On Thursday, April 5th, SPICE’s Cyber Security Defense team heads out to compete in Argonne National Laboratory’s Cyber Defense Competition 2018. Led by Team Leader George Osterholdt, six researchers will compete in the 2018 Capture The Flag (CTF) competition. This … SPICE Cyber Defense Team Heads to Argonne National Labs 2018 ...April 4, 2018 in CyberSecurity by jostre
by Jacob Abbott and Joshua Streiff Indiana University has three teams competing in the Atlantic Council’s Cyber 9/12 Student Challenge in Washington, D.C. The teams are comprised of Ph.D. and Masters students that are from the School of Informatics, Computing, … SPICE Team Competes in Cyber 9/12 Student ChallengeMarch 16, 2018 in CyberSecurity by jostre
IUPUI-March 18th- Bsides Indy kicked off its 2018 Hackathon with speakers and workshops on network and IoT security. While speakers addressed topics from phishing to social engineering, others ran workshops in networking and IoT hacking. Saturday included more talks and … SPICE Sponsors Bsides Indy 2018 HackathonMarch 16, 2018 in CyberSecurity by jostre
By Professor L. Jean Camp and Jonathan Schubauer A jogging club in your neighborhood, the perfect trail to go on a bike ride, a work friend’s home address, maybe a top secret military base–whatever location you’re looking for, chances are … SPICE Researchers: Strava Heat Map Noncompliant With General Data Protection ...February 16, 2018 in CyberSecurity by jostre
In a recent test of practical cyber skills, Indiana University’s young Capture The Flag (CTF) team has taken second place in their first competition of the year. The effort was led by two team members, DongInn Kim and Vafa Andalibi, … SPICE Capture The Flag Team Takes 2nd Place in Cyber ...January 31, 2018 in CyberSecurity by jostre
At a reception led by IU President Michael A. McRobbie, SPICE Professor L. Jean Camp was the first of five IU professors to be recognized for being made AAAS fellows in 2017. The reception was hosted on January 25th, 2018 … SPICE Professor Jean Camp Honored at AAAS Award ReceptionJanuary 30, 2018 in CyberSecurity by jostre
As fabrication technologies permeate our offices and homes their use becomes as ubiquitous as paper scanning and printing technologies did before them. Laser cutters, 3D printers, and other makerspace technologies are now available to for home repairs, creative endeavors, and … SPICE Connected Fabrication Lab Moving & ExpandingDecember 29, 2017 in CyberSecurity by jostre
SPICE had a visit from a renowned logistics and product specialist on Friday, December 8th. Speaking in Informatics East, the jingling master of toys and home products gave a funny, yet serious talk spilling the beans on just how he … SPICE Santa Spills Surveillance Secrets On How Santa Knows Who ...December 13, 2017 in CyberSecurity by jostre
When assessing job applications, research data show that recruiters and employers screen applicants based on age, class, personality, and other characteristics that may not be gleaned from a resume. In an ideal situation, one might imagine that employers hire the … SPICE Professor Raquel Hill Showcases Research at the Cybersecurity Research ...December 6, 2017 in CyberSecurity by jostre
SPICE is excited to report that it has been awarded a Comcast Innovation Grant for research in empowering customers in the use of Internet of Things (IoT) technology. A core part of SPICE’s research model is to use our unique … SPICE Awarded Comcast Innovation Grant For IoT ResearchDecember 1, 2017 in CyberSecurity by jostre
The internet’s newest hot browser has SPICE professor Steve Myers cryptography to thank for it’s amazing ICO this year. Raising $35 million in the first 30 seconds of it’s ICO opening, Brave is a fast browser that brings security and … BLOG POST: SPICE Professor’s Anonize Protocol Provides Cryptological Backbone For ...November 27, 2017 in CyberSecurity by jostre
SPICE is proud to announce that Professor L.Jean Camp has been named an IEEE Fellow effective as of January 1, 2018. She is being recognized for her research in human-centered risk and security. The IEEE Grade of Fellow is conferred … SPICE Professor Jean Camp Named IEEE FellowNovember 22, 2017 in CyberSecurity by jostre
SPICE is proud to announce that Professor L.Jean Camp has been named as an AAAS Fellow. This honor bestowed by the American Association for the Advancement of Science has been made in recognition of a lifetime of achievement in the … SPICE Professor Jean Camp Named AAAS FellowNovember 20, 2017 in CyberSecurity by jostre
By Shakthidhar Gopavaram The services offered by mobile apps are useful but these apps can also be privacy invasive, meaning that in they compile and share more information than is needed for the task the app performs. For example, researchers … Can You Hear Me Now? Using Audio Alerts In ...November 16, 2017 in CyberSecurity by jostre
by Pablo Moriano The term “insiders” is widely defined as current or former employees who accidentally or maliciously misuse their trusted access to harm an organization’s assets. According to multiple security reports, a considerable percentage of security professionals from multiple … SPICE Researchers Find Hints of Long Undetectable Insider ThreatsNovember 8, 2017 in CyberSecurity by jostre
