Video Presentation

Benjamin Fung – Kam1n0 Assembly Clone Search for Reverse Engineering

Presented at the Spring 2016 SERENE-RISC Workshop. Assembly code analysis is one of the critical processes for mitigating the exponentially increasing threats from malicious software. It is also a common practice for detecting and justifying software plagiarism and software patent infringements when the source code is unavailable. However, it is a manually intensive and time-consuming …

Critical Infrastructure Threat Landscape: Understanding and Reacting

    Francesca Bosco – UNICRI, Presented at the 2016 Spring SERENE-RISC Workshop. Advances in the field of global technology have transformed the way in which societies function, affecting governments, businesses, and individuals alike, evoking a wide array of societal benefits, while also subjecting populations to varying degrees of cyber risk. Critical infrastructure serves as …

Christopher Yang – Social Media Analytics for Intelligence and Security Informatics

From the SERENE-RISC Workshop held in April 2016 in Vancouver, Canada. Social Media Analytics for Intelligence and Security Informatics Christopher Yang – Drexel University In this talk, we’ll discuss some of the social media and data analytics work we have done on the DIBBs data archive. The DIBBS data archive is a 3-year project funded …

Bitcoin: An impartial assessment of its use and potential for cybercrime

In this video, Prof. Jeremy Clark defines what bitcoin is, how it is used and its relation to cybercrime. This talk was presented in Toronto on May 31, 2016, at the SERENE-RISC Tutorial “Examining Cybercrime 2: Financial Edition”. Jeremy takes something mystical and clearly explains it. There’s this data structure which you may have heard …