Research Talks
- Privacy through Accountability: A Computer Science Perspective, TRUST Security Seminar, University of California Berkeley, September 2014.
- Privacy through Accountability: The Case of Web Advertising, Security Seminar, Stanford University, August 2014.
- Privacy through Accountability: The Case of Web Advertising, Keynote Lecture, 5th International Workshop on Data Usage Management, May 2014.
- Privacy through Accountability: A Computer Science Perspective, Keynote Lecture, 10th International Conference on Distributed Computing and Internet Technology, February 2014.
- Privacy through Accountability: A Computer Science Perspective, Accountability: Science, Technology and Policy Workshop, MIT, January 2014.
- Science of Usable Security, AFOSR Science of Cybersecurity MURI Review, August 2013.
- Privacy through Accountability, AFOSR Assured Information Sharing MURI Review, August 2013.
- Privacy through Accountability, Invited Talk, Microsoft Research India, July 2013.
- Privacy Preserving Release of Public/Semi-Public Data, Invited Panelist, CCC/CMU/ITIF Privacy R&D Workshop, March 2013.
- Naturally Rehearsing Passwords, Theory Seminar, Microsoft Research Silicon Valley, March 2013.
- Audit Games, Invited Talk, DIMACS Workshop on Economics of Information Sharing, February 2013.
- Differentially Private Data Analysis of Social Networks via Restricted Sensitivity, Invited Talk, DIMACS Workshop on Differential Privacy across Computer Science, October 2012.
- Formalizing and Enforcing Purpose Restrictions in Privacy Policies, TRUST Conference, November 2012.
- Privacy, Audit and Accountability, Invited Talk, IFIP World Computer Congress, June 2012.
- Privacy, Audit and Accountability, Information Trust Institute Seminar, UIUC, May 2012.
- Privacy, Audit and Accountability, Microsoft Research Redmond, April 2012.
- Privacy, Audit and Accountability, Decentralized Information Group Seminar, MIT, April 2012.
- Privacy, Audit and Accountability, Center for Research in Computation and Society Seminar, Harvard University, April 2012.
- Formalizing and Enforcing Privacy: Semantics and Audit, Invited talk, Workshop on Computer Aided Security, Verimag Laboratory, Grenoble, January 2012.
- Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms, Keynote Lecture, 7th International Conference on Information Systems Security, December 2011.
- Policy Auditing over Incomplete Logs, Stanford Software Seminar, November 2011.
- Principled Audit Mechanisms for Privacy Protection, TRUST External Advisory Board, November 2011.
- Principled Audit Mechanisms for Privacy Protection, CyLab Corporate Partners Conference, September 2011.
- Foundations of Privacy, Invited Tutorial, Summer School on Security and Privacy, Microsoft Research and Indian Institute of Science, June 2011.
- Privacy Protection via Computer-Assisted Audits, Symantec Research, May 2011.
- Privacy Protection via Computer-Assisted Audits, UC Berkeley, April 2011.
- Privacy Protection via Computer-Assisted Audits, IBM T. J. Watson Research Center, April 2011.
- Programming Language Methods for Compositional Security, Invited Tutorial, Oregon Programming Languages Summer School, June 2010.
- Compositional System Security in the Presence of Interface-Confined Adversaries, Invited Talk, 26th Annual Conference on Mathematical Foundations of Programming Semantics, May 2010.
- Toward Semantic Security Properties of Software, Invited Panelist, Panel on Rigorous Security Analysis of Software at IEEE Computer Security Foundations Symposium, July 2009.
- Protocol Composition Logic: Computational Semantics and Inductive Proofs, Computational and Symbolic Proofs of Security Workshop, April 2009.
- Privacy, Compliance and Information Risk in Complex Organizational Processes, NYU/IBM Workshop on Managing Data Risk: Acquisition, Processing, Retention and Governance, April 2009.
- Foundations of Privacy: Contextual Integrity, The Logic of Privacy and Beyond, Philosophy Seminar, Keio University, April 2009.
- Foundations of Privacy: Contextual Integrity, The Logic of Privacy and Beyond, NYU Computer Science Colloquium, February 2009.
- Foundations of Privacy: Contextual Integrity, The Logic of Privacy and Beyond, Information Security and Cryptography Seminar, University of Saarlandes and MPI-SWS, February 2009.
- Foundations of Privacy: Contextual Integrity, The Logic of Privacy and Beyond, Computer Science Seminar, University of Trier, February 2009.
- Is there a Science of Security, and if so, what might it look like? Invited Panelist, Panel at the NSF/IARPA/NSA Workshop on the Science of Security, November 2008.
- Privacy in Organizations, NSF/Conference Board Workshop on Organizations and Innovation, July 2008.
- PCL: A Logic for Network Security Protocols, Computer Science Seminar, University of Toronto, June 2007.
- PCL: A Logic for Network Security Protocols, MITACS Digital Security Seminar, Carleton University , May 2007.
- An Update on Network Protocol Security, Stanford Computer Forum Annual Security Workshop, March 2007.
- Reasoning about Security and Privacy, Computer Science Seminar, UCSD, February 2007.
- Reasoning about Security and Privacy, Computer Science Seminar, UCSC, January 2007.
- On Privacy and Compliance: Philosophy and Law meets Computer Science, Oakland PC Crystal Ball Workshop, IBM T. J. Watson, January 2007.
- Reasoning about Security and Privacy, Trust and Security Seminar, UIUC, December 2006.
- Reasoning about Security and Privacy, Computer Science Colloquium, UCLA, November 2006.
- Privacy, Utility, and Responsibility in Business Processes, Stanford Data Privacy Group, November 2006.
- Privacy and Utility in Patient Portals, TRUST Fall Meeting , Pittsburgh, October 2006.
- Reasoning about Security and Privacy, Cylab Seminar, CMU, September 2006.
- PCL: A Logic for Network Security Protocols, Computer Science Seminar, IIT Guwahati, June 2006.
- PCL: A Logic for Network Security Protocols, Computer Science Seminar, Microsoft Research Lab, Cambridge, May 2006.
- PCL: A Logic for Network Security Protocols, Concurrency and Security Seminar, Oxford University, May 2006.
- PCL: A Logic for Network Security Protocols, Computer Science Seminar, CMU, February 2006.
- Privacy and Contextual Integrity: Framework and Applications TRUST Winter Meeting , Washington D.C., January 2006.
- Games and the Impossibility of Realizable Ideal Functionality, ONR URI: SPYCE Review , Washington D.C., November 2005.
- Security Analysis of Network Protocols, Cryptography and Information Security Seminar, MIT, November 2005.
- Security Analysis of Network Protocols, TACL Seminar, Princeton University, November 2005.
- Security Analysis of Network Protocols, Computer Security Seminar, University of Pennsylvania, November 2005.
- Security Analysis of Network Protocols, Computer Security Seminar, UC Berkeley, October 2005.
- Security Analysis of Network Protocols, Computer Security Seminar, CMU, October 2005.
- PCL: A Logic for Security Protocols, Invited lecture, 18732: Secure Software Systems, CMU, October 2005.
- Security Analysis of Network Protocols, Computer Security Seminar, Cornell University, September 2005.
- Stanford vs. UC: The Big Game, Advances in Cryptology - CRYPTO'05, August 2005.
- Secure Wireless Networking, DARPA/AFOSR MURI: APPeers Review, MIT, June 2005.
- Security Analysis of Network Protocols: Compositional Reasoning and Complexity-theoretic Foundations, ONR URI: SPYCE Review, University of Pennsylvania, May 2005.
- Security Analysis of Network Protocols, Stanford Computer Forum Annual Security Workshop, May 2005.
- Symbolic Logic for Complexity-theoretic Model of Cryptographic Protocols, Theory Group, Computer Science Department, Stanford University, May 2005.
- Security Analysis of Network Protocols, Computer Science Colloquium, University of Wisconsin-Madison, April 2005.
- Abstraction and Refinement in Protocol Derivation, 17th IEEE Computer Security Foundations Workshop, June 2004.
- Formal Derivation of Security Protocols, 4th Annual National Security Agency Conference on High Confidence Software and Systems, April 2004.
- Secure Protocol Composition, 1st ACM Workshop on Formal Methods in Security Engineering, October 2003.
- A Derivation System for Security Protocols and its Logical Formalization, 16th IEEE Computer Security Foundations Workshop, June 2003.