Research, education, and outreach are a core mission of SPICE. As part of that continuing mission, Capstone teams are using smart toys in hacking workshops, and at job fairs as examples of the work we do. The three SPICE Capstone … SPICE Smart Toy Security Work Continues In Capstone Teams’ ResearchNovember 1, 2017 in CyberSecurity by jostre
By Michele Roberts and Joshua Streiff On September 15 and 16, IU SICE co-hosted Indiana’s first ever Computer Science conference for K-8 teachers. Over two hundred teachers learned more about the Indiana K-8 Computer Science standards including assessment plans and … SPICE Presents at Educator’s Computer Science ConferenceOctober 18, 2017 in CyberSecurity by jostre
By David Crandall & Apu Kapadia On July 26th SPICE co-sponsored the IEEE Conference on Computer Vision and Pattern Recognition. This workshop addresses the security and privacy implications of computer vision as it is integrated into the real world and … SPICE co-sponsored the workshop ‘The Bright and Dark Sides of ...October 12, 2017 in CyberSecurity by jostre
By Yan Huang People have thought about innovative applications such as mining credit card transactions to identify fraud transaction, or querying databases of personal medical records for precision medical treatments. Obviously, combining data from several collaborative organizations generally improves the … Pool: Scalable On-Demand Secure Computation Service Against Malicious AdversariesOctober 4, 2017 in CyberSecurity by jostre
By Pablo Moriano Salazar, Ph.D. Student The BGP protocol is the glue that sticks the Internet. Subnetworks called autonomous systems (ASes) use the BGP protocol to exchange reachability paths to groups of IP addresses that they own. By protocol design, … The Real Incentives of Routing ManipulationSeptember 27, 2017 in CyberSecurity by jostre
On 8/21/17 a contingent of CSI students, staff and faculty travelled to Hopkinsville, Kentucky to observe the full solar eclipse. Given the short drive to a location that offered the eclipse in totality, and the rareness of this as a … CSI Eclipse DaySeptember 15, 2017 in CyberSecurity by jostre
Sept. 30, 2016, Indiana University Bloomington In September IU hosted leaders in private and public technology for a two day conference with the stated goal of sparking conversations on how research drives innovation. IU’s news release can be found here:… Research Horizons 2016: Professor Yan Huang PresentationSeptember 15, 2017 in CyberSecurity by jostre
CSI Professor Ryan Henry was recently awarded two new research grants from the National Science Foundation (NSF) to study cryptographic techniques for protecting the privacy of Internet users. Professor Henry is the sole Principal Investigator (PI) on the first grant, … CSI professor receives two NSF grants to enhance online privacySeptember 8, 2017 in CyberSecurity by jostre
Two weeks ago, at the 24th Annual Conference on Selected Areas in Cryptography (SAC 2017) in Ottawa, University of Waterloo master’s student Bailey Kacsmar presented research conducted in collaboration with Brandon University Professor Sarah Plosker and CSI’s own Professor Ryan … Of babies and giants: CSI researchers attack lightweight cryptographic constructionsSeptember 1, 2017 in CyberSecurity by jostre
Sept. 30, 2016, Indiana University Bloomington In September IU hosted leaders in private and public technology for a two day conference with the stated goal of sparking conversations on how research drives innovation. IU’s news release can be found here:… Research Horizons 2016: Professor Sameer Patil PresentationSeptember 1, 2017 in CyberSecurity by jostre
Sept. 30, 2016, Indiana University Bloomington In September IU hosted leaders in private and public technology for a two day conference with the stated goal of sparking conversations on how research drives innovation. IU’s news release can be found here:… Research Horizons 2016: Professor Raquel Hill PresentationAugust 25, 2017 in CyberSecurity by jostre
Next week SoIC staff and students from both The Center for Security Informatics and Data Sciences will be attending Indianapolis’ Gencon 50 at the Indy Convention Center. Gencon is a four-day gaming convention. It is both the oldest and largest … CSI at Gencon 50August 13, 2017 in CyberSecurity by jostre
Summer is typically a time when students head home to visit friends and family, go on a vacation, or in the case of some students at Indiana University they get introduced to conducting research for the first time. The Center … Summer Research Experience at CSIAugust 4, 2017 in CyberSecurity by jaeabbot
By Sanchari Das, Ph.D. Student I arrived in the land of beaches, San Diego. The serene Pacific welcomed me with open arms on a bleary day. As I rested on the beach, my very first interaction with the Pacific, I … WEIS 2017: An ExperienceJuly 28, 2017 in CyberSecurity by jostre
The Center for Security Informatics (CSI) is dedicated to research, education and outreach. Much of the work that is done on a day-to-day basis can lean very strongly to one of those three categories while having an effect on the … Hacking The Voting Machine: Practical Learning ToolJuly 21, 2017 in CyberSecurity by jostre