Loading Events
This event has passed.
HAIC Talks is a series of public lectures on contemporary topics in information security. The talks are open to everyone and free of change.

The HAIC public outreach initiative aims to make information security more accessible to a broader audience. As part of this initiative, they are organizing HAIC Talks, a series of public lectures on contemporary topics in information security. In the style of studia generalia, these lectures are free and open to everyone. No background knowledge in information security is required. HAIC Talks are made possible through the generous support of the Aalto University School of Science.

Venue: T1 lecture hall (2nd floor), CS-building, Konemiehentie 2, 02150 Espoo.

Time: 12:00-13:30. The lecture will be approximately one hour, after which there will be time for questions.

This HAIC Talk will open the Secure Systems Demo Day 2018. After the talk there will be other presentations, posters, and demonstrations of the research group’s recent results. Demo Day 2018 is open to everyone and free of charge. More information about the event and registration on Secure Systems Group web page.

Prof. Paul van Oorschot
Carleton University

Science of Security—Theory vs. Measuring the Observable World


Recent years have seen increasing calls to make security research more “scientific”. Who can argue with science being desirable? But what exactly do people mean when they suggest this, and what are they really seeking? What would a “Science of Security” look like? We consider these questions, in the context of historical science and more recent security research, offer observations and insights, and suggest where things might be improved.


Paul Van Oorschot is a Professor of Computer Science at Carleton University in Ottawa, where he has been Canada Research Chair since 2002, following 14-years in industry at Bell-Northern Research and related companies. He is an ACM Fellow and a Fellow of the Royal Society of Canada. He was Program Chair of USENIX Security 2008 and NDSS 2001-2002, and co-author of the Handbook of Applied Cryptography (1996). He has served on the editorial boards of IEEE TDSC, IEEE TIFS, and ACM TISSEC. His research interests include authentication and identity management, computer security, Internet security, security and usability, software security, and applied cryptography.