skip to content

Department of Computer Science and Technology

Read more at: Decision-making in cybercriminal underground spaces. Where to go, and why?

Decision-making in cybercriminal underground spaces. Where to go, and why?

Tuesday, 5 November, 2024 - 14:00 to 15:00

The underground cybercriminal space is very fragmented. Dozens of forums and hundreds if not thousands of groups and channels on Telegram (not to mention `deep-web' websites, Discord servers, and others) make a cybercriminal's life more complicated than not: which community(ies) to join, when, and what for? The decision is...


Read more at: Beyond Whack-A-Mole: Disrupting Online Crime and Harms through Law Enforcement and Industry Efforts

Beyond Whack-A-Mole: Disrupting Online Crime and Harms through Law Enforcement and Industry Efforts

Tuesday, 3 December, 2024 - 14:00 to 15:00

Disrupting online crime and harms often feels like playing a never-ending game of whack-a-mole. Shut down one malicious website, and another pops up; arrest one cybercriminal, and a few more may emerge in the shadows. This talk discusses in detail what has recently happened as law enforcement and tech firms have taken...


Read more at: The Curious Case of Big Phishes in The Netherlands

The Curious Case of Big Phishes in The Netherlands

Tuesday, 8 October, 2024 - 14:00 to 15:00

In this talk, I will share a story of how scientific research can contribute to enhancing cybercrime policing – and where it may fall short. Drawing on a 2021 USENIX paper, we explored the phishing landscape in the Netherlands. This research has since led to several follow-up initiatives in both the scientific community...


Read more at: Tracking the Takes and Trajectories of News Narratives from Trustworthy and Worrisome Websites

Tracking the Takes and Trajectories of News Narratives from Trustworthy and Worrisome Websites

Friday, 8 November, 2024 - 14:00 to 15:00

Uncovering and understanding how influence networks push propaganda and disinformation within the wider news ecosystem remains a difficult challenge that requires tracking and characterizing how narratives spread across thousands of fringe and mainstream news websites. Using 18 months of daily news article scrapes from 1...


Read more at: Developing Technical Interventions for Technical Abuse

Developing Technical Interventions for Technical Abuse

Tuesday, 29 October, 2024 - 14:00 to 15:00

Technology-facilitated domestic abuse is an evolving and widespread issue that has lasting effects on its victims and survivors. With nearly all modern domestic abuse cases involving some form of "tech-abuse", it is vital to develop new safety mechanisms and countermeasures to reduce harms to victim-survivors. In this talk...


Read more at: Federated Deep Learning for Intrusion Detection in Smart Critical Infrastructure

Federated Deep Learning for Intrusion Detection in Smart Critical Infrastructure

Tuesday, 12 November, 2024 - 14:00 to 15:00

The integration of the Internet of Things (IoT) into smart critical infrastructure has significantly enhanced monitoring, control, and efficiency. However, this integration introduces new cybersecurity risks, as IoT devices can become vulnerable points for attackers targeting essential services such as electricity, water...


Read more at: Latency-aware routing in mix networks

Latency-aware routing in mix networks

Friday, 20 September, 2024 - 14:00 to 15:00

Anonymous communication systems, such as mix networks, achieve anonymity at the expense of latency, which is introduced to alter the flow of packets and hinder their tracing. However, high latency has a negative impact on usability. In this talk, I present some recent works proposing novel latency-aware routing schemes for...


Read more at: A detailed analysis of how locks and physical security become vulnerable to attack

A detailed analysis of how locks and physical security become vulnerable to attack

Friday, 13 December, 2024 - 14:00 to 15:00

“Tobias on Locks and Insecurity Engineering” is a 700-page treatise on what can go wrong in the design of locks and security hardware. Ross Anderson’s primary work, “Security Engineering", was one of the impetuses for the book. Marc is a lawyer and physical security expert in the United States who has lectured at Cambridge...


Read more at: The end of world as we know it

The end of world as we know it

Friday, 7 June, 2024 - 13:00 to 14:00

It turns out that 0.02% of harmful experiences people have on social media today are addressed by the current approach to Integrity and Safety. Why is that? Think of how many ways there are to be racist, threaten someone (or any other issue), and then multiply by culture, sub-culture, age, and humans. I'll be discussing...


Read more at: Data-Agnostic Model Poisoning to Manipulating Federated Learning

Data-Agnostic Model Poisoning to Manipulating Federated Learning

Tuesday, 16 July, 2024 - 14:00 to 15:00

In this presentation, a data-agnostic model poisoning attack targeting federated learning systems will be explored. The proposed attack leverages a new adversarial graph autoencoder (GAE)-based framework that operates independently of training data access, thereby ensuring both its efficacy and stealth. The proposed attack...