cs.virginia.edu
David Evans Home Page
http://www.cs.virginia.edu/~evans
Professor of Computer Science. S current work focuses mainly on secure computation. And adversarial machine learning. This semester I am teaching cs1120: Introduction to Computing - Explorations in Language, Logic, and Machines. Using a new approach mostly inspired by my three-year-old daughter's Tae Kwon Do classes. Recently, I taught a course on cryptocurrencies. And cs4414: Operating Systems. The first course to use the Rust programming language. Dori-Mic and the Universal Machine! Secret Order of the.
ssoscan.org
Vulnerabilities // SSOScan
http://ssoscan.org/vulnerabilities
Automatically Scanning for SSO Vulnerabilities. SSOScan currently looks for these five types of vulnerabilities. 1 Access token misuse. When a website uses an. From Facebook to authenticate users, impersonation attacks can happen. This implementation is dangerous because the. Is not tied to a user’s identity or your application ID, but only to user’s permissions. This means a malicious application which holds a victim’s. Https:/ developers.facebook.com/docs/facebook-login/access-tokens/#debug. To mitigat...
udacity.com
Intro to Computer Science | Udacity
https://www.udacity.com/course/cs101
LAST CHANCE: Get 16% off a Nanodegree program every single month for the Olympics! Intro to Computer Science. Build a Search Engine and a Social Network. Approx. 3 months. Learn by doing exercises and view project instructions. Approx. 3 months. Why Take This Course? This course is a first step into the world of computer science, and whether you want to become a software engineer, or collaborate with software engineers, this course is for you. You’ll be prepared for intermediate-level computer scienc...
security-reading-group.blogspot.com
Security Reading Group @ UVa: July 2008
http://security-reading-group.blogspot.com/2008_07_01_archive.html
Security Reading Group @ UVa. Sunday, July 20, 2008. Get Familiar With All Those Research Conferences (CS). To save your time with google, here is some links about the reputation of conferences in computer science. Anyway, as is always declared on every individual web page below, ranking the conferences is a subjective task, and they can only be used as a reference. Computer Science Conference Ranking. Maintained by a dedicated organization. Http:/ cs.conference-ranking.net/index.html. As always, free lu...
security-reading-group.blogspot.com
Security Reading Group @ UVa: Schedules
http://security-reading-group.blogspot.com/2009/05/schedules.html
Security Reading Group @ UVa. Wednesday, May 27, 2009. Efficient Montgomery Multiplication on GPUs. Web-key: Mashing with Permission. Towards Practical Privacy for Genomic Computation. VTPM: Virtualizing the Trusted Platform Module. Privacy and Security in Library RFID: Issues, Practices, and Architectures. OMash: Enabling Secure Web Mashups via Object Abstractions. Security Lunch @ UVa. Subscribe to: Post Comments (Atom). How to join us. Secure Stable Matching at Scale. Security Lunch @ UVa.
security-reading-group.blogspot.com
Security Reading Group @ UVa: May 2009
http://security-reading-group.blogspot.com/2009_05_01_archive.html
Security Reading Group @ UVa. Wednesday, May 27, 2009. Efficient Montgomery Multiplication on GPUs. Web-key: Mashing with Permission. Towards Practical Privacy for Genomic Computation. VTPM: Virtualizing the Trusted Platform Module. Privacy and Security in Library RFID: Issues, Practices, and Architectures. OMash: Enabling Secure Web Mashups via Object Abstractions. Security Lunch @ UVa. Subscribe to: Posts (Atom). How to join us. Secure Stable Matching at Scale. Security Lunch @ UVa.
security-reading-group.blogspot.com
Security Reading Group @ UVa: General Information
http://security-reading-group.blogspot.com/2008/06/general-information.html
Security Reading Group @ UVa. Saturday, June 21, 2008. Normally, we are focused on one recent conference paper, along with necessary background information from relevant papers, per meeting. The suggested time allocation for each seminar is given below. But if necessary, you, as the presenter, can lead the discussion according to your own time schedule. Suggested Sources of Papers. For those who are searching interesting papers, here is a list of top conferences on computer security. Security Lunch @ UVa.
security-reading-group.blogspot.com
Security Reading Group @ UVa: 07-16-2008 Seminar
http://security-reading-group.blogspot.com/2008/07/07-16-2008-seminar.html
Security Reading Group @ UVa. Tuesday, July 15, 2008. Are you still able to remember all the elements of speculative execution,. Which you've learned in an architecture class way back in your college? Do you know there is a close relationship between this performance enhancement technique and an effective security insurance mechanism, such that we can shoot two birds with one stone? As always, free lunch will be offered. Many thanks to Jeff for bringing the Indian food from Milan. Security Lunch @ UVa.
SOCIAL ENGAGEMENT