This webpage contains links to some of my presentations ("hour-long research overviews") to the research community describing major research projects. Links to conference paper presentations, if available, may be obtained together with a link to the paper itself: See my papers page for details.
|Regulating Smart Devices in Restricted Spaces||Presentation slides describing our project on enforcing usage restrictions on smart personal devices. Presented 2017-now.||Policies and Mechanisms for Operating System Security||Presentation slides summarizing our work on operating system integrity. A ten-year retrospective on rootkit detection: Presented in 2017-18.|
|Self-service Cloud Computing||PDF, Talk||Presentation slides describing our self-service cloud computing project (and elevator-pitches of a few other projects). Presented in the period 2012-2015.|
|Rootkit-based Attacks and Defenses: Past, Present and Future||Powerpoint||Presentation slides describing our research projects on rootkit detection, including our work on Gibraltar (see below) and rootkits on mobile devices. Presented in the period 2008-2011.|
|Enforcing Security Policies using Transactional Memory Introspection||Powerpoint||Presentation slides describing the Transactional Memory Introspection project. Presented in the period 2008-2011.|
|Retrofitting Legacy Code for Security||Powerpoint||Presentation slides describing my Ph.D. thesis research on retrofitting legacy code for authorization policy enforcement. Presented in the period 2005-2007.|
Note that the Powerpoint presentations are available as Slideshows (PPS files) meaning that you can display them using a Powerpoint viewer, but cannot modify them. If you would like the PPT files instead, please email me.