Remembering Emil: Bridging the Theory and Practice of Cloud Security

April 26th, SODA Hall, UC Berkeley.

12:30pm-1pm Refreshments and signing the memorial book
1:00pm-1:10pm Opening Speech Dawn Song/Elaine Shi
1:10pm-1:20pmEmil’s Path ORAM Marten van Dijk
1:20pm-1:30pm The Ascend Secure ProcessorSrini Devadas
1:30pm-1:40pm PHANTOM: Building Emil's Path ORAM algorithm into hardware Martin Maas/Eric Love
1:40pm-1:50pm Perfect Crowdsourcing Privacy, in Practice Ulfar Erlingsson
1:50pm-2:00pm Platform for Private Data Mohit Tiwari
2:00pm-2:15pm Searchable Encryption Seny Kamara/Ch. Papamanthou
2:15pm-2:25pm Duress Detection for Authentication Attacks Against Multiple Administrators Mike Atallah (remote)
2:25pm-2:35pm Studying Human Problem Solving Zygmunt Pizlo (remote)
2:35pm-2:45pm Hourglass Schemes: Proving At-Rest Encryption in the Cloud Ari Juels (remote)
2:45pm-2:55pm Cloud Auditing Alina Oprea (remote)
2:55pm-3:05pm Open Mic
3:05pm-3:10pm Memorial silence, Poem reading
3:10pm-3:20pm Memorial certificate granting ceremony for Emil's academic achievements & Closing Speech David Culler & Plamen Stefanov
3:20pm-5:30pm Hike near Berkeley
6:00pm-8:00pm Dinner (Cafe La Mediterranee, 2936 College Avenue, Berkeley)

1 comment:

  1. This is the best security protocol that I have ever seen and I really like to get use to these types of things. It has been a great idea to know about the new security protocols.