Invited Talks | Conference Presentations | Invited Short Talks | Guest Lectures
For non-technical talks, see General Interest Talks
Invited talk at the Distributed and Private Machine Learning (DPML) workshop at ICLR 2021, 7 May 2021. [Video]When Models Learn Too Much
Keynote Talk, 11th ACM Conference on Data and Application Security and Privacy. 26 April 2021.When Models Learn Too Much
CrySP Speaker Series on Privacy, University of Waterloo, 29 March 2021. [Abstract] [Video]Inference Privacy in Theory and Practice
Microsoft Security Data Science Colloquium, 1 December 2020. [Blog] [Slides (PDF)]Is "adversarial examples" an Adversarial Example?
Keynote talk at 1st Deep Learning and Security Workshop. (Co-located with the 39th IEEE Symposium on Security and Privacy.) San Francisco, California. 24 May 2018.Adversarial Machine Learning: Are We Playing the Wrong Game?
CISPA Distinguished Lecture. Center for IT-Security, Privacy and Accountability, Universität des Saarlandes, Saarbrücken, Germany. 10 July 2017. [SpeakerDeck]Secure Multi-Party Computation: Promises, Protocols, and Practicalities
ECRYPT NET Workshop on Crypto for the Cloud & Implementation, Paris, France, 27 June 2017. [Speaker Deck]Adversarial Machine Learning: Are We Playing the Wrong Game?
International Computer Science Institute, Berkeley, CA, 8 June 2017. [Speaker Deck] [EvadeML]Classifiers Under Attack
USENIX Enigma 2017, Oakland, CA, 1 February 2017. [Speaker Deck] [Video] [EvadeML]Classifiers Under Attack
O'Reilly Security 2016, New York City, 2 November 2016. [Speaker Deck]Memory for Data Oblivious Computation
ShanghaiTech Symposium, 25 June 2016. [Speaker Deck]From Mercury Delay Lines to Magnetic Core Memories: Progress in Oblivious Memories
Workshop on Theory and Practice of Secure Multiparty Computation, Aarhus University, Denmark. 1 June 2016. [Speaker Deck]Multi-Party Computation for the Masses
CROSSING Conference (Where Quantum Physics, Cryptography, System Security and Software Engineering Meet), Darmstadt, Germany, 1 June 2015. [Slideshare]Multi-Party Computation in 2029: Boom, Bust, or Bonanza?
Applied Multi-Party Computation (Keynote Talk), Microsoft Research Redmond, 21 February 2014. [Slideshare] [Movahedi and Zamani] [MPC Lounge]Scaling Secure Computation
Distinguished Speaker, Oregon Computer Security Day, Eugene, Oregon, 5 April 2013. [Slides: PDF, PPTS, SlideShare]Computing Cooperatively with People You Don't Trust
Math Colloquium Series, University of Richmond. 30 January 2012. [Abstract] [Slides: PDF, PPTX, SlideShare]Secure Computation in the Real(ish) World
CyLab Seminar, Carnegie Mellon University, Pittsburgh, PA. 20 April 2011. [Abstract, PPTX, PDF]Computing Without Exposing Data
Radford University CSAT STEM Club (NSF-sponsored) Talk. 17 March 2011. [Abstract, PPTX, PDF]Thwarting Malware and UI Redressing Attacks with Verifiable User Actions
University of Washington Security Seminar, Seattle, WA, 1 May 2009 [PDF] [PPS, 19MB]Redundant Computing for Security(Earlier versions of this talk were presented at Microsoft Research and a Dagstuhl Workshop in March and April 2009.)
