The IT Security Reading Group (IT-SRG) is a group of UOIT students (graduate and senior undergraduate) and faculty members who are interested in computer security and privacy. We meet weekly for critical review and discussion of state-of-the-art security research papers. This term, we will focus on selected papers from a number of international venues. See below for the schedule. All interested faculty and students are invited to join by contacting Julie Thorpe (firstname.lastname at uoit.ca).
The IT-SRG provides a venue for both faculty and students to:
|Develop and discuss new ideas for security research |
|Critique and analyze cutting-edge security research |
|Determine how to put research into practice |
The IT-SRG is now a recognized activity on UOIT's co-curricular record!
*Note that the time and location will be announced through the mailing list (to join, please contact Julie Thorpe).
| Jan. 31
“Increasing the Security of Gaze-Based Cued-Recall Graphical Passwords Using Saliency Masks” by Bulling et al.
|| CHI 2012
|| Abel Bacchus
| Feb. 7
|| “Building Better Passwords using Probabilistic Techniques” by Houshmand et al.
|| ACSAC 2012
|| Christopher Bonk
|| Feb. 14
|| "The Devil is in the (Implementation) Details: An Empirical Analysis of OAuth SSO Systems” by Sun et al.
|| ACM CCS 2012
|| Cate Dillon
| Feb. 21
| Feb. 28
|| "Computing Arbitrary Functions of Encrypted Data" by Gentry et al.
|| Communications of the ACM 2010
|| Alexander Keller
| Mar. 7
|| "Authentication at Scale" by Grosse et al.
|| IEEE Security & Privacy 2013
|| Zeinab Joudaki
| Mar. 14
|| “User Study, Analysis, and Usable Security of Passwords Based on Digital Objects” by Biddle et al.
|| IEEE TIFS 2011
|| Julie Thorpe
| Mar. 21
|| "User-driven access control: Rethinking permission granting in modern operating systems" by Roesner et al.
|| IEEE Symposium on Security and Privacy 2012
|| Akisanmi Oluwatoyosi
| Mar. 28
“The Socialbot Network: When Bots Socialize for Fame and Money.” by Boshmaf et al.
|| ACSAC 2011
|| Milad Ghaznavi
| April. 4
“Tapas: Design, Implementation, and Usability Evaluation of a Password Manager” by McCarney et al.
|| ACSAC 2012
|| Frank Ong