People interested in network security and privacy meet once a week over lunch break and watch videos related to security and privacy recorded at high-quality scientific conferences (IEEE Security and Privacy, ACM CCS, NDSS, NSDI, USENIX Security, ACM SIGCOMM, ...). After the presentation, there will likely be a short discussion and brainstorming related to the presentation. This is a great way to spend your lunch break and keep pace with cutting edge security and privacy research. Watching and talking about scientific presentations often leads to interesting new ideas, possibly laying the foundation for your future thesis topic.
Walking Onions: Scaling Anonymity Networks while Protecting Users (Chelsea H. Komlo, Nick Mathewson, Ian Goldberg @ USENIX Security 2020)
Date | Topic |
2020-05-27 | Prevailing Security Vulnerabilities in TrustZone-Assisted Trusted Execution Environments SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems (David Cerdeira, Nuno Santos, Pedro Fonseca, Sandro Pinto @ IEEE S&P 2020) |
2020-06-10 | Examining the Patching-Behavior of Internet-connected Enterprise Hosts Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises (Platon Kotzias, Leyla Bilge, Pierre-Antoine Vervier, Juan Caballero @ NDSS 2019) |
2020-06-24 | A Tale of Sea and Sky: On the Security of Maritime VSAT Communications A Tale of Sea and Sky: On the Security of Maritime VSAT Communications (James Pavur, Daniel Moser, Martin Strohmeier, Vincent Lenders, Ivan Martinovic @ IEEE S&P 2020) |
2020-07-08 | Real-World Analysis of IoT Devices in Home Networks All Things Considered: An Analysis of IoT Devices on Home Networks (Deepak Kumar, Kelly Shen, Benton Case, Deepali Garg, Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta, Zakir Durumeric @ USENIX Security 2019) |
2020-07-22 | Incentivizing Security Patches in the Consumer IoT Establishing Economic Incentives for Security Patching of IoT Consumer Products (Philipp Morgner, Christoph Mai, Nicole Koschate-Fischer, Felix Freiling, Zinaida Benenson @ IEEE S&P 2020) |
2020-08-05 | Strengthening Onion Routing with Trusted Execution Environments Enhancing Security and Privacy of Tor's Ecosystem by Using Trusted Execution Environments (Seongmin Kim, Juhyeng Han, Jaehyeong Ha, Taesoo Kim, Dongsu Han @ NSDI 2017) |
2020-08-19 | Privacy by Default? Not on your Phone An Analysis of Pre-installed Android Software (Julien Gamba, Mohammed Rashed, Abbas Razaghpanah, Juan Tapiador, Narseo Vallina-Rodriguez @ IEEE S&P 2020) |
2020-09-02 | Truly Keyless CDNs Achieving Keyless CDNs with Conclaves (Stephen Herwig, Christina Garman, Dave Levin @ USENIX Security 2020) |
2020-09-16 | Android Permissions & an alternative Tor Design See No Evil: Phishing for Permissions with False Transparency (Güliz Seray Tuncay, Jingyu Qian, Carl A. Gunter @ USENIX Security 2020) Walking Onions: Scaling Anonymity Networks while Protecting Users (Chelsea H. Komlo, Nick Mathewson, Ian Goldberg @ USENIX Security 2020) |
2020-09-30 | Evaluating Security & Privacy Advices on the Web and Mistakes in Program Code A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web (Elissa M. Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, Michelle L. Mazurek @ USENIX Security 2020) Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It (Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks @ USENIX Security 2020) |