Yahoo! Tech Talk, Sunnyvale, CA, 16 October 2008 [PDF] [PPT, 12MB]Feasible Privacy for Lightweight RFID Systems [PPT] [PDF]TRUST Seminar, UC Berkeley, Berkeley, CA, 25 September 2008 [PDF] [PPT, 12MB]
Security and Privacy Applied Research Seminar at Johns Hopkins University, Baltimore, Maryland, 17 October 2007.Disk-Level Behavioral Virus Detection [PPT] [PDF]
Seminar at North Carolina State University, Raleigh, North Carolina, 5 March 2007.Promising Breaks and Breaking Promises: Program Analysis in Theory and Practice [PPT, PDF]
90-minute class at SDWest 2006, 17 March 2006. Incoporates slides from a talk by Jinlin Yang.Polygraphing Processes: N-Variant Systems for Secretless Security [PPT]
DARPA SRS PIs Meeting, Alexandria, VA. 12 July 2005.Stealing Secrets and Secretless Security Structures [PPT]
Colloquim at Harvard University. 27 June 2005.Security Through Diversity [PPT]
Colloquim at MIT CSAIL. 23 June 2005.Monte Carlo Techniques for Secure Localization [PPT]
ARO Workshop on Localization in Wireless Sensor Networks. Seattle, Washington. 14 June 2005.Where's the FEEB?: The Effectiveness of Instruction Set Randomization [PPT]
Invited CERIAS Seminar at Purdue University, Indiana. 9 March 2005.No Matter Where You Go, There You Are: Secure Localization Techniques for Mobile Wireless Networks [PPT]
Seminar on Applications of Mathematics, UVa Institute of Mathematical Science. 2 December 2004Wireless Security in the Real World: Using Physical Properties to Mitigate Wormhole Attacks [PPT]
Invited seminar talk at University of Delaware SIGNET Seminar, 15 September 2004.What Biology Can (and Can't) Teach Us About Security [PPT] [PDF]
Invited talk at USENIX Security Symposium, San Diego, August 12, 2004.Securing Wireless Sensor Networks [PPT, Abstract]
Seminar talk for UVa's Communications, Controls, and Signal Processing Seminar, 8 December, 2003.What Biology Can Teach Us About Security [PPT (warning: 35MB)]
Seminar at Johns Hopkins University Information Security Institute, 14 November 2003.1000 Things Every Self-Respecting Computer Scientist Should Know [PPT] [Notes]
University of Richmond, 10 November 2003.Why You Should Be Paranoid About What Comes Into and Out Of Your Computer [PPT]
Engineering Week talk, 21 February 2001.Systems for Safety and Dependability [PPT]
Invited talk at Reliable Software Technologies. Summarizes Naccio and LCLint. Sterling, VA, 14 December 1999.Policy-Directed Code Safety [HTML, PPT, Abstract, Thesis]
Seminar describing my thesis work. Versions of this talk were delivered at AT&T Research, Compaq SRC, IBM Yorktown, Lucent Bell Labs, Microsoft Research, UC Davis, UCLA, University of Maryland and University of Virginia in February, March and April 1999.
Conference talk at 15th IEEE International Symposium on Software Reliability Engineering (ISSRE 2004). 5 November 2004.Localization for Mobile Sensor Networks [PPT] (Lingxuan Hu and David Evans)
Conference talk at Tenth Annual International Conference on Mobile Computing and Networking (ACM MobiCom 2004). 28 September 2004.Dynamically Inferring Temporal Properties [PPT]
Jinlin Yang's talk at ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE 2004), Washington, DC 7 June 2004.Using Directional Antennas to Prevent Wormhole Attacks (Lingxuan Hu and David Evans) [PPT]
Conference paper presentation at Network and Distributed System Security Symposium, San Diego, 6 February 2004.Biological Programming Models for Intrusion-Tolerant Systems [PPT (warning 18MB)]
Invited presentation at Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, George Mason University (Fairfax, VA), 24 September 2003.Secure Aggregation for Wireless Networks (Lingxuan Hu and David Evans) [PPT]
Workshop on Security and Assurance for Ad hoc Wireless Networks, Orlando, 28 January 2003.A Biologically Inspired Programming Model for Self-Healing Systems (Selvin George, David Evans and Lance Davidson) [PPT, PDF]
Talk by Selvin George at Workshop on Self-Healing Systems (WOSS 02), 18-19 November 2002.Statically Detecting Likely Buffer Overflow Vulnerabilities (David Larochelle and David Evans) [PPT] [PDF]
David Larochelle's talk at USENIX Security '01 for Statically Detecting Likely Buffer Overflow Vulnerabilities.Annotation-Assisted Lightweight Static Checking [PPT]
Talk at The First International Workshop on Automated Program Analysis, Testing and Verification (ICSE 2000). June 2000. (Position Paper)Flexible Policy-Directed Code Safety [HTML, Abstract and paper]
Talk describing Naccio presented at 1999 IEEE Symposium on Security and Privacy. Oakland, California, 10 May 1999.
Panel presentation for NITRD Federal Cyber-Security Research event organized at Oakland 2011. 25 May 2011, Berkeley CA. [PPTX, PDF]Oakland PC Chair's Talks
Opening Remarks [PPTX, PDF]Next Steps Towards a Science of Security
Business Meeting [PPTX, PDF]
31st IEEE Symposium on Security and Privacy, Berkeley, CA, 16-19 May 2010.Program Committee Meeting [PPTX]. Charlottesville, VA, 28-29 January 2010.
IARPA Visit, 11 January 2010.Understanding and Mitigating Supply Chain Risks for Computing and Communications (or: Who's Driving Your Missiles?)
