Here you may find some of my talks and presentations. Comments welcomed.

This page includes only talks that are not associated with a published technical paper. For presentations of conference papers, see the list of my technical papers.

Talks

The State of Electronic Voting, 2008
Keynote presentation, LISA '08, November 14, 2008.
Object Capabilities for Security
Google techtalk, November 30, 2007.
Object Capabilities for Security
TRUST seminar, September 6, 2007.
Cryptanalysis of a Cognitive Authentication Scheme
Rump session talk, CRYPTO 2006, August 23, 2006. [ppt]
Cryptographic protocols for electronic voting
Invited talk, CRYPTO 2006, August 23, 2006. [ppt]
Object Capabilities for Security
Invited talk, PLAS 2006, June 10, 2006. [ppt]
The Future of Software Security
Berkeley EECS Annual Research Symposium (BEARS 2006), February 23, 2006. [webcast]
Privacy in pervasive computing: What can technologists do?
Invited talk, SECURECOMM 2005, September 6, 2005.
Pushdown model checking for security
Invited talk, joint session of SPIN 2005 and SecCo 2005, August 22, 2005. [powerpoint]
Program analysis for security: Making it scale
OSQ 2005 retreat, May 13, 2005. [powerpoint, ps]
The Conventional Wisdom About Sensor Network Security ... Is Wrong
IEEE Security & Privacy 2005, invited panelist, Security in Ad-hoc and Sensor Networks, May 11, 2005. [powerpoint, ps]
Risks in Paperless E-voting
Computers, Freedom, and Privacy 2004, invited panelist, Electronic Voting: The Great Paper Trail Debate, April 23, 2004.
Towards a unifying view of block cipher cryptanalysis
Fast Software Encryption 2004, invited speaker, February 7, 2004. [powerpoint]
Internet Voting: Technology and Policy Issues
Guest lecture, Technology and Policy, November 19, 2003.
Security for Sensor Networks: Cryptography and Beyond
2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), invited speaker, October 31, 2003. [powerpoint]
Crypto Theory and Security Practice
ISC 2003, invited panelist, "Relationship between cryptography and network security research", October 2, 2003. [powerpoint]
Software Security
9th Annual Symposium on Frontiers of Engineering, session on Counterterrorism Technologies and Infrastructure Protection, September 19, 2003. [powerpoint]
Security Types to the Rescue
Software Security Workshop, June 16, 2003.
Wireless Security
EECS Colloqium, UC Berkeley, March 12, 2003. [powerpoint]
Wireless Security: Why Swiss-Cheese Security Isn't Enough
Berkeley in Silicon Valley, March 1, 2003. [powerpoint]
Cellphone security
SAC 2002, Aug 16, 2002. [powerpoint]
New attacks on t-bit OFB and CFB modes: A cautionary note regarding IV selection
CRYPTO 2002 rump session, August 20, 2002.
MOPS: MOdelchecking Security Properties
CHATS PI meeting, July 11, 2002. [powerpoint]
Security in 802.11 Wireless Networks
IEEE Infocom 2002, invited panelist, "Securing Wireless and Mobile Networks - Is it Possible?". June 25, 2002.
Software Security: Enforcing defensive programming through software model checking
7th ACM Symposium on Access Control Models and Technologies (SACMAT 2002), invited panelist, "Cool Security Trends", June 3, 2002.
Wireless security
CRA Digital Government Fellow presentation at the FCC, Apr. 29, 2002. [powerpoint, streaming audio/video archive]
A few open problems in computer security
NAS Board on Mathematical Sciences and their Applications, Workshop on Homeland Security, Apr. 27, 2002. [powerpoint, pdf]
Cellphone security
UC Berkeley seminar: Digital Defense: Issues in Security, Privacy and Critical Infrastructure Protection, Feb. 11, 2002.
Analysis and design of symmetric ciphers
Contemporary Methods in Cryptography, IPAM workshop, Jan 2002. [powerpoint, pdf]
Static analysis and software assurance
Static Analysis Symposium 2001, invited session on security. [powerpoint]
Practical failure modes in protocol analysis
Computer Security Foundations Workshop, invited panel talk, June 2001.
A survey of the AES process
Xerox PARC forum, 30 Sept 1999.
Equivalent keys for HPC
Rump session talk at AES'99.
Practical Computer Security
Eric Brewer, Ian Goldberg, David Wagner, International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99), City University of Hong Kong, July 5, 1999.
Practical proofs of security for the Unix password hash function
Stanford security seminar, 1 June 1999.