People interested in network security and privacy meet regularly over lunch break and discuss very recent research related to security and privacy from high-quality scientific conferences (IEEE Security and Privacy, ACM CCS, NDSS, NSDI, USENIX Security, ACM SIGCOMM, ...). This is a great way to spend your lunch break and keep pace with cutting edge security and privacy research. Talking about scientific presentations often leads to interesting new ideas, possibly laying the foundation for your future thesis topic.
We organize bi-weekly sessions in our seminar room. Join our mailing list to receive updates and invitations a few days before the session.
2024-10-09 | Managing Secondary Authentication Factors and Attacker Preferences ”If I could do this, I feel anyone could:" The Design and Evaluation of a Secondary Authentication Factor Manager (Garrett Smith, Tarun Yadav, Jonathan Dutson, Scott Ruoti, Kent Seamons @ USENIX Security 23) Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale (Michele Campobasso, Luca Allodi @ USENIX Security 23) |
2024-10-23 | Privacy Implications of AirTags Who tracks the trackers? Balancing privacy and stalker detection for Apple's AirTags (Gabrielle Beck, Harry Eldridge, Matthew Green, Nadia Heninger, Abhishek Jain @ RWC 24) |
2024-11-06 | Internet Censorship Modeling and Detecting Internet Censorship Events (Elisa Tsai, Ram Sundara Raman, Atul Prakash, Roya Ensafi @ NDSS 24) |
2024-11-20 | The Legal Side of Incident Response Lessons Lost: Incident Response in the Age of Cber Insurance and Breach Attorneys (Daniel W. Woods, Rainer Böhme, Josephine Wolff, Daniel Schwarcz @ USENIX Security 2023) |
2024-12-04 | Enhancing the Authentication on IoT Devices From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices (Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li @ NDSS 24) |
2024-12-18 | Acoustic Side-Channel Attacks Acoustic Keystroke Leakage on Smart Televisions (Tejas Kannan, Synthia Qia Wang, Max Sunog, Abraham Bueno de Mesquita, Nick Feamster, Henry Hoffmann @ NDSS 24) |
2025-01-01 | Cancelled - New Year's Day |
2025-01-15 | Privacy Risks From Wearable Activity Trackers and How to Cover up Anomalous Accesses to Electronic Health Records Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers (Noe Zufferey, Mathias Humbert, Romain Tavenard, Kevin Huguenin @ USENIX Security 23) How to Cover up Anomalous Accesses to Electronic Health Records (Xiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David Liebovitz, Gang Wang, Carl A. Gunter @ USENIX Security 23) |
2025-01-29 | Cancelled - COMSYS Chair Retreat |
2025-02-12 | How to achieve real-world use of FHE Towards robust FHE for the real world (Christian Knabenhans, Alexander Viand, Anwar Hithnawi @ RWC 24) |
2025-02-26 | Smart Home Monitoring CP-IoT: A Cross-Platform Monitoring System for Smart Home (Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang, Linna Fan, Chenxin Duan @ NDSS 24) |
2025-03-12 | TBA / Suggestions Welcome |
2025-03-26 | TBA / Suggestions Welcome |