Defense Science Study Group Think Piece Presentation. Alexandria, VA. October 2009. [PPTX]
Summary of the NSF/IARPA/NSA Workshop on the Science of Security, INFOSEC Research Council, Alexandria, VA. 16 July 2009. [PPTX]Static/Dynamic Analysis: Past, Present and Future [PPT]
Panel presentation at SRI Workshop on the Verification Grand Challenge, Menlo Park, California. 22 February 2005.Where's the FEEB?: Effectiveness of Instruction Set Randomization [PPT]
Presentation at DARPA SRS PI's meeting, Alexandria, VA. 27 January 2005.Finding Security Vulnerabilities Before Evildoers Do [SXI (OpenOffice), PPT]
Invited talk at Conferencia Internacional de Software Libre, Malaga, Spain, 20 February 2004.Privacy Grand Challenge [PPT]
Short talk at CRA Grand Challenges in Information Security & Assurance Conference, Airlie, Virginia, 18 November 2003.Robin Hood and the 40 Million Thieves [PPT]
Talk on File Sharing for UVa Pugwash Meeting, 6 October 2003.Biological Programming Models for Robustness and Scalability [PPT (warning: 9MB)]
Panel presentation for Dynamic Data-Driven Application Systems (DDAS) Panel at ACM International Conference on Supercomputing, San Francisco, 23 June 2003.Programming the Way Biology Programs [PPT]
Panel presentation for NSF Advanced Computation Inspired by Biological Processes Conference, Arlington, VA, 7 April 2003.Securing Bits with Atoms (and Vices with Verses) [PPT, PDF]
Short talk in "Outrageous Ideas" session at DIMACS Workshop on Software Security, 6-7 January 2003.CSCP: The Bugs and the Bees: Research in Swarm Programming and Security [PPT]
Short presentation for Computer Science Corporate Partners, 9 November 2001.Swarm Programming: How to Program a MicroNet [PPT] [PDF]
Short presentation to Keck Foundation, 20 September 2001.Extensible Lightweight Static Checking [PPT] [PDF]
Short talk at University of Washington and Microsoft Research Summer Institute on Specifying and Checking Properties of Software, 14 August 2001.Let's Stop Beating Dead Horses and Start Beating Trojan Horses [PPT]
Slides from my short presentation in a debate on Proof-Carrying Code with Peter Lee at the Infosec Research Council, Malicious Code Study Group. San Antonio, 13 January 2000.
Research in Security and Privacy
Seminar talk for new graduate students in cs6190. 21 September 2011. [PPTX, PDF]What Every Biologist, Chemist, and Poet Should Know about Computer Science
UVa CompBio Seminar, 25 April 2011. [PPTX, PDF]Security and Privacy
Talk to undergraduate cs2190 seminar, 3 March 2011. [PPTX] [PDF](A Somewhat Self-Indulgent) Splint Retrospective
Guest lecture, 25 October 2010. [PPTX] [PDF]Big Words, Busy Beavers, and the Cake of Computing
Tapestry 2009 Workshop (for high school computing teachers), University of Virginia, 15 July 2009 [PDF] [PPTX]What Every Human Should Know about Security [PDF] [PPT, 18MB]
UVa cs290 Seminar Talk, 21 February 2008.Computer Security Research [PDF]
Talk to first year graduate students, 17 September 2007.Turing Machines, Busy Beavers, and Big Questions about Computing [PPT] [PDF]
Talk to College Science Scholars, 12 September 2007. (Partly inspired by Scott Aaronson's essay Who Can Name the Bigger Number?.)Meta Talk: How to Give a Talk So Good There Will Be Pizza Left for You [PPT] [PDF] [Notes]
Talk to University of Virginia Theory Lunch, 25 January 2007.Curing Cancer with your Cell Phone: Why All Sciences Are Becoming Computing Sciences [PPT] [PDF]
Talk to College Science Scholars, 6 September 2006.Introduction to Static Analysis [PPT]
Guest lecture for CS340: Advanced Software Development Methods, 1 March 2004.Computer Science [PPT]
Talk to Rodman Scholars (1st year students) intriducing Computer Science, 15 October 2003.CS696: The Bugs and the Bees: Research in Programming Languages and Security [PPT]
Research overview talk for graduate orientation seminar, 1 October 2003.Static Analysis [PPT]
Guest lecture for CS551/651 Dependable Computing, 25 September 2003.1001 Things Every Self-Respecting Computer Scientist Should Know [PPT] [Notes]
Senior Seminar (CS 390) talk, March 2003.CS696: The Bugs and the Bees: Research in Programming Languages and Security [PPT]
Research overview talk for graduate orientation seminar, 23 September 2002.101 Things Every Computer Scientist Should Know [PPT]
Presentation to incoming graduate students, September 2002.Encryption: How it works, why it (sometimes) doesn't, and what it can do [PPT] [PDF]
Guest lecture in UVa Law School Cyberlaw course on encryption, 19 September 2001.CS696: The Bugs and the Bees [PPT] [PDF]
Research overview talk for graduate orientation seminar, 17 September 2001.CS390: A Smorgasbord of Security, a Smattering of Swarm Programming, and Sampling of Static Checking and a Splash of Web Sites [PPT]
Senior Seminar (CS 390) talk describing Fourth-Year Thesis Projects I am supervising, 21 March 2001.The Bugs and the Bees [PPT]
Research overview talk for graduate orientation seminar, 2 October 2000.Research in Programming Languages and Security [PPT]
Talk describing my research program for UVa's graduate orientation seminar.