Security and Privacy Lunch

People interested in network security and privacy meet regularly over lunch break and discuss very recent research related to security and privacy from high-quality scientific conferences (IEEE Security and Privacy, ACM CCS, NDSS, NSDI, USENIX Security, ACM SIGCOMM, ...). This is a great way to spend your lunch break and keep pace with cutting edge security and privacy research. Talking about scientific presentations often leads to interesting new ideas, possibly laying the foundation for your future thesis topic.

We organize bi-weekly sessions in our seminar room. Join our mailing list to receive updates and invitations a few days before the session.

Organizational Information

  • Contact: Johannes Lohmöller
  • ECTS Credits: none (but you can get a certificate)
  • Audience: Anyone interested in security and privacy
  • Language: English
  • Registration: Please subscribe to our mailing list

Logistics

  • Discussion Date: Wednesday, 12:30 PM 
  • Place: COMSYS Big Meeting Room, Room 9006, Building E3
  • Suggestions for videos are very welcome, please contact Johannes Lohmöller

Preliminary Schedule

2024-10-09Managing Secondary Authentication Factors and Attacker Preferences
”If I could do this, I feel anyone could:" The Design and Evaluation of a Secondary Authentication Factor Manager (Garrett Smith, Tarun Yadav, Jonathan Dutson, Scott Ruoti, Kent Seamons @ USENIX Security 23)
Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale (Michele Campobasso, Luca Allodi @ USENIX Security 23)
 
2024-10-23Privacy Implications of AirTags
Who tracks the trackers? Balancing privacy and stalker detection for Apple's AirTags (Gabrielle Beck, Harry Eldridge, Matthew Green, Nadia Heninger, Abhishek Jain @ RWC 24)
 
2024-11-06Internet Censorship
Modeling and Detecting Internet Censorship Events (Elisa Tsai, Ram Sundara Raman, Atul Prakash, Roya Ensafi @ NDSS 24)
 
2024-11-20The Legal Side of Incident Response
Lessons Lost: Incident Response in the Age of Cber Insurance and Breach Attorneys (Daniel W. Woods, Rainer Böhme, Josephine Wolff, Daniel Schwarcz @ USENIX Security 2023)
 
2024-12-04Enhancing the Authentication on IoT Devices
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices (Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li @ NDSS 24)
 
2024-12-18Acoustic Side-Channel Attacks
Acoustic Keystroke Leakage on Smart Televisions (Tejas Kannan, Synthia Qia Wang, Max Sunog, Abraham Bueno de Mesquita, Nick Feamster, Henry Hoffmann @ NDSS 24)
 
2025-01-01
 
Cancelled - New Year's Day
2025-01-15Privacy Risks From Wearable Activity Trackers and How to Cover up Anomalous Accesses to Electronic Health Records
Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers (Noe Zufferey, Mathias Humbert, Romain Tavenard, Kevin Huguenin @ USENIX Security 23)
How to Cover up Anomalous Accesses to Electronic Health Records (Xiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David Liebovitz, Gang Wang, Carl A. Gunter @ USENIX Security 23)
 
2025-01-29
 
Cancelled - COMSYS Chair Retreat
2025-02-12How to achieve real-world use of FHE
Towards robust FHE for the real world (Christian Knabenhans, Alexander Viand, Anwar Hithnawi @ RWC 24)
 
2025-02-26Electromagnetic Side-Channels on SoCs
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers (Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, Aurélien Francillon @ NDSS 24)
 
2025-03-12Smart Home Monitoring
CP-IoT: A Cross-Platform Monitoring System for Smart Home (Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang, Linna Fan, Chenxin Duan @ NDSS 24)
 
2025-03-26RR Fault Model for TEE
RR: A Fault Model for Efficient TEE Replication (Baltasar Dinis, Peter Druschel, Rodrigo Rodrigues @ NDSS 23)
 
- Impressum | Datenschutz -