered in 6 modules, each module of duration 2 hours. The course is open to everyone. Time: 3 pm to 5 pm Venue: SIC 205, 2nd Floor, KReSIT Building. Course Title: Understanding DLTs End-to-End Module 1: Fundamentals of DLT - Core Concepts and Mechanisms Module 2: Architecture and Consensus Mechanisms…
Find out more »Is Hardware the Next Frontier in Cybersecurity?
Speaker: Prof. Ramesh Karri Time: Thursday, 21 November 2019, 4:00 pm Venue: Department of Computer Science and Engineering, Room No. 109, 01st Floor, New CSE/CC Building Abstract: Designers use third-party intellectual property (IP) cores and outsource various steps in the integrated circuit (IC) design and manufacturing flow. As a result, security vulnerabilities have been rising. This is forcing IC designers and end-users to re-evaluate their trust in ICs. If an attacker gets hold of an unprotected IC, he can reverse…
Find out more »Winter School on Blockchain
We are organizing a 3-day winter school on blockchain technologies during the month of November 2019. Website: https://isrdc.in/blockchain-school/
Find out more »June 2023
APT Threat Landscape and Predictions
Advanced Persistent Threats (APTs) pose significant cybersecurity challenges as they are sophisticated, well-resourced, and persistent adversaries. The APT threat landscape is dynamic and continuously evolving. APT groups, often associated with nation-states or well-funded organizations, employ advanced tactics, techniques, and procedures to infiltrate target networks, maintain persistence, and exfiltrate sensitive data. Their primary objectives include espionage, intellectual property theft, disruption of critical infrastructure, and geopolitical influence. Several high-profile APT incidents have highlighted the severity of the threat. Notable examples include the…
Find out more »August 2023
Malware Hunt: Demystifying the Invisible Threats (Module 1/3)
Understanding how malware operates and how to detect it is crucial in today's cybersecurity landscape. In this module, we will be covering an end-to-end attack chain, which is a common method used by cybercriminals to infect systems.
Find out more »October 2023
Introducing KasperskyOS — New Operating System for building Cyber Immune Systems
Venue : CC-109, New CSE/CC Building Time : 6:30 pm to 7:30 pm Date : October 26, 2023 (Thursday) Abstract: In this talk, we provide a view of Cyber Immunity and KasperskyOS both in theory and practice. We have built KasperskyOS from scratch with its own microkernel which is not based on any already existing project (Linux or otherwise). It has a code base of 1.3m lines as compared to 27.8m lines of code in Linux OS. It is specifically developed for industrial systems that are routinely under attack - therefore…
Find out more »Malware Hunt: Demystifying the Invisible Threats (Module 2/3)
During dynamic analysis, the malware is executed, and its actions are monitored and recorded. This approach allows one to observe the malware's behaviour in real-time and gather valuable information about its capabilities, such as process disguising, persistence mechanisms, communication with command and control servers, and downloading additional modules.
Find out more »December 2023
Malware Hunt: Demystifying the Invisible Threats (Module 3/3)
As you have learned how to demystify the behaviour of the malware in the first two modules of this course, you may want to write signatures to hunt similar malware on other hosts or want to detect/block malware command-and-control traffic at the firewall level. This module of the course will cover popular tools used for signature-based intrusion detection, but they have slightly different purposes and approaches
Find out more »