People interested in network security and privacy meet regularly over lunch break and discuss very recent research related to security and privacy from high-quality scientific conferences (IEEE Security and Privacy, ACM CCS, NDSS, NSDI, USENIX Security, ACM SIGCOMM, ...). This is a great way to spend your lunch break and keep pace with cutting edge security and privacy research. Talking about scientific presentations often leads to interesting new ideas, possibly laying the foundation for your future thesis topic.
With most restrictions regarding the pandemic lifted, we return to bi-weekly sessions in our seminar room. Join our mailing list to receive updates.
If you want to peek into talks we target to watch during the session have a look at our previous schedule.
Date | Topic |
2022-04-28 | Cybercrime Scene Reconstruction C^2SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis (Yonghwi Kwon, Weihang Wang, Jinho Jung, Kyu Hyung Lee, Roberto Perdisci @ NDSS '21) re-located to Ballroom (9220, top floor of building E3) |
2022-05-12 | The Impact of Client-Side Content Detection An Evaluation of the Risks of Client-Side Scanning (Matthew Green, Vanessa Teague, Bruce Schneier, Alex Stamos, Carmela Troncoso @ RWC '22) |
2022-05-26 | (no session due to public holidays) |
2022-06-09 | Online Fraud in Payment and Voting Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments (Zainul Abi Din, Hari Venugopalan, Henry Lin, Adam Wushensky, Steven Liu, Samuel T. King @IEEE S&P '21) |
2022-06-23 | IoT Device Security Pitfalls Open for hire: attack trends and misconfiguration pitfalls of IoT devices (Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis @IMC '21) |
2022-07-07 | The Human Perspective on Data Breaches "Now I'm a bit angry:" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them (Peter Mayer, Yixin Zou, Florian Schaub, Adam J. Aviv @ USENIX Security '21) |
2022-07-21 | Defending against BGP Hijacking ROV++: Improved Deployable Defense against BGP Hijacking (Reynaldo Morillo, Justin Furuness, Cameron Morris, James Breslin, Amir Herzberg, Bing Wang @ NDSS '21) |
2022-08-04 | Graph Learning in Software Security SIGL: Securing Software Installations Through Deep Graph Learning (Xueyuan Han, Xiao Yu, Thomas Pasquier, Ding Li, Junghwan Rhee, James Mickens, Margo Seltzer, Haifeng Chen @ USENIX Security '21) |
2022-08-18 | Enabling Public Key Transparency in Messaging Systems Merkle^2: A Low-Latency Transparency Log System (Yuncong Hu, Kian Hooshman, Harika Kalidhind, Seung Jin Yan, Raluca Ada Popa @ S&P '21) |
2022-09-01 | Secure Online Voting Security Analysis of the Democracy Live Online Voting System (Michael Specter, J. Alex Halderman @ USENIX Security '21) |
2022-09-15 | Private Smart Contracts ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs (Samuel Steffen, Benjamin Bichsel, Roger Baumgartner, Martin Vechev @IEEE S&P '22) |
2022-09-29 | TLS in consumer IoT devices IoTLS: understanding TLS usage in consumer IoT devices (Muhammad Talha Paracha, Daniel J. Dubois, Narseo Vallina-Rodriguez, David Choffnes @IMC '21) |