People interested in network security and privacy meet once a week over lunch break and watch videos related to security and privacy recorded at high-quality scientific conferences (IEEE Security and Privacy, ACM CCS, NDSS, NSDI, USENIX Security, ACM SIGCOMM, ...). After the presentation, there will likely be a short discussion and brainstorming related to the presentation. This is a great way to spend your lunch break and keep pace with cutting edge security and privacy research. Watching and talking about scientific presentations often leads to interesting new ideas, possibly laying the foundation for your future thesis topic.
If you want to peek into talks we target to watch during the session have a look at our last term's schedule.
Date | Topic |
2019-10-10 | Redacting Content from Public Blockchains Redactable Blockchain in the Permissionless Setting (Dominic Deuber, Bernardo Magri, Sri Aravinda Krishnan Thyagarajan @ IEEE S&P 2019) |
2019-10-17 | Unauthorized Access: How Apps Circumvent Android's Permission Control 50 Ways to Leak Your Data: An Exploration of Apps (Joel Reardon, Álvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, Serge Egelman @ USENIX Security 2019) |
2019-10-24 | Cancelled |
2019-10-31 | My Browser Blacklist Protects Me From Phishing, or Not? PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques Against Browser Phishing Blacklists (Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn, Brad Wardman, Kevin Tyers @ IEEE S&P 2019) |
2019-11-06 | 2FA Reworked - A New Protocol for Hardware Authentication Tokens True2F: Backdoor-Resistant Authentication Tokens (Emma Dauterman, Henry Corrigan-Gibbs, David Mazières, Dan Boneh, Dominic Rizzo @ IEEE S&P 2019) |
2019-11-14 | Chatty IoT Devices Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach (Jingjing Ren, Daniel J. Dubois, and David Choffnes, Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi @ IMC 2019) |
2019-11-21 | Malware Doesn't Stick to Windows Anymore Understanding Linux Malware (Emanuele Cozzi, Mariano Graziano, Yanick Fratantonio, Davide Balzarotti @ IEEE S&P 2018) |
2019-11-28 | Bad Security Practices due to Copy & Paste Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography (Felix Fischer, Huang Xiao, Ching-Yu Kao, Yannick Stachelscheid, Benjamin Johnson, Danial Razar, Paul Fawkesley, Nat Buckley, Konstantin Böttinger, Paul Muntean, Jens Grossklags @ USENIX Security 2019) |
2019-12-05 | On Security-(Ir)Relevant User Notifications The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings (Anthony Vance, David Eargle, Jeffrey L. Jenkins, C. Brock Kirwan, Bonnie Brinton Anderson @ SOUPS 2019) |
2019-12-12 | Beyond the Browser: Understanding TLS Application Behavior TLS Beyond the Browser: Combining End Host and Network Data to Understand Application Behavior (Blake Anderson and David McGrew @ IMC 2019) |
2019-12-19 | Automated Safety Vetting of PLC Code Towards Automated Safety Vetting of PLC Code in Real World Plants (Mu Zhang, Chien-Ying Chen, Bin-Chou Kao, Yassine Qamsane, Yuru Shao, Yikai Lin, Elaine Shi, Sibin Mohan, Kira Barton, James Moyne, Z. Morley Mao @ IEEE S&P 2019) |
2019-12-26 | Cancelled - Boxing Day |
2020-01-02 | Cancelled |
2020-01-09 | Increasing Sensor Reliability in Smart Homes Peeves: Physical Event Verification in Smart Homes (Simon Birnbach, Simon Eberz, Ivan Martinovic @ CCS 2019) |
2020-01-16 | Exploring the Understanding of Users Browsing the Web (Securely) The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators (Christopher Thompson, Martin Shelton, Emily Stark, Maximilian Walker, Emily Schechter, Adrienne Porter Felt @ USENIX Security 2019) |
2020-01-23 | Faster Blockchain Bootstrapping Vault: Fast Bootstrapping for the Algorand Cryptocurrency (Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich @ NDSS 2019) |
2020-01-30 | The Cost of DNS-over-HTTPS An Empirical Study of the Cost of DNS-over-HTTPS (Timm Böttger, Felix Cuadrado, and Gianni Antichi (Queen Mary University of London), Eder Leão Fernandes (Queen Mary, University of London), Gareth Tyson (Queen Mary University of London), Ignacio Castro (Queen Mary, University of London), Steve Uhlig (Queen Mary University of London) @ IMC 2019) |
2020-02-06 | IoT-specific E2E Encryption JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT (Sam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler @ USENIX Security 2019) |
2020-02-13 | On the Other Side of Internet Measurements Scanning the Scanners: Sensing the Internet from a Massively Distributed Network Telescope (Philipp Richter, Arthur Berger @ IMC 2019) |
2020-02-20 | Cancelled - Fat Thursday |
2020-02-27 | Cancelled - Chair retreat |
2020-03-05 | Privacy in Machine Learning Data Privacy Risks of Machine Learning (Reza Shokri @ IRTF PEARG 106 2019) |
2020-03-12 | Wireless Attacks on Electrical Vehicle Charging Losing the Car Keys: Wireless PHY-Layer Insecurity in EV Charging (Richard Baker, Ivan Martinovic @ USENIX Security 2019) |
2020-03-19 | Cancelled |
2020-03-26 | Cancelled |