{"id":1100,"date":"2019-05-07T11:34:53","date_gmt":"2019-05-07T09:34:53","guid":{"rendered":"https:\/\/wp.portal.chalmers.se\/dimva2019\/?page_id=1100"},"modified":"2022-06-02T17:52:02","modified_gmt":"2022-06-02T15:52:02","slug":"speakers","status":"publish","type":"page","link":"https:\/\/sites.unica.it\/dimva2022\/speakers\/","title":{"rendered":"Speakers"},"content":{"rendered":"<h3>Keynote speakers<\/h3>\r\n<h4>Keynote 1 &#8211; Wednesday June 29<\/h4>\r\n<strong>Kaveh Razavi:\u00a0<em>Open Hardware Security \u2013 A New Hope<\/em><\/strong>\r\n<em>Abstract<\/em>: Hardware manufacturers actively engage in security by\u00a0obscurity, leading to disaster time after time. During this talk, I will\u00a0tell you how we are tackling the problem by investing in novel reverse\u00a0engineering approaches that expose the intimate details of\u00a0security-sensitive mechanisms deep inside DRAM hardware. These insights\u00a0allow us to build effective security testing tools, and new principled\u00a0and open mitigations. I will also tell you about our efforts in bringing\u00a0automated security analysis to open-source CPU hardware.\r\n\r\n<a name=\"par1\"><\/a><strong>Kaveh Razavi<\/strong>\u00a0is an assistant professor at ETH Zurich where he leads\u00a0the Computer Security Group. His research interests are in the area of\u00a0systems and security. More recently, he has been involved in the\u00a0discovery and exploitation of many high-profile hardware vulnerabilities\u00a0in commodity hardware components such as DRAM and CPU. These efforts\u00a0have won him and his collaborators many awards, including best paper and\u00a0best practical paper at IEEE S&amp;P, and three Pwnies in the most\u00a0innovative research category at BlackHat.\r\n\r\n&nbsp;\r\n<h4>Keynote 2 &#8211; Thursday June 30<\/h4>\r\n<strong>Leyla Bilge<\/strong>:\u00a0<em><strong>Journey to the Center of the Third-Party Tracking Ecosystem<\/strong><\/em>\u00a0<br class=\"\" \/><em>Abstract<\/em>:\u00a0Tracking users\u2019 online activity is a ubiquitous practice with different goals. At the core of online tracking is the desire to learn about a user\u2019s habits, preferences, identity, and other information capable of creating a profile that can then be used\u00a0in order to\u00a0customize the user experience. This includes advertising and marketing, but also website personalization, analytics services, social media sharing, and others. The effectiveness of online tracking has fuelled very lucrative online business models, often leading to situations where trading profiles of oblivious users\u2014and, therefore, the potential of capturing their attention\u2014becomes the primary transaction instrument of the Internet economy. In this talk, I will present the\u00a0state-of-the-art\u00a0tracking ecosystem\u00a0providing\u00a0details about how trackers compute unique identifiers for the users. Then, I will talk about two of our recent studies on this very topic that aimed at measuring the real extent of cookie-based tracking and its real impact on Internet users. The first study let us paint a highly detailed picture of the cookie ecosystem, discovering an intricate network of connections between players that reciprocally exchange information and include each other\u2019s content in web pages whose owners may not even be aware. We discovered that, in most web pages, tracking cookies are set and shared by organizations at the end of complex chains that involve several\u00a0middlemen. We also studied the impact of cookie\u00a0ghostwriting, i.e.,\u00a0a common practice\u00a0where an entity creates cookies in the name of another party, or the webpage. We attributed and defined a set of roles in the cookie ecosystem, related to cookie creation and sharing. In the second study, on the other hand, we mapped this knowledge to real-world browsing telemetry to measure the total knowledge of the trackers about individuals and how much this knowledge could be extended if collaboration existed among the trackers.\u00a0<br class=\"\" \/>\u00a0<br class=\"\" \/><strong>Leyla Bilge<\/strong> is the director of the European research team of\u00a0NortonLifeLock, formerly known as Symantec. She holds a Ph.D. from\u00a0Eurecom\u00a0and Telecom\u00a0ParisTech\u00a0on the topic of network-based botnet detection problems. Her interests embrace most of the systems security topics with a special focus on data analysis for cyber security, DNS-based malicious\u00a0URL\u00a0detection, predictive analytics, cyber insurance, and web privacy. In her earlier career, she contributed to the WINE project, which allowed the cyber security academics to\u00a0leverage\u00a0real-world telemetry to measure the real impact of particular security problems and threats. Her first study that\u00a0leveraged\u00a0WINE data to study the real-world impact of zero-day attacks received an\u00a0honorable\u00a0mention from NSA Science of Security Competition in 2013. While her day-to-day responsibility is to manage a team of experienced researchers with Ph.D. to explore\u00a0new trends\u00a0and contribute to the overall innovation of\u00a0NortonLifeLock, she carries out a significant amount of academic research and publishes articles at the most prestigious cyber security conferences. In addition, she actively contributes to the reviewing process of scientific studies by\u00a0participating\u00a0in the program committees of the four top-tier security conferences: ACM\u00a0CCS, IEEE S&amp;P,\u00a0Usenix\u00a0Security, and NDSS. In 2021, she was the program chair of DIMVA 2021 and RAID 2021\r\n\r\n&nbsp;\r\n\r\n<!-- \/wp:post-content -->","protected":false},"excerpt":{"rendered":"<p>Keynote speakers Keynote 1 &#8211; Wednesday June 29 Kaveh Razavi:\u00a0Open Hardware Security \u2013 A New Hope Abstract: Hardware manufacturers actively engage in security by\u00a0obscurity, leading to disaster time after time. During this talk, I will\u00a0tell you how we are tackling the problem by investing in novel reverse\u00a0engineering approaches that expose the intimate details of\u00a0security-sensitive mechanisms&hellip; <a class=\"more-link\" href=\"https:\/\/sites.unica.it\/dimva2022\/speakers\/\">Continua a leggere <span class=\"screen-reader-text\">Speakers<\/span><\/a><\/p>\n","protected":false},"author":8998,"featured_media":1441,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1100","page","type-page","status-publish","has-post-thumbnail","hentry","entry"],"_links":{"self":[{"href":"https:\/\/sites.unica.it\/dimva2022\/wp-json\/wp\/v2\/pages\/1100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.unica.it\/dimva2022\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.unica.it\/dimva2022\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.unica.it\/dimva2022\/wp-json\/wp\/v2\/users\/8998"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.unica.it\/dimva2022\/wp-json\/wp\/v2\/comments?post=1100"}],"version-history":[{"count":8,"href":"https:\/\/sites.unica.it\/dimva2022\/wp-json\/wp\/v2\/pages\/1100\/revisions"}],"predecessor-version":[{"id":1437,"href":"https:\/\/sites.unica.it\/dimva2022\/wp-json\/wp\/v2\/pages\/1100\/revisions\/1437"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.unica.it\/dimva2022\/wp-json\/wp\/v2\/media\/1441"}],"wp:attachment":[{"href":"https:\/\/sites.unica.it\/dimva2022\/wp-json\/wp\/v2\/media?parent=1100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}