Security Lunch Fall 2014

Security Lunch Fall 2014

People interested in computer security meet once a week for lunch, watch security-related videos (e.g., USENIX, Black Hat, Def Con, etc.), brainstorm and have something awesome to take away at the end of it! The security lunches will be held in EBII room 3211 on Fridays from 12 pm to 1 pm starting September 5th.

We look forward to any video suggestions (via email to any of the email addresses posted below) and we welcome any suggestions regarding the general format of this initiative. This web page will be updated with the latest information as soon as we have it.

We have created a mailing list ( for notifications regarding the security lunches.
If you would like to subscribe to our mailing list (or unsubscribe), visit the majordomo interface.
It's an open list, so feel free to join us if you're interested!

An additional note: For the first few weeks, we'll see how it goes, so please bring your own lunch. We'll figure out what to do after that.


Ben Andow   (beandow AT ncsu DOT edu)

Adwait Nadkarni  (adwait.nadkarni AT gmail DOT com)


Date Video
September 5, 2014 MiniBox: A Two-Way Sandbox for x86 Native Code
Yanlin Li, CyLab/Carnegie Mellon University
September 12, 2014 ROP is Still Dangerous: Breaking Modern Defenses
Nicholas Carlini and David Wagner, University of California, Berkeley
September 19, 2014 Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks
Qi Alfred Chen, University of Michigan; Zhiyun Qian, NEC Laboratories America; Z. Morley Mao, University of Michigan
September 26, 2014 Gyrophone: Recognizing Speech from Gyroscope Signals
Yan Michalevsky and Dan Boneh, Stanford University; Gabi Nakibly, National Research & Simulation Center, Rafael Ltd.
October 3, 2014 ret2dir: Rethinking Kernel Isolation
Vasileios P. Kemerlis, Michalis Polychronakis, and Angelos D. Keromytis, Columbia University
October 10, 2014 Cancelled - fall break
October 17, 2014 Automatically Detecting Vulnerable Websites Before They Turn Malicious
Kyle Soska and Nicolas Christin, Carnegie Mellon University
October 24, 2014 Science of Security Meeting (optional) (food available)
October 31, 2014 Eradicating DNS Rebinding with the Extended Same-origin Policy
Martin Johns, Sebastian Lekies, and Ben Stock, Friedrich-Alexander-Universitaet Erlangen-Nuernberg
November 7, 2014 A Bayesian Approach to Privacy Enforcement in Smartphones
Omer Tripp, IBM Research USA; Julia Rubin, IBM Research Israel
November 14, 2014 An Evaluation of the Google Chrome Extension Security Architecture
Nicholas Carlini, Adrienne Porter Felt, David Wagner, University of California Berkeley
November 21, 2014 Require Video
November 28, 2014 Cancelled - Thanksgiving Break
December 5, 2014 Cancelled