The Washington Area Trustworthy Computing Hour (WATCH) seminar series
About the WATCH series:
Today we are regularly obliged to trust a cyberinfrastructure that is in fact untrustworthy. Transforming today’s infrastructure into one that can meet society’s growing demands is major national challenge and opportunity. Meeting the challenge requires not only technical advances in the fabric of computing and communication but also improved understanding of how individuals and organizations comprehend and use technology, how economic and policy incentives can affect adoption of new technology, and how to develop human-centered systems that can serve users with different national, cultural, and technical backgrounds around the planet. WATCH aims to provide a series of thought-provoking talks by innovative thinkers with ideas that illuminate these challenges and provide signposts toward solutions. The series is jointly organized by NSF’s Computer Science and Engineering (CISE) and Social, Behavioral, and Economic (SBE) Directorates and the Office of Cyberinfrastructure (OCI), and sponsored by the CISE Trustworthy Computing Program
Video and Audio will be available one month after each meeting. You can also visit the CISE webinar/webcast page for more WATCH information at: http://www.nsf.gov/events/event_group.jsp?group_id=20018&org=CISE
To join our listserv and receive WATCH Series by email, please send a blank email to:
You should receive an email to confirm your subscription within an hour.
Next WATCH series:
Confidentiality á la Carte with Cipherbase
Microsoft Research Lab
June 22, 2017
To attend this meeting virtually, register at: http://www.tvworldwide.com/events/nsf/170622/.
Any language, opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation
Upcoming WATCH series (subject to change):
- July 20th: Cris Thomas, Cyber Squirrel
- September 21st: Benjamin Pierce, U. Penn
Past WATCH series:
5/18/17 - Srini Devadas "Secure Hardware and Cryptography: Contrasts, Synergies and Challenges"
4/20/17 - Ari Juels "The Jekyll and Hyde of Smart Contracts"
3/16/17 - Sharon Goldberg "Securing the Network Time Protocol"
2/16/17 - Jules Polonetsky "Industry Leaders and Academic Privacy Researchers: Adversaries or Partners?"
1/19/17 - Patrick Traynor "Security Challenges in the Landscape of Emerging Digital Financial Services"
9/15/16 - Kelly Caine "The Weakest Link"
8/18/16 - Kimberly Claffy "Mapping Interconnection Connectivity and Congestion."
7/21/16 - Arvind Narayanan "Cyptocurrencies: the ideas behind the hype"
6/16/16 - Nicholas Weaver "Welcome to the Panopticon(s)"
5/19/16 - Carl Landwehr "How can we enable privacy in an age of big data analytics?"
4/21/16 - Susan Landau "Crypto Wars: Plus ça Change, Plus c'est la Même Chose"
3/24/16 - Phillip Rogaway "The Moral Character of Cryptographic Work"
3/17/16 - Deirdre K. Mulligan "Privacy: Plural, Contextual, Contestable but not Unworkable"
1/21/16 - Ronald J. Deibert "The Citizen Lab's Mixed Methods Approach to Research on Information Controls"
11/12/15 - Tadayoshi Kohno "Computer Security and the Internet of Things"
7/16/15 - Mark Tehranipoor "New Frontiers in Hardware Security and Trust"
7/6/15 - Robert N.M. Watson, "The CHERI Processor: Revisiting the Hardware-Software Interface for Security"
6/18/15 - Bret Hartman, "Cybersecurity for the Internet of Everything (IoE)"
4/14/15 - Gabriella Coleman, "Inside Anonymous"
3/19/15 - Mary Ellen Callahan, "Cybersecurity and Privacy: Complementary -- Not Mutually Exclusive -- Concepts"
1/15/15 - Salil Vadhan, "Differential Privacy: Theoretical and Practical Challenges"
11/13/14 - Dana Chisnell, "The burden of authentication: What friction points reveal"
7/17/14 - Crispin Cowen, "Reflections on Decades of Defending Imperfect Software"
5/15/14 - Dan Wallach, "STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System"
4/17/14 - Deb Frincke, "Education and Training - NSA/CSS Style"
3/20/14 - Maya Bernstein, "Increasing Trust in the E-Health Environment: Privacy Mechanisms and Policy Problems"
2/20/14 - Deanna Caputo, "Going Spear phishing: Exploring Embedded Training & Awareness"
1/14/14 - Roger Dingledine, "The Tor Project in 2013"
11/25/13 - Alessandro Acquisti, "An Experiment in Hiring Discrimination via Online Social Networks"
7/18/13 - Stewart Baker, "Cyberwar -- Without the Magical Thinking"
3/21/13 - Cormac Herley, "Security, Cybercrime and Scale"
1/17/13 - Patrick Lincoln, "Ultra Paranoid Computing"
11/15/12 - Kevin Fu, "Medical Device Cybersecurity: The First 164 Years"
10/18/12 - Jeff Hancock, "Deception and Cybersecurity"
8/16/12 - Ernest McDuffie, "National Initiative for Cybersecurity Education (NICE) Overview"
4/19/12 - Lorrie Cranor, "Security, Privacy, and Usability: Better Together"
3/15/12 - Tom Longstaff, "Barriers to the.Science of Security"
2/16/12 - Paul Barford, "Challenges and Opportunities in Cyber Security Innovation"
1/19/12 - Vitaly Shmatikov, "The End of Anonymity, the Beginning of Privacy"
12/1/11 - Fabian Monrose, "Hooked On Phonics: Learning to Read Encrypted VoIP Conversations"
11/3/11 - Stefan Savage, Why the hard problem of computer security needs the soft sciences"
10/6/11 - Douglas Maughan, "So what if I take over a botnet to do my research?"
9/1/11 - Marshall Van Alstyne, "Fighting Fraud from an Economic Perspective"
8/4/11 - Ken Klingenstein, "Trust and Turtles All the Way Down..."
7/7/11 - Paul L. Harris, "Selective Credulity"
6/1/11 - Fred B. Schneider, "Doctrine for Cybersecurity."
Questions/comments about WATCH? Contact Nina